Overview
overview
10Static
static
3anhezkzllnds.exe
windows10-1703-x64
anhezkzllnds.exe
windows10-2004-x64
bghfldfyngmg.exe
windows10-1703-x64
bghfldfyngmg.exe
windows10-2004-x64
jldfefkrpayl.exe
windows10-1703-x64
jldfefkrpayl.exe
windows10-2004-x64
molbfgsxjpwv.exe
windows10-1703-x64
molbfgsxjpwv.exe
windows10-2004-x64
msxsbkvjyoho.exe
windows10-1703-x64
msxsbkvjyoho.exe
windows10-2004-x64
oboekjkdross.exe
windows10-1703-x64
oboekjkdross.exe
windows10-2004-x64
puugtqapzxao.exe
windows10-1703-x64
puugtqapzxao.exe
windows10-2004-x64
pyaxlaetvdvq.exe
windows10-1703-x64
pyaxlaetvdvq.exe
windows10-2004-x64
qywfpvbxbvih.exe
windows10-1703-x64
qywfpvbxbvih.exe
windows10-2004-x64
ylyxcgqrxdhu.exe
windows10-1703-x64
ylyxcgqrxdhu.exe
windows10-2004-x64
Analysis
-
max time kernel
756s -
max time network
761s -
platform
windows10-1703_x64 -
resource
win10-20240214-en -
resource tags
arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system -
submitted
19-02-2024 15:26
Static task
static1
Behavioral task
behavioral1
Sample
anhezkzllnds.exe
Resource
win10-20240214-en
Behavioral task
behavioral2
Sample
anhezkzllnds.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
bghfldfyngmg.exe
Resource
win10-20240214-en
Behavioral task
behavioral4
Sample
bghfldfyngmg.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
jldfefkrpayl.exe
Resource
win10-20240214-en
Behavioral task
behavioral6
Sample
jldfefkrpayl.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
molbfgsxjpwv.exe
Resource
win10-20240214-en
Behavioral task
behavioral8
Sample
molbfgsxjpwv.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
msxsbkvjyoho.exe
Resource
win10-20240214-en
Behavioral task
behavioral10
Sample
msxsbkvjyoho.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
oboekjkdross.exe
Resource
win10-20240214-en
Behavioral task
behavioral12
Sample
oboekjkdross.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
puugtqapzxao.exe
Resource
win10-20240214-en
Behavioral task
behavioral14
Sample
puugtqapzxao.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
pyaxlaetvdvq.exe
Resource
win10-20240214-en
Behavioral task
behavioral16
Sample
pyaxlaetvdvq.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
qywfpvbxbvih.exe
Resource
win10-20240214-en
Behavioral task
behavioral18
Sample
qywfpvbxbvih.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
ylyxcgqrxdhu.exe
Resource
win10-20240214-en
Behavioral task
behavioral20
Sample
ylyxcgqrxdhu.exe
Resource
win10v2004-20231215-en
Errors
General
-
Target
molbfgsxjpwv.exe
-
Size
764KB
-
MD5
3943e12f7f33ccff610fbad61defc66f
-
SHA1
b893d92e017997f411cfcda76425cc42ddd5405f
-
SHA256
22f66ff240dfda2244e7ce17c600985e70d3640764564ed9a5bd401502c0383b
-
SHA512
4d135ff5836505be56998c42edf9be83c9c7eb4d479c6123f3594b675c6f9dbcdf95ad8027f0a2dc0a11f44c9eefe36f22d1a5beb05678ac0142346c6325d5e3
-
SSDEEP
12288:gfQQEGPVle8phMeVUF5nqLL7fNfM3q9RNIwo:gr3+F5nqTN03qD
Malware Config
Extracted
njrat
0.7d
Lammer
8.tcp.ngrok.io:19346
bca7344ec33c4f045ea133b6b48694e2
-
reg_key
bca7344ec33c4f045ea133b6b48694e2
-
splitter
|'|'|
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral7/memory/4644-604-0x0000000001630000-0x000000000163A000-memory.dmp disable_win_def -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
molbfgsxjpwv.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Users\\Admin\\Documents\\Sub\\xdwdClient.exe" molbfgsxjpwv.exe -
Processes:
molbfgsxjpwv.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" molbfgsxjpwv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" molbfgsxjpwv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" molbfgsxjpwv.exe -
Processes:
