Resubmissions

12-04-2024 14:13

240412-rjrz5aba72 8

12-04-2024 14:12

240412-rh8aqaba68 7

12-04-2024 14:05

240412-rd9mzsea7x 8

12-04-2024 14:05

240412-rd82fsea7v 8

12-04-2024 14:05

240412-rd8exsea7t 8

09-04-2024 07:05

240409-hws9aacd6z 8

09-04-2024 07:05

240409-hwljfacd6x 8

09-04-2024 07:04

240409-hwbz1acd6t 8

09-04-2024 07:03

240409-hvcvxacd3y 8

15-01-2024 20:15

240115-y1q8gsfdf2 7

Analysis

  • max time kernel
    1800s
  • max time network
    1805s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09-04-2024 07:05

General

  • Target

    tmp.exe

  • Size

    9.4MB

  • MD5

    db3edf03a8a2c8e96fe2d2deaaec76ff

  • SHA1

    2d9c9f3a5d06f11c5c881a9df90ba33cc2894ac1

  • SHA256

    a40cac0b6ee1729cdb6fca3c950e533b913c2729afbd2fde045e86cc62c0ff60

  • SHA512

    121b6ba2c7a91a8639b4b88d9965528df245534ec65c4f1d463dbcc3aa2719debb4417a1a7d919527155097cc00521576b25b2d061b149d0c8b82ca999054135

