Resubmissions
12-04-2024 13:32
240412-qtgfpsag84 812-04-2024 13:32
240412-qtc4aaag83 812-04-2024 13:32
240412-qtcshsag82 812-04-2024 13:32
240412-qtb6zsag79 812-04-2024 13:32
240412-qtbkfsdh4s 809-04-2024 05:34
240409-f9mmjsbc9t 809-04-2024 05:33
240409-f9bkaabc8w 809-04-2024 05:33
240409-f86n2abc71 809-04-2024 05:33
240409-f8wh3afh27 801-02-2024 11:29
240201-nlq9tsebck 10Analysis
-
max time kernel
1160s -
max time network
1172s -
platform
windows11-21h2_x64 -
resource
win11-20240319-en -
resource tags
arch:x64arch:x86image:win11-20240319-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-04-2024 05:33
Static task
static1
Behavioral task
behavioral1
Sample
svchost_dump_SCY - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
svchost_dump_SCY - Copy.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
svchost_dump_SCY - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
svchost_dump_SCY - Copy.exe
Resource
win11-20240319-en
General
-
Target
svchost_dump_SCY - Copy.exe
-
Size
5.2MB
-
MD5
5fd3d21a968f4b8a1577b5405ab1c36a
-
SHA1
710e5ab0fceb71b982b966c3a7406ebdf1d2aa82
-
SHA256
7ac7b42889e14cbd8c7cebe692566ca045d0034f9ff103fc3ef9c5e035dc594f
-
SHA512
085a31c0412ba0a3d612a66ec8d95ce900e148240f92f9ec8c4d07b6c8e32cf233e92aefc7b4b53a91f5eacacd1cf3a8fcdf8cd7c206afa46014a9e4a9ddf53f
-
SSDEEP
98304:jgoX+R+gW1CkQFBAFGspWvuL136BRiGQiiyBrDbnh57cpbJLyns:coXxFGWL56BVrDbn77cjIs
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 6 IoCs
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exepid process 1652 netsh.exe 3740 netsh.exe 2164 netsh.exe 3200 netsh.exe 3972 netsh.exe 332 netsh.exe -
Executes dropped EXE 4 IoCs
Processes:
svchost.exe~tl5D73.tmpsvchost.exe~tl3A76.tmppid process 1380 svchost.exe 4236 ~tl5D73.tmp 1124 svchost.exe 4876 ~tl3A76.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 87.236.195.203 -
Drops file in System32 directory 10 IoCs
Processes:
svchost.exepowershell.exepowershell.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[1].htm svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\System32\config\systemprofile\AppData\Roaming\tor\state.tmp svchost.exe File created C:\Windows\System32\config\systemprofile\AppData\Roaming\tor\cached-microdesc-consensus.tmp svchost.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Roaming\tor\cached-microdescs.new svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\System32\config\systemprofile\AppData\Roaming\tor\lock svchost.exe File created C:\Windows\System32\config\systemprofile\AppData\Roaming\tor\unverified-microdesc-consensus.tmp svchost.exe File created C:\Windows\System32\config\systemprofile\AppData\Roaming\tor\cached-certs.tmp svchost.exe -
Drops file in Windows directory 5 IoCs
Processes:
svchost.exesvchost.exesvchost_dump_SCY - Copy.exedescription ioc process File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak svchost_dump_SCY - Copy.exe File created C:\Windows\System\svchost.exe svchost_dump_SCY - Copy.exe File opened for modification C:\Windows\System\svchost.exe svchost_dump_SCY - Copy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exesvchost.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