molbfgsxjpwv.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" molbfgsxjpwv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\promptonsecuredesktop = "0" molbfgsxjpwv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\consentpromptbehavioradmin = "0" molbfgsxjpwv.exe -
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
Trojan.exepid process 5880 Trojan.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
molbfgsxjpwv.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2694788800-2737334826-1937309534-1000\Software\Microsoft\Windows\CurrentVersion\Run\SDLKFJHDLKHDkh = "C:\\Users\\Admin\\Documents\\Sub\\xdwdWatchDog.exe" molbfgsxjpwv.exe -
Processes:
molbfgsxjpwv.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua molbfgsxjpwv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" molbfgsxjpwv.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
Processes:
flow ioc 28 0.tcp.eu.ngrok.io 33 0.tcp.eu.ngrok.io 2 0.tcp.eu.ngrok.io 8 0.tcp.eu.ngrok.io -
Suspicious use of SetThreadContext 1 IoCs
Processes:
molbfgsxjpwv.exedescription pid process target process PID 4644 set thread context of 3500 4644 molbfgsxjpwv.exe RegAsm.exe -
Drops file in Windows directory 1 IoCs
Processes:
molbfgsxjpwv.exedescription ioc process File created C:\Windows\xdwd.dll molbfgsxjpwv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
molbfgsxjpwv.exeWmiApSrv.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4644 molbfgsxjpwv.exe 4640 WmiApSrv.exe 4640 WmiApSrv.exe 3248 powershell.exe 3248 powershell.exe 3248 powershell.exe 3248 powershell.exe 3248 powershell.exe 4216 powershell.exe 4216 powershell.exe 348 powershell.exe 348 powershell.exe 3804 powershell.exe 3804 powershell.exe 2528 powershell.exe 2528 powershell.exe 1964 powershell.exe 1964 powershell.exe 4216 powershell.exe 4216 powershell.exe 348 powershell.exe 348 powershell.exe 4556 powershell.exe 4556 powershell.exe 2308 powershell.exe 2308 powershell.exe 4232 powershell.exe 4232 powershell.exe 2528 powershell.exe 2528 powershell.exe 4268 powershell.exe 4268 powershell.exe 3500 powershell.exe 3500 powershell.exe 4216 powershell.exe 3804 powershell.exe 3804 powershell.exe 2688 powershell.exe 2688 powershell.exe 2456 powershell.exe 2456 powershell.exe 348 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
molbfgsxjpwv.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 4644 molbfgsxjpwv.exe Token: SeDebugPrivilege 3248 powershell.exe Token: SeIncreaseQuotaPrivilege 3248 powershell.exe Token: SeSecurityPrivilege 3248 powershell.exe Token: SeTakeOwnershipPrivilege 3248 powershell.exe Token: SeLoadDriverPrivilege 3248 powershell.exe Token: SeSystemProfilePrivilege 3248 powershell.exe Token: SeSystemtimePrivilege 3248 powershell.exe Token: SeProfSingleProcessPrivilege 3248 powershell.exe Token: SeIncBasePriorityPrivilege 3248 powershell.exe Token: SeCreatePagefilePrivilege 3248 powershell.exe Token: SeBackupPrivilege 3248 powershell.exe Token: SeRestorePrivilege 3248 powershell.exe Token: SeShutdownPrivilege 3248 powershell.exe Token: SeDebugPrivilege 3248 powershell.exe Token: SeSystemEnvironmentPrivilege 3248 powershell.exe Token: SeRemoteShutdownPrivilege 3248 powershell.exe Token: SeUndockPrivilege 3248 powershell.exe Token: SeManageVolumePrivilege 3248 powershell.exe Token: 33 3248 powershell.exe Token: 34 3248 powershell.exe Token: 35 3248 powershell.exe Token: 36 3248 powershell.exe Token: SeDebugPrivilege 4216 powershell.exe Token: SeDebugPrivilege 348 powershell.exe Token: SeDebugPrivilege 2528 powershell.exe Token: SeDebugPrivilege 3804 powershell.exe Token: SeDebugPrivilege 1964 powershell.exe Token: SeDebugPrivilege 4556 powershell.exe Token: SeDebugPrivilege 2308 powershell.exe