  • SSDEEP

    98304:kT2OhoLUWeKqyubAguIYylB9RK0RU4lFp887VO0J/yLaeWwGvJldmxe:VOE/IYypvU4loRpK

Score
8/10

Malware Config

Signatures

  • Contacts a large (1181) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Windows Firewall 2 TTPs 22 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 20 IoCs
  • Drops file in System32 directory 39 IoCs
  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2760
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2408
    • C:\Windows\system32\schtasks.exe
      schtasks /delete /TN "Timer"
      2⤵
        PID:2696
      • C:\Windows\system32\schtasks.exe
        schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
        2⤵
        • Creates scheduled task(s)
        PID:1080
      • C:\Windows\System\svchost.exe
        "C:\Windows\System\svchost.exe" formal
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1976
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3052
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2996
        • C:\Users\Admin\AppData\Local\Temp\~tlFA34.tmp
          C:\Users\Admin\AppData\Local\Temp\~tlFA34.tmp
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:868
          • C:\Windows\system32\netsh.exe
            netsh int ipv4 set dynamicport tcp start=1025 num=64511
            4⤵
              PID:2600
            • C:\Windows\System32\netsh.exe
              "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
              4⤵
              • Modifies Windows Firewall
              PID:2496
            • C:\Windows\System32\netsh.exe
              "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
              4⤵
              • Modifies Windows Firewall
              PID:1092
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1884
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2744
            • C:\Windows\system32\schtasks.exe
              schtasks /delete /TN "Timer"
              4⤵
                PID:912
              • C:\Windows\system32\schtasks.exe
                schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
                4⤵
                • Creates scheduled task(s)
                PID:2988
              • C:\Windows\System\svchost.exe
                "C:\Windows\System\svchost.exe" formal
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Windows directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:3064
                • C:\Windows\system32\netsh.exe
                  netsh int ipv4 set dynamicport tcp start=1025 num=64511
                  5⤵
                    PID:1824
                  • C:\Windows\System32\netsh.exe
                    "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                    5⤵
                    • Modifies Windows Firewall
                    PID:2368
                  • C:\Windows\System32\netsh.exe
                    "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                    5⤵
                    • Modifies Windows Firewall
                    PID:2288
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                    5⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2264
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                    5⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2100
                  • C:\Users\Admin\AppData\Local\Temp\~tlDA1A.tmp
                    C:\Users\Admin\AppData\Local\Temp\~tlDA1A.tmp
                    5⤵
                    • Executes dropped EXE
                    • Modifies system certificate store
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2544
                    • C:\Windows\system32\netsh.exe
                      netsh int ipv4 set dynamicport tcp start=1025 num=64511
                      6⤵
                        PID:1984
                      • C:\Windows\System32\netsh.exe
                        "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                        6⤵
                        • Modifies Windows Firewall
                        PID:2068
                      • C:\Windows\System32\netsh.exe
                        "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                        6⤵
                        • Modifies Windows Firewall
                        PID:2176
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                        6⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:240
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                        6⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:948
            • C:\Windows\system32\taskeng.exe
              taskeng.exe {0E25D836-BCC5-4836-91D8-B094B15E3EEE} S-1-5-18:NT AUTHORITY\System:Service:
              1⤵
              • Loads dropped DLL
              PID:1944
              • \??\c:\windows\system\svchost.exe
                c:\windows\system\svchost.exe
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Drops file in Windows directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                PID:2104
                • C:\Windows\system32\netsh.exe
                  netsh int ipv4 set dynamicport tcp start=1025 num=64511
                  3⤵
                  • Modifies data under HKEY_USERS
                  PID:2044
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  3⤵
                  • Modifies Windows Firewall
                  • Modifies data under HKEY_USERS
                  PID:1764
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  3⤵
                  • Modifies Windows Firewall
                  • Modifies data under HKEY_USERS
                  PID:2680
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                  3⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:700
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                  3⤵
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2000
                • C:\Windows\TEMP\~tl2849.tmp
                  C:\Windows\TEMP\~tl2849.tmp
                  3⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:876
                  • C:\Windows\system32\netsh.exe
                    netsh int ipv4 set dynamicport tcp start=1025 num=64511
                    4⤵
                      PID:340
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      4⤵
                      • Modifies Windows Firewall
                      PID:2608
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      4⤵
                      • Modifies Windows Firewall
                      PID:2772
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                      4⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1348
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                      4⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2904
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {070CB1C9-FCDA-4A23-874E-6340EAF4C01B} S-1-5-18:NT AUTHORITY\System:Service:
                1⤵
                • Loads dropped DLL
                PID:880
                • \??\c:\windows\system\svchost.exe
                  c:\windows\system\svchost.exe
                  2⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Drops file in Windows directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:292
                  • C:\Windows\system32\netsh.exe
                    netsh int ipv4 set dynamicport tcp start=1025 num=64511
                    3⤵
                    • Modifies data under HKEY_USERS
                    PID:1308
                  • C:\Windows\System32\netsh.exe
                    "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                    3⤵
                    • Modifies Windows Firewall
                    • Modifies data under HKEY_USERS
                    PID:2668
                  • C:\Windows\System32\netsh.exe
                    "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                    3⤵
                    • Modifies Windows Firewall
                    PID:1536
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                    3⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1352
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                    3⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1764
                  • C:\Windows\TEMP\~tl7D1C.tmp
                    C:\Windows\TEMP\~tl7D1C.tmp
                    3⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    PID:980
                    • C:\Windows\system32\netsh.exe
                      netsh int ipv4 set dynamicport tcp start=1025 num=64511
                      4⤵
                      • Modifies data under HKEY_USERS
                      PID:2396
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      4⤵
                      • Modifies Windows Firewall
                      PID:2856
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      4⤵
                      • Modifies Windows Firewall
                      • Modifies data under HKEY_USERS
                      PID:2656
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                      4⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:436
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                      4⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2568
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {F200F5C0-D00F-4BC8-AF25-048F879BF06E} S-1-5-18:NT AUTHORITY\System:Service:
                1⤵
                • Loads dropped DLL
                PID:1296
                • \??\c:\windows\system\svchost.exe
                  c:\windows\system\svchost.exe
                  2⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Drops file in Windows directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1560
                  • C:\Windows\system32\netsh.exe
                    netsh int ipv4 set dynamicport tcp start=1025 num=64511
                    3⤵
                      PID:772
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      3⤵
                      • Modifies Windows Firewall
                      • Modifies data under HKEY_USERS
                      PID:2792
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      3⤵
                      • Modifies Windows Firewall
                      PID:2212
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                      3⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1196
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                      3⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2776
                    • C:\Windows\TEMP\~tlDEEA.tmp
                      C:\Windows\TEMP\~tlDEEA.tmp
                      3⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2040
                      • C:\Windows\system32\netsh.exe
                        netsh int ipv4 set dynamicport tcp start=1025 num=64511
                        4⤵
                          PID:1992
                        • C:\Windows\System32\netsh.exe
                          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                          4⤵
                          • Modifies Windows Firewall
                          • Modifies data under HKEY_USERS
                          PID:3032
                        • C:\Windows\System32\netsh.exe
                          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                          4⤵
                          • Modifies Windows Firewall
                          PID:2236
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                          4⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2516
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                          4⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2096
                  • C:\Windows\system32\taskeng.exe
                    taskeng.exe {0FC8BD48-801F-4A83-98EF-B9A6301E6FFD} S-1-5-18:NT AUTHORITY\System:Service:
                    1⤵
                    • Loads dropped DLL
                    PID:2028
                    • \??\c:\windows\system\svchost.exe
                      c:\windows\system\svchost.exe
                      2⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • Drops file in Windows directory
                      • Modifies data under HKEY_USERS
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2188
                      • C:\Windows\system32\netsh.exe
                        netsh int ipv4 set dynamicport tcp start=1025 num=64511
                        3⤵
                        • Modifies data under HKEY_USERS
                        PID:2456
                      • C:\Windows\System32\netsh.exe
                        "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                        3⤵
                        • Modifies Windows Firewall
                        PID:2548
                      • C:\Windows\System32\netsh.exe
                        "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                        3⤵
                        • Modifies Windows Firewall
                        PID:2580
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                        3⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2608
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                        3⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2704
                      • C:\Windows\TEMP\~tl4396.tmp
                        C:\Windows\TEMP\~tl4396.tmp
                        3⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2516
                        • C:\Windows\system32\netsh.exe
                          netsh int ipv4 set dynamicport tcp start=1025 num=64511
                          4⤵
                            PID:2760
                          • C:\Windows\System32\netsh.exe
                            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                            4⤵
                            • Modifies Windows Firewall
                            • Modifies data under HKEY_USERS
                            PID:2372
                          • C:\Windows\System32\netsh.exe
                            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                            4⤵
                            • Modifies Windows Firewall
                            PID:2828
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                            4⤵
                            • Drops file in System32 directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2972
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                            4⤵
                            • Drops file in System32 directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:904