powershell.exepowershell.exesvchost_dump_SCY - Copy.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 2016 powershell.exe 3168 powershell.exe 3168 powershell.exe 2016 powershell.exe 1944 svchost_dump_SCY - Copy.exe 1944 svchost_dump_SCY - Copy.exe 4284 powershell.exe 4292 powershell.exe 4284 powershell.exe 4292 powershell.exe 2212 powershell.exe 2364 powershell.exe 2212 powershell.exe 2364 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exepowershell.exepowershell.exeWMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 3180 WMIC.exe Token: SeSecurityPrivilege 3180 WMIC.exe Token: SeTakeOwnershipPrivilege 3180 WMIC.exe Token: SeLoadDriverPrivilege 3180 WMIC.exe Token: SeSystemProfilePrivilege 3180 WMIC.exe Token: SeSystemtimePrivilege 3180 WMIC.exe Token: SeProfSingleProcessPrivilege 3180 WMIC.exe Token: SeIncBasePriorityPrivilege 3180 WMIC.exe Token: SeCreatePagefilePrivilege 3180 WMIC.exe Token: SeBackupPrivilege 3180 WMIC.exe Token: SeRestorePrivilege 3180 WMIC.exe Token: SeShutdownPrivilege 3180 WMIC.exe Token: SeDebugPrivilege 3180 WMIC.exe Token: SeSystemEnvironmentPrivilege 3180 WMIC.exe Token: SeRemoteShutdownPrivilege 3180 WMIC.exe Token: SeUndockPrivilege 3180 WMIC.exe Token: SeManageVolumePrivilege 3180 WMIC.exe Token: 33 3180 WMIC.exe Token: 34 3180 WMIC.exe Token: 35 3180 WMIC.exe Token: 36 3180 WMIC.exe Token: SeIncreaseQuotaPrivilege 3180 WMIC.exe Token: SeSecurityPrivilege 3180 WMIC.exe Token: SeTakeOwnershipPrivilege 3180 WMIC.exe Token: SeLoadDriverPrivilege 3180 WMIC.exe Token: SeSystemProfilePrivilege 3180 WMIC.exe Token: SeSystemtimePrivilege 3180 WMIC.exe Token: SeProfSingleProcessPrivilege 3180 WMIC.exe Token: SeIncBasePriorityPrivilege 3180 WMIC.exe Token: SeCreatePagefilePrivilege 3180 WMIC.exe Token: SeBackupPrivilege 3180 WMIC.exe Token: SeRestorePrivilege 3180 WMIC.exe Token: SeShutdownPrivilege 3180 WMIC.exe Token: SeDebugPrivilege 3180 WMIC.exe Token: SeSystemEnvironmentPrivilege 3180 WMIC.exe Token: SeRemoteShutdownPrivilege 3180 WMIC.exe Token: SeUndockPrivilege 3180 WMIC.exe Token: SeManageVolumePrivilege 3180 WMIC.exe Token: 33 3180 WMIC.exe Token: 34 3180 WMIC.exe Token: 35 3180 WMIC.exe Token: 36 3180 WMIC.exe Token: SeDebugPrivilege 2016 powershell.exe Token: SeDebugPrivilege 3168 powershell.exe Token: SeIncreaseQuotaPrivilege 1060 WMIC.exe Token: SeSecurityPrivilege 1060 WMIC.exe Token: SeTakeOwnershipPrivilege 1060 WMIC.exe Token: SeLoadDriverPrivilege 1060 WMIC.exe Token: SeSystemProfilePrivilege 1060 WMIC.exe Token: SeSystemtimePrivilege 1060 WMIC.exe Token: SeProfSingleProcessPrivilege 1060 WMIC.exe Token: SeIncBasePriorityPrivilege 1060 WMIC.exe Token: SeCreatePagefilePrivilege 1060 WMIC.exe Token: SeBackupPrivilege 1060 WMIC.exe Token: SeRestorePrivilege 1060 WMIC.exe Token: SeShutdownPrivilege 1060 WMIC.exe Token: SeDebugPrivilege 1060 WMIC.exe Token: SeSystemEnvironmentPrivilege 1060 WMIC.exe Token: SeRemoteShutdownPrivilege 1060 WMIC.exe Token: SeUndockPrivilege 1060 WMIC.exe Token: SeManageVolumePrivilege 1060 WMIC.exe Token: 33 1060 WMIC.exe Token: 34 1060 WMIC.exe Token: 35 1060 WMIC.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
svchost_dump_SCY - Copy.exesvchost.exesvchost.exedescription pid process target process PID 1944 wrote to memory of 3180 1944 svchost_dump_SCY - Copy.exe WMIC.exe PID 1944 wrote to memory of 3180 1944 svchost_dump_SCY - Copy.exe WMIC.exe PID 1944 wrote to memory of 3200 1944 svchost_dump_SCY - Copy.exe netsh.exe PID 1944 wrote to memory of 3200 1944 svchost_dump_SCY - Copy.exe netsh.exe PID 1944 wrote to memory of 3972 1944 svchost_dump_SCY - Copy.exe netsh.exe PID 1944 wrote to memory of 3972 1944 svchost_dump_SCY - Copy.exe netsh.exe