Token: SeDebugPrivilege 4232 powershell.exe Token: SeDebugPrivilege 4268 powershell.exe Token: SeDebugPrivilege 3500 powershell.exe Token: SeDebugPrivilege 2688 powershell.exe Token: SeDebugPrivilege 2456 powershell.exe Token: SeIncreaseQuotaPrivilege 4216 powershell.exe Token: SeSecurityPrivilege 4216 powershell.exe Token: SeTakeOwnershipPrivilege 4216 powershell.exe Token: SeLoadDriverPrivilege 4216 powershell.exe Token: SeSystemProfilePrivilege 4216 powershell.exe Token: SeSystemtimePrivilege 4216 powershell.exe Token: SeProfSingleProcessPrivilege 4216 powershell.exe Token: SeIncBasePriorityPrivilege 4216 powershell.exe Token: SeCreatePagefilePrivilege 4216 powershell.exe Token: SeBackupPrivilege 4216 powershell.exe Token: SeRestorePrivilege 4216 powershell.exe Token: SeShutdownPrivilege 4216 powershell.exe Token: SeDebugPrivilege 4216 powershell.exe Token: SeSystemEnvironmentPrivilege 4216 powershell.exe Token: SeRemoteShutdownPrivilege 4216 powershell.exe Token: SeUndockPrivilege 4216 powershell.exe Token: SeManageVolumePrivilege 4216 powershell.exe Token: 33 4216 powershell.exe Token: 34 4216 powershell.exe Token: 35 4216 powershell.exe Token: 36 4216 powershell.exe Token: SeIncreaseQuotaPrivilege 348 powershell.exe Token: SeSecurityPrivilege 348 powershell.exe Token: SeTakeOwnershipPrivilege 348 powershell.exe Token: SeLoadDriverPrivilege 348 powershell.exe Token: SeSystemProfilePrivilege 348 powershell.exe Token: SeSystemtimePrivilege 348 powershell.exe Token: SeProfSingleProcessPrivilege 348 powershell.exe Token: SeIncBasePriorityPrivilege 348 powershell.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
molbfgsxjpwv.exeRegAsm.execmd.exedescription pid process target process PID 4644 wrote to memory of 3248 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 3248 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 4216 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 4216 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 348 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 348 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 3804 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 3804 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 2528 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 2528 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 1964 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 1964 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 4556 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 4556 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 2308 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 2308 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 4232 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 4232 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 4268 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 4268 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 3500 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 3500 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 2688 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 2688 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 2456 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 2456 4644 molbfgsxjpwv.exe powershell.exe PID 4644 wrote to memory of 5560 4644 molbfgsxjpwv.exe RegAsm.exe PID 4644 wrote to memory of 5560 4644 molbfgsxjpwv.exe RegAsm.exe PID 4644 wrote to memory of 5560 4644 molbfgsxjpwv.exe RegAsm.exe PID 4644 wrote to memory of 3500 4644 molbfgsxjpwv.exe RegAsm.exe PID 4644 wrote to memory of 3500 4644 molbfgsxjpwv.exe RegAsm.exe PID 4644 wrote to memory of 3500 4644 molbfgsxjpwv.exe RegAsm.exe PID 