                    Network

                    MITRE ATT&CK Matrix ATT&CK v13

                    Execution

                    Scheduled Task/Job

                    1
                    T1053

                    Persistence

                    Create or Modify System Process

                    1
                    T1543

                    Windows Service

                    1
                    T1543.003

                    Scheduled Task/Job

                    1
                    T1053

                    Privilege Escalation

                    Create or Modify System Process

                    1
                    T1543

                    Windows Service

                    1
                    T1543.003

                    Scheduled Task/Job

                    1
                    T1053

                    Defense Evasion

                    Impair Defenses

                    1
                    T1562

                    Disable or Modify System Firewall

                    1
                    T1562.004

                    Subvert Trust Controls

                    1
                    T1553

                    Install Root Certificate

                    1
                    T1553.004

                    Modify Registry

                    1
                    T1112

                    Discovery

                    Network Service Discovery

                    1
                    T1046

                    System Information Discovery

                    1
                    T1082

                    Query Registry

                    1
                    T1012

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                      Filesize

                      68KB

                      MD5

                      29f65ba8e88c063813cc50a4ea544e93

                      SHA1

                      05a7040d5c127e68c25d81cc51271ffb8bef3568

                      SHA256

                      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                      SHA512

                      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                      Filesize

                      344B

                      MD5

                      a263a03d5ab8e7138fb30d9dbb09dc93

                      SHA1

                      1bba3831e13049225205b6ea9821cf153f8c75e6

                      SHA256

                      38395752fe80f6f42fb4c991e6534f4636a50fdfdb77a34b31e0fcef38df6d7c

                      SHA512

                      60d232f3caefa5163d11a64808555310a65f417ae1ee6fa8615737ff367ebc24270f7dc6ae49043e597466cd5eee2cf96a79da42b1a586aab2f919a8c32c3763

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                      Filesize

                      344B

                      MD5

                      3bf321a36fa0f0002aed694d1e195625

                      SHA1

                      d48e1e20f1c7f9819490d199fcf9023ec1d02438

                      SHA256

                      ad44cc12fc479403bc1adb1e7324ceebc3841e02313a93d4d540c6e646435cb8

                      SHA512

                      fe0a6443b3651f1213b18aa30aa71983b1d50e455a6d2b1680cc013ab937d09fe030140a24f434e04dba507065fc0fb3406ebc42484692821c90beded331123d

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                      Filesize

                      344B

                      MD5

                      41582c89d4cd066a6140bdb839daac97

                      SHA1

                      758769c10f77e73a4e0b30610757fa020017e2a7

                      SHA256

                      b8ce7b4cad3a93f06ac242ddde356e00261614b185e4edc009b07a729172b6b9

                      SHA512

                      062f0467886176c611f7d56fe35837a1c62ccdb47f75b147930fae76aff7a982a2e4b967f0c23b96084f1b24ce734c21b69da7c1c061f59c8f204142514f02c1

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                      Filesize