PID 1944 wrote to memory of 2016 1944 svchost_dump_SCY - Copy.exe powershell.exe PID 1944 wrote to memory of 2016 1944 svchost_dump_SCY - Copy.exe powershell.exe PID 1944 wrote to memory of 3168 1944 svchost_dump_SCY - Copy.exe powershell.exe PID 1944 wrote to memory of 3168 1944 svchost_dump_SCY - Copy.exe powershell.exe PID 1944 wrote to memory of 8 1944 svchost_dump_SCY - Copy.exe schtasks.exe PID 1944 wrote to memory of 8 1944 svchost_dump_SCY - Copy.exe schtasks.exe PID 1944 wrote to memory of 4296 1944 svchost_dump_SCY - Copy.exe schtasks.exe PID 1944 wrote to memory of 4296 1944 svchost_dump_SCY - Copy.exe schtasks.exe PID 1944 wrote to memory of 1380 1944 svchost_dump_SCY - Copy.exe svchost.exe PID 1944 wrote to memory of 1380 1944 svchost_dump_SCY - Copy.exe svchost.exe PID 1380 wrote to memory of 1060 1380 svchost.exe WMIC.exe PID 1380 wrote to memory of 1060 1380 svchost.exe WMIC.exe PID 1380 wrote to memory of 332 1380 svchost.exe netsh.exe PID 1380 wrote to memory of 332 1380 svchost.exe netsh.exe PID 1380 wrote to memory of 1652 1380 svchost.exe netsh.exe PID 1380 wrote to memory of 1652 1380 svchost.exe netsh.exe PID 1380 wrote to memory of 4284 1380 svchost.exe powershell.exe PID 1380 wrote to memory of 4284 1380 svchost.exe powershell.exe PID 1380 wrote to memory of 4292 1380 svchost.exe powershell.exe PID 1380 wrote to memory of 4292 1380 svchost.exe powershell.exe PID 1380 wrote to memory of 4236 1380 svchost.exe ~tl5D73.tmp PID 1380 wrote to memory of 4236 1380 svchost.exe ~tl5D73.tmp PID 1124 wrote to memory of 3264 1124 svchost.exe WMIC.exe PID 1124 wrote to memory of 3264 1124 svchost.exe WMIC.exe PID 1124 wrote to memory of 3740 1124 svchost.exe netsh.exe PID 1124 wrote to memory of 3740 1124 svchost.exe netsh.exe PID 1124 wrote to memory of 2164 1124 svchost.exe netsh.exe PID 1124 wrote to memory of 2164 1124 svchost.exe netsh.exe PID 1124 wrote to memory of 2212 1124 svchost.exe powershell.exe PID 1124 wrote to memory of 2212 1124 svchost.exe powershell.exe PID 1124 wrote to memory of 2364 1124 svchost.exe powershell.exe PID 1124 wrote to memory of 2364 1124 svchost.exe powershell.exe PID 1124 wrote to memory of 4876 1124 svchost.exe ~tl3A76.tmp PID 1124 wrote to memory of 4876 1124 svchost.exe ~tl3A76.tmp -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\svchost_dump_SCY - Copy.exe"C:\Users\Admin\AppData\Local\Temp\svchost_dump_SCY - Copy.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /TN "Timer"2⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM2⤵
- Creates scheduled task(s)
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\~tl5D73.tmpC:\Users\Admin\AppData\Local\Temp\~tl5D73.tmp3⤵
- Executes dropped EXE
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName2⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\TEMP\~tl3A76.tmpC:\Windows\TEMP\~tl3A76.tmp2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD53284cb698efa6fb773dc0eebd30a3214
SHA1a1093d44f025e5ba9609e99a3fc5fce3723fd7f3
SHA25622f6a7c20c96be4775bec28c377d98d91a160fb5dd3158083e4365286161a2aa
SHA512af3ea3c69350087cd0e6768679ba7bdfff4c184b5bfe7abf9152aa161713c56c6dc86390543507580f9ae0a6103d26486dbe37330dbc78e172a966957ba43606
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD534e3230cb2131270db1af79fb3d57752
SHA121434dd7cf3c4624226b89f404fd7982825f8ac6
SHA2560f162f27548a84db1638bcf46d03661b5bcb3032e765fafdb597cc107639ba39