4644 wrote to memory of 3500 4644 molbfgsxjpwv.exe RegAsm.exe PID 4644 wrote to memory of 3500 4644 molbfgsxjpwv.exe RegAsm.exe PID 4644 wrote to memory of 3500 4644 molbfgsxjpwv.exe RegAsm.exe PID 4644 wrote to memory of 3500 4644 molbfgsxjpwv.exe RegAsm.exe PID 4644 wrote to memory of 3500 4644 molbfgsxjpwv.exe RegAsm.exe PID 3500 wrote to memory of 5880 3500 RegAsm.exe Trojan.exe PID 3500 wrote to memory of 5880 3500 RegAsm.exe Trojan.exe PID 3500 wrote to memory of 5880 3500 RegAsm.exe Trojan.exe PID 4644 wrote to memory of 3528 4644 molbfgsxjpwv.exe cmd.exe PID 4644 wrote to memory of 3528 4644 molbfgsxjpwv.exe cmd.exe PID 3528 wrote to memory of 5668 3528 cmd.exe powershell.exe PID 3528 wrote to memory of 5668 3528 cmd.exe powershell.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
molbfgsxjpwv.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\consentpromptbehavioradmin = "0" molbfgsxjpwv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" molbfgsxjpwv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\promptonsecuredesktop = "0" molbfgsxjpwv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\molbfgsxjpwv.exe"C:\Users\Admin\AppData\Local\Temp\molbfgsxjpwv.exe"1⤵
- Modifies WinLogon for persistence
- Modifies Windows Defender Real-time Protection settings
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 02⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 62⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 62⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 62⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 22⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"3⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\zm3lpzea.jjc.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\zm3lpzea.jjc.exe"'3⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c Shutdown /s /f /t 002⤵
-
C:\Windows\system32\shutdown.exeShutdown /s /f /t 003⤵
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3af2855 /state1:0x41c64e6d1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD58592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5ac40bf44a6f9873a8f200ad96db5c4fd
SHA196cd2fe93eebb545ae9993f6bae2397181087d30
SHA2560b210c1f0aa802093a0d975f472b5e8d1f98e1293f92b0646dac1b8517e62d37
SHA512d86f8aee3d5774c5ca17a5e48e9b31d0e22a83c2d5846e120deb7e24f81f6b9cf5bfc4513d9d4f7ea3ff4c032754ee35e134524483315b5742cad3546f3da9d8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5821935f046670cef9c2b4407715c0295
SHA126d6de90473b287e2288d69266b94056bba539c6
SHA256a48430ce624068de63c84f26184f1fdb90d164cfc6ff9e542f92e6588ff137e4
SHA5129c31a529b42324bbf93c96a19643337797f4603450db9c493dc3b5b2d26446fc6c0464aa05a7488a58f4a65515e1479be95cf9e50ea0512e02805f071870c856
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5a08dc5fda2af96515ec0a4ec3d9bc5b9
SHA1005b6ed499f86b31567ab5b96a54054c3fd688f6
SHA256af98b876a323f01c35279afb653417cd32f863fae8068934d0bd2af9cb169747
SHA5127b05e351c6e4cc28afc826287497d19038c867bc123cba1eb2820b105cb6a02fe6db538590e3554826b544c2ab96743772347f3fe3f94051346d1b1412e18124
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5e6c209e392140251a97634b91a7cecf0
SHA1dd4606a666092f2636a786f850ee00bde2136da3
SHA256fdd8fa3289bf1f39b3d2980ca5adae058aca2c8e14c1375bd959a9af47910b50
SHA51203fd28bcdb2e0fd66659ae7affff51b9ddb0cca96c5ceb2bc2426686d29a27b2ab9a3eddf7e57e4c58f2e1f452da89a083f66a0421673f60c3c9ffb126d3726c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD56532fd6ad60a8c6f8d8ab75ff5fed1e4
SHA1de111bb1e805f56d21a647d40af4ba09fcb0c83e
SHA25630897b6fb40ce3067364146881774f24f153cd34c0695911e93f708cf2ca1b4d