                      344B

                      MD5

                      0ee58e77690ee14d598005ee556bf766

                      SHA1

                      2221d296e3be26871cb6e8ca23bf1ecf698695dd

                      SHA256

                      a911cc32a399226932958e5edb8d0b574d3270d164f703bdcd9d755703729dac

                      SHA512

                      fe08f5590197ca4148e3782f6420dae3be819eb87aa8bff5ac66953deea970a86aaa90e75d12b969cb6750033603895ed87b07eb5eba1309b10daf27fcc6016d

                    • C:\Users\Admin\AppData\Local\Temp\TarF686.tmp
                      Filesize

                      177KB

                      MD5

                      435a9ac180383f9fa094131b173a2f7b

                      SHA1

                      76944ea657a9db94f9a4bef38f88c46ed4166983

                      SHA256

                      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                      SHA512

                      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
                      Filesize

                      7KB

                      MD5

                      dba794ecebf190390f0fbd3fc5a85292

                      SHA1

                      1838ef678a52c7c508baaf77c94385c1482f9a1d

                      SHA256

                      10f7a9a6d46a89d5c09990f27daeae4acca8f6b15eca3899791b5d75f54e6a25

                      SHA512

                      89feaad166adcc8af4a6093df1176480844c10921d579dd5afe632f60ab68be5401b07389d19c3d373639fd7bdc3647553d227bf1acc9df92f7e6e001ffc186f

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\H6TDJCB6L3POM9E6U20Y.temp
                      Filesize

                      7KB

                      MD5

                      c179b5f59357a37681e177cb9e084448

                      SHA1

                      b031b43f49095eea43266eb314aec0437c7191cf

                      SHA256

                      9868876ae0e8f3ad9f78c4805614b20455707164464daa6c9147b1166b979771

                      SHA512

                      ad95a125535dace75f5bcd954385cfac3479ac4441686e470c4b7da76396f5384f950fe732c27503387a8b4c0cb1fd148b73e7967e37b745336f6f2ea1ca7d45

                    • C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\output1[1].jpg
                      Filesize

                      393KB

                      MD5

                      72e28e2092a43e0d70289f62bec20e65

                      SHA1

                      944f2b81392ee946f4767376882c5c1bda6dddb5

                      SHA256

                      6ec8fe67dc01d8c3de9cfc94ca49ae25e46ed61f5a48f1a956ef269efa4ae08f

                      SHA512

                      31c0587cd1df4d63088973d72a015b144b64411031ac4c1904c54c4f43b5990b8016cc6d29e3b0238f86432005588c72b98806306918fdaf2786498de340e466

                    • \??\PIPE\srvsvc
                      MD5

                      d41d8cd98f00b204e9800998ecf8427e

                      SHA1

                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                      SHA256

                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                      SHA512

                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                    • \Users\Admin\AppData\Local\Temp\~tlDA1A.tmp
                      Filesize

                      393KB

                      MD5

                      9dbdd43a2e0b032604943c252eaf634a

                      SHA1

                      9584dc66f3c1cce4210fdf827a1b4e2bb22263af

                      SHA256

                      33c53cd5265502e7b62432dba0e1b5ed702b5007cc79973ccd1e71b2acc01e86

                      SHA512

                      b7b20b06dac952a96eda254bad29966fe7a4f827912beb0bc66d5af5b302d7c0282d70c1b01ff782507dd03a1d58706f05cb157521c7f2887a43085ffe5f94d1

                    • \Users\Admin\AppData\Local\Temp\~tlFA34.tmp
                      Filesize

                      385KB

                      MD5

                      e802c96760e48c5139995ffb2d891f90

                      SHA1

                      bba3d278c0eb1094a26e5d2f4c099ad685371578

                      SHA256

                      cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c

                      SHA512

                      97300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0

                    • \Windows\system\svchost.exe
                      Filesize

                      9.4MB

                      MD5

                      db3edf03a8a2c8e96fe2d2deaaec76ff

                      SHA1

                      2d9c9f3a5d06f11c5c881a9df90ba33cc2894ac1

                      SHA256

                      a40cac0b6ee1729cdb6fca3c950e533b913c2729afbd2fde045e86cc62c0ff60

                      SHA512

                      121b6ba2c7a91a8639b4b88d9965528df245534ec65c4f1d463dbcc3aa2719debb4417a1a7d919527155097cc00521576b25b2d061b149d0c8b82ca999054135

                    • memory/868-456-0x0000000140000000-0x000000014015E400-memory.dmp
                      Filesize