SHA5123756cb01e82dbda681b562eae74d0b8ef8b3787b126119a51a92c51a78204a7805b9bdd60c00c50a3be23b843e78bb153b656540767069f739ce421b9bc02335
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_w5swiflf.o4j.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\~tl5D73.tmpFilesize
385KB
MD5e802c96760e48c5139995ffb2d891f90
SHA1bba3d278c0eb1094a26e5d2f4c099ad685371578
SHA256cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c
SHA51297300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0
-
C:\Users\Admin\AppData\Roaming\tor\cached-microdesc-consensusFilesize
2.6MB
MD59bae03d3dc0f5cfd40507ee03ba5a765
SHA1bbb2ea791c2e53e615f7c4b17246b4d465e6a4fe
SHA256ff1af3cc0eff747f5425287eea2910d8d69cd9d30af5a90a41a03a023bb0313f
SHA5122263b74eefd835f92a085f1b35e156b79c37996b1976d6b93ad94cfce8454411131d4b3dc1d3d3cee175b37d05433f3061060023219d7d3da86e034e510b7b81
-
C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.newFilesize
8.2MB
MD55da0c8eff12049ac8906bd66fc1a18e2
SHA16ac3c5c73bbf8f53c30f376c0a7dc2d1a9d14353
SHA2566049f8ab14c6079aed8af1e03a356ab7faa31deecce7f86b42a8b57e08329d00
SHA512549c7eaaa5b9cabee59e023967ffa25aad69b91d471ddc5606905ed38b65e27c855b0990b9fcb20392e44b0f5392dbc7d7555cf331d92702e98949af620889b1
-
C:\Windows\System32\config\systemprofile\AppData\Roaming\tor\cached-microdescs.newFilesize
6.3MB
MD53e6ce4eeacdb569ea1a6935ac5e482dc
SHA17f211e26294fb8e3159844346af9227f36882ddf
SHA256cad86b30af60993e71ca71eaa90fb8ce192d5769cc0508bac821801706f681ec
SHA512cd55e8e84b43187e0d7f2da92afadf32049a998d0275e082d5b179ea9b75a3e8431ac946cb9b6ebf59f87dcfe57b7536ddae7e736460caacd63e57aaa783e952
-
C:\Windows\System\svchost.exeFilesize
5.2MB
MD55fd3d21a968f4b8a1577b5405ab1c36a
SHA1710e5ab0fceb71b982b966c3a7406ebdf1d2aa82
SHA2567ac7b42889e14cbd8c7cebe692566ca045d0034f9ff103fc3ef9c5e035dc594f
SHA512085a31c0412ba0a3d612a66ec8d95ce900e148240f92f9ec8c4d07b6c8e32cf233e92aefc7b4b53a91f5eacacd1cf3a8fcdf8cd7c206afa46014a9e4a9ddf53f
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
4KB
MD5dbbd2d4458d7e8094846420da595dfc3
SHA1267cb47b904f14a519d2bd73abfdb30e1a06e1a6
SHA256e27390d57580e3dfba07bec3d8e430203bbc91e90f6937079b3fd52abc721bd4
SHA512480e7ca865b811f79f35fcfe7a9ac0280b48d1f9459873d18f000db55c72d53345cf3a10075c1ac407439545f699ce2a7bef38b00b4e19439edf384b00045531
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5f2dd68ab8e611f0143c6ad176f223ae9
SHA130f580175773f251a9572fe757de6eaef6844abc
SHA256f935809085e90f8fc2c003afb46e81de28f3312ec097cf46f2bdc2488cb893e7
SHA512f664b850c2fc6773e48171be5c180d8bc5c3a27945f5e6604605006a3c93e0bf3a516b647d6411a4d6b75bdf0a5e15b4f3621bf5702bbc3c46f9b517cb69dd04
-
memory/1124-130-0x0000000140000000-0x0000000140636000-memory.dmpFilesize
6.2MB
-
memory/1124-133-0x0000000140000000-0x0000000140636000-memory.dmpFilesize
6.2MB
-
memory/1124-189-0x000000002BCA0000-0x000000002C182000-memory.dmpFilesize
4.9MB
-
memory/1124-250-0x0000000140000000-0x0000000140636000-memory.dmpFilesize
6.2MB
-
memory/1380-42-0x0000000140000000-0x0000000140636000-memory.dmpFilesize
6.2MB
-
memory/1380-55-0x0000000140000000-0x0000000140636000-memory.dmpFilesize
6.2MB
-
memory/1380-127-0x0000000140000000-0x0000000140636000-memory.dmpFilesize
6.2MB
-
memory/1380-74-0x0000000031C90000-0x0000000032172000-memory.dmpFilesize
4.9MB
-
memory/1944-0-0x0000000140000000-0x0000000140636000-memory.dmpFilesize
6.2MB
-
memory/1944-43-0x0000000140000000-0x0000000140636000-memory.dmpFilesize
6.2MB
-