SHA512e002129ddcc20528f53f07757fc92ec99911913d3fea1d70180c1fd138084d88daab3a10a49dba75b5798cfe77a757c7444bce70e1aefad3c29e0159bc77937e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD57ec6a3a108bbeb14cc3e51f5237f4d3a
SHA1be8585bd41443b01c2636391807c51dea5e2eac3
SHA256eeca6cec00c13ca12b19ecfe274b5fb8ab346f2c0b548333ea0025f6f3a8ada8
SHA5122103aadf4a8b0c62cb0a3588953269322252d0b6a15a5a6dc7f3659591ee8621f1ed53804492ca654390666070b4c519b863f38db60f064e8d7f5beb42f0991d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD50cd03b5dabe0c65d0b19af9654eda27f
SHA1a3bdf2c793e9b225589cabbb0c829fa7f23f46be
SHA256edb87bb6322719c6c584ffe8c00faef2ef3c8b6871919a94667055b0f6826cd2
SHA512b4073879242629281260218624951c6dbf80fa4250ce792495dc1bd95997e53297ca31ad5bc5ed34793e1a8167f8aaebe64357a2746c659f9c42e7fa57f81257
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD577626919486340419de1ee7b57a1a5d8
SHA1ffa4cc2a569ac9cac3ac974a51013115d679e9aa
SHA2567b3f55e41a750185caaa7ef336e2f3809a2b483a3fab47f38103f800a6defcf3
SHA512e5532bb2e1a78ae1058c73930844b86de817a428101c4688105ddb74b364e5946f2d89fb505feaef6f6e56224d2b5c215a5fae0aa327e3d12f1cca0fbd5856ce
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD513f6925dbe96e3ea45a189ccb1160de2
SHA153a1349cd169d82b4cb1972574370d4764750c9c
SHA256fd43b70f17d5f66b86353e89c064e286cb169f806c2b6d46737c1a34145cb39d
SHA51213c9dd7ec8af1921f1fdba0f427d2d441ac10ff80eb2ccfb32899bea1e33c86c735ea1dddd97990ca3375556e1c9b7ba8faee74281ee756295709a9e1340799c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5c65ad8f0531a0656a1c55e20afc195e4
SHA1734d65185cc50f19fc2b2955160a1c90e8bc46b1
SHA25662554f24c965ad66c71fc57e6c8ebd90fe244dcb21f70ddc212c2d756c6924c3
SHA512c0b70f9d85ab5f221e868a2514289a038afdf709ddfca5adae948c337f2284fd2071881b16b3a95137d452df61c6b02bc93d3c38365844efe213f9914d35b8ab
-
C:\Users\Admin\AppData\Local\Temp\Trojan.exeFilesize
63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wgtobemk.lg5.ps1Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Users\Admin\Documents\Sub\xdwdClient.exeFilesize
764KB
MD53943e12f7f33ccff610fbad61defc66f
SHA1b893d92e017997f411cfcda76425cc42ddd5405f
SHA25622f66ff240dfda2244e7ce17c600985e70d3640764564ed9a5bd401502c0383b
SHA5124d135ff5836505be56998c42edf9be83c9c7eb4d479c6123f3594b675c6f9dbcdf95ad8027f0a2dc0a11f44c9eefe36f22d1a5beb05678ac0142346c6325d5e3
-
C:\Windows\xdwd.dllFilesize
136KB
MD516e5a492c9c6ae34c59683be9c51fa31
SHA197031b41f5c56f371c28ae0d62a2df7d585adaba
SHA25635c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66
SHA51220fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6
-
memory/348-736-0x00000156ABEB0000-0x00000156ABEC0000-memory.dmpFilesize
64KB
-
memory/348-733-0x00000156ABEB0000-0x00000156ABEC0000-memory.dmpFilesize
64KB
-
memory/348-722-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/348-815-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/348-819-0x00007FFC87DF0000-0x00007FFC887DC000-memory.dmpFilesize
9.9MB
-
memory/1964-833-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/1964-791-0x00000227B6ED0000-0x00000227B6EE0000-memory.dmpFilesize
64KB
-
memory/1964-760-0x00007FFC87DF0000-0x00007FFC887DC000-memory.dmpFilesize
9.9MB
-
memory/1964-793-0x00000227B6ED0000-0x00000227B6EE0000-memory.dmpFilesize
64KB
-
memory/1964-756-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/2308-788-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/2308-799-0x00007FFC87DF0000-0x00007FFC887DC000-memory.dmpFilesize
9.9MB
-
memory/2308-843-0x00000203FF5D0000-0x00000203FF5E0000-memory.dmpFilesize
64KB
-
memory/2308-790-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/2308-842-0x00000203FF5D0000-0x00000203FF5E0000-memory.dmpFilesize
64KB
-
memory/2528-729-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/2528-830-0x00007FFC87DF0000-0x00007FFC887DC000-memory.dmpFilesize
9.9MB
-
memory/2528-731-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/2528-757-0x000001D976480000-0x000001D976490000-memory.dmpFilesize
64KB
-
memory/2528-834-0x000001D976480000-0x000001D976490000-memory.dmpFilesize
64KB
-
memory/2688-814-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/3248-668-0x000001C86FEB0000-0x000001C86FED2000-memory.dmpFilesize
136KB
-
memory/3248-710-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/3248-711-0x00007FFC87DF0000-0x00007FFC887DC000-memory.dmpFilesize
9.9MB
-
memory/3248-666-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/3248-667-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/3248-671-0x000001C86FF00000-0x000001C86FF10000-memory.dmpFilesize
64KB
-
memory/3248-670-0x000001C86FF00000-0x000001C86FF10000-memory.dmpFilesize
64KB
-
memory/3248-669-0x00007FFC87DF0000-0x00007FFC887DC000-memory.dmpFilesize
9.9MB
-
memory/3248-686-0x000001C86FF00000-0x000001C86FF10000-memory.dmpFilesize
64KB
-
memory/3500-808-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/3500-4340-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/3500-812-0x000001F4FBEC0000-0x000001F4FBED0000-memory.dmpFilesize
64KB
-
memory/3804-821-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/3804-770-0x000001F911850000-0x000001F911860000-memory.dmpFilesize
64KB
-
memory/3804-781-0x000001F911850000-0x000001F911860000-memory.dmpFilesize
64KB
-
memory/3804-752-0x00007FFC87DF0000-0x00007FFC887DC000-memory.dmpFilesize
9.9MB
-
memory/3804-726-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/4216-820-0x000002C7D1D80000-0x000002C7D1D90000-memory.dmpFilesize
64KB
-
memory/4216-720-0x00007FFC87DF0000-0x00007FFC887DC000-memory.dmpFilesize
9.9MB
-
memory/4216-716-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/4216-724-0x000002C7D1D80000-0x000002C7D1D90000-memory.dmpFilesize
64KB
-
memory/4216-714-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/4232-802-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/4232-805-0x00007FFC87DF0000-0x00007FFC887DC000-memory.dmpFilesize
9.9MB
-
memory/4268-854-0x00007FFC87DF0000-0x00007FFC887DC000-memory.dmpFilesize
9.9MB
-
memory/4268-807-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/4268-810-0x000001E2EFA60000-0x000001E2EFA70000-memory.dmpFilesize
64KB
-
memory/4556-841-0x0000015061880000-0x0000015061890000-memory.dmpFilesize
64KB
-
memory/4556-785-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/4556-839-0x00007FFC87DF0000-0x00007FFC887DC000-memory.dmpFilesize
9.9MB
-
memory/4556-836-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/4556-806-0x0000015061880000-0x0000015061890000-memory.dmpFilesize
64KB
-
memory/4640-39-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/4640-38-0x00007FFCA4D70000-0x00007FFCA4D71000-memory.dmpFilesize
4KB
-
memory/4640-36-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/4640-35-0x00007FFCA4D80000-0x00007FFCA4F5B000-memory.dmpFilesize
1.9MB
-
memory/4644-604-0x0000000001630000-0x000000000163A000-memory.dmpFilesize
40KB
-
memory/4644-603-0x00000000017A0000-0x0000000001816000-memory.dmpFilesize
472KB
-
memory/4644-180-0x000000001C130000-0x000000001C140000-memory.dmpFilesize
64KB
-
memory/4644-605-0x0000000001660000-0x000000000167E000-memory.dmpFilesize
120KB
-
memory/4644-37-0x00007FFC87DF0000-0x00007FFC887DC000-memory.dmpFilesize
9.9MB
-
memory/4644-32-0x000000001C130000-0x000000001C140000-memory.dmpFilesize
64KB
-
memory/4644-0-0x0000000000F60000-0x0000000001026000-memory.dmpFilesize
792KB
-
memory/4644-1-0x00007FFC87DF0000-0x00007FFC887DC000-memory.dmpFilesize
9.9MB