memory/1944-24-0x0000000140000000-0x0000000140636000-memory.dmpFilesize
6.2MB
-
memory/2016-33-0x00007FF8507D0000-0x00007FF851292000-memory.dmpFilesize
10.8MB
-
memory/2016-11-0x00000216A87F0000-0x00000216A8800000-memory.dmpFilesize
64KB
-
memory/2016-22-0x00000216A87F0000-0x00000216A8800000-memory.dmpFilesize
64KB
-
memory/2016-7-0x00000216A8900000-0x00000216A8922000-memory.dmpFilesize
136KB
-
memory/2016-10-0x00007FF8507D0000-0x00007FF851292000-memory.dmpFilesize
10.8MB
-
memory/2016-25-0x00000216A87F0000-0x00000216A8800000-memory.dmpFilesize
64KB
-
memory/2016-26-0x00000216A87F0000-0x00000216A8800000-memory.dmpFilesize
64KB
-
memory/2212-177-0x0000021AD5F40000-0x0000021AD5F5A000-memory.dmpFilesize
104KB
-
memory/2212-153-0x0000021ABD320000-0x0000021ABD330000-memory.dmpFilesize
64KB
-
memory/2212-178-0x0000021AD5EF0000-0x0000021AD5EF8000-memory.dmpFilesize
32KB
-
memory/2212-179-0x0000021AD5F20000-0x0000021AD5F26000-memory.dmpFilesize
24KB
-
memory/2212-164-0x0000021AD5CD0000-0x0000021AD5D83000-memory.dmpFilesize
716KB
-
memory/2212-188-0x00007FF850FE0000-0x00007FF851AA2000-memory.dmpFilesize
10.8MB
-
memory/2212-181-0x0000021ABD320000-0x0000021ABD330000-memory.dmpFilesize
64KB
-
memory/2212-163-0x00007FF430020000-0x00007FF430030000-memory.dmpFilesize
64KB
-
memory/2212-162-0x0000021AD5CB0000-0x0000021AD5CCC000-memory.dmpFilesize
112KB
-
memory/2212-131-0x00007FF850FE0000-0x00007FF851AA2000-memory.dmpFilesize
10.8MB
-
memory/2212-132-0x0000021ABD320000-0x0000021ABD330000-memory.dmpFilesize
64KB
-
memory/2364-176-0x0000026077480000-0x000002607748A000-memory.dmpFilesize
40KB
-
memory/2364-134-0x00007FF850FE0000-0x00007FF851AA2000-memory.dmpFilesize
10.8MB
-
memory/2364-135-0x0000026076D70000-0x0000026076D80000-memory.dmpFilesize
64KB
-
memory/2364-174-0x00007FF48EF60000-0x00007FF48EF70000-memory.dmpFilesize
64KB
-
memory/2364-152-0x0000026076D70000-0x0000026076D80000-memory.dmpFilesize
64KB
-
memory/2364-187-0x00007FF850FE0000-0x00007FF851AA2000-memory.dmpFilesize
10.8MB
-
memory/2364-175-0x00000260774A0000-0x00000260774BC000-memory.dmpFilesize
112KB
-
memory/2364-180-0x00000260774D0000-0x00000260774DA000-memory.dmpFilesize
40KB
-
memory/2364-173-0x0000026077320000-0x000002607732A000-memory.dmpFilesize
40KB
-
memory/3168-23-0x000002981DA80000-0x000002981DA90000-memory.dmpFilesize
64KB
-
memory/3168-29-0x00007FF8507D0000-0x00007FF851292000-memory.dmpFilesize
10.8MB
-
memory/3168-21-0x000002981DA80000-0x000002981DA90000-memory.dmpFilesize
64KB
-
memory/3168-20-0x00007FF8507D0000-0x00007FF851292000-memory.dmpFilesize
10.8MB
-
memory/4236-125-0x0000000140000000-0x000000014015E400-memory.dmpFilesize
1.4MB
-
memory/4236-128-0x0000000140000000-0x000000014015E400-memory.dmpFilesize
1.4MB
-
memory/4284-46-0x000001DA1AB30000-0x000001DA1AB40000-memory.dmpFilesize
64KB
-
memory/4284-44-0x00007FF850640000-0x00007FF851102000-memory.dmpFilesize
10.8MB
-
memory/4284-72-0x00007FF850640000-0x00007FF851102000-memory.dmpFilesize
10.8MB
-
memory/4284-45-0x000001DA1AB30000-0x000001DA1AB40000-memory.dmpFilesize
64KB
-
memory/4292-67-0x0000023B6D5A0000-0x0000023B6D5B0000-memory.dmpFilesize
64KB
-
memory/4292-56-0x00007FF850640000-0x00007FF851102000-memory.dmpFilesize
10.8MB
-
memory/4292-57-0x0000023B6D5A0000-0x0000023B6D5B0000-memory.dmpFilesize
64KB
-
memory/4292-68-0x0000023B6D5A0000-0x0000023B6D5B0000-memory.dmpFilesize
64KB
-
memory/4292-73-0x00007FF850640000-0x00007FF851102000-memory.dmpFilesize
10.8MB