                      1.4MB

                    • memory/868-457-0x0000000140000000-0x000000014015E400-memory.dmp
                      Filesize

                      1.4MB

                    • memory/868-469-0x0000000140000000-0x000000014015E400-memory.dmp
                      Filesize

                      1.4MB

                    • memory/868-508-0x0000000140000000-0x000000014015E400-memory.dmp
                      Filesize

                      1.4MB

                    • memory/876-786-0x0000000140000000-0x0000000140170400-memory.dmp
                      Filesize

                      1.4MB

                    • memory/876-770-0x0000000140000000-0x0000000140170400-memory.dmp
                      Filesize

                      1.4MB

                    • memory/1884-479-0x0000000002910000-0x0000000002990000-memory.dmp
                      Filesize

                      512KB

                    • memory/1884-477-0x0000000002910000-0x0000000002990000-memory.dmp
                      Filesize

                      512KB

                    • memory/1884-480-0x0000000002910000-0x0000000002990000-memory.dmp
                      Filesize

                      512KB

                    • memory/1884-481-0x0000000002910000-0x0000000002990000-memory.dmp
                      Filesize

                      512KB

                    • memory/1884-490-0x000007FEF59E0000-0x000007FEF637D000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/1884-478-0x000007FEF59E0000-0x000007FEF637D000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/1884-476-0x000007FEF59E0000-0x000007FEF637D000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/1884-475-0x0000000002410000-0x0000000002418000-memory.dmp
                      Filesize

                      32KB

                    • memory/1976-43-0x0000000140000000-0x0000000140A64400-memory.dmp
                      Filesize

                      10.4MB

                    • memory/1976-48-0x0000000140000000-0x0000000140A64400-memory.dmp
                      Filesize

                      10.4MB

                    • memory/1976-468-0x0000000140000000-0x0000000140A64400-memory.dmp
                      Filesize

                      10.4MB

                    • memory/1976-45-0x0000000140000000-0x0000000140A64400-memory.dmp
                      Filesize

                      10.4MB

                    • memory/1976-74-0x0000000180000000-0x000000018070E000-memory.dmp
                      Filesize

                      7.1MB

                    • memory/2100-526-0x0000000002480000-0x0000000002500000-memory.dmp
                      Filesize

                      512KB

                    • memory/2100-528-0x0000000002484000-0x0000000002487000-memory.dmp
                      Filesize

                      12KB

                    • memory/2100-529-0x000007FEF58F0000-0x000007FEF628D000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/2100-525-0x000007FEF58F0000-0x000007FEF628D000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/2104-766-0x0000000140000000-0x000000014015E400-memory.dmp
                      Filesize

                      1.4MB

                    • memory/2104-636-0x0000000140000000-0x000000014015E400-memory.dmp
                      Filesize

                      1.4MB

                    • memory/2172-0-0x0000000140000000-0x0000000140A64400-memory.dmp
                      Filesize

                      10.4MB

                    • memory/2172-2-0x0000000140000000-0x0000000140A64400-memory.dmp
                      Filesize

                      10.4MB

                    • memory/2172-1-0x0000000140000000-0x0000000140A64400-memory.dmp
                      Filesize

                      10.4MB

                    • memory/2172-4-0x0000000140000000-0x0000000140A64400-memory.dmp
                      Filesize

                      10.4MB

                    • memory/2172-12-0x0000000140000000-0x0000000140A64400-memory.dmp
                      Filesize

                      10.4MB

                    • memory/2172-46-0x0000000140000000-0x0000000140A64400-memory.dmp
                      Filesize

                      10.4MB

                    • memory/2172-3-0x0000000140000000-0x0000000140A64400-memory.dmp
                      Filesize

                      10.4MB

                    • memory/2264-523-0x0000000002B40000-0x0000000002BC0000-memory.dmp
                      Filesize

                      512KB

                    • memory/2264-524-0x000007FEF58F0000-0x000007FEF628D000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/2264-522-0x000007FEF58F0000-0x000007FEF628D000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/2264-517-0x0000000001FA0000-0x0000000001FA8000-memory.dmp
                      Filesize

                      32KB

                    • memory/2264-516-0x000000001B340000-0x000000001B622000-memory.dmp
                      Filesize

                      2.9MB

                    • memory/2264-527-0x0000000002B44000-0x0000000002B47000-memory.dmp
                      Filesize

                      12KB

                    • memory/2408-31-0x000007FEF5F50000-0x000007FEF68ED000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/2408-30-0x0000000002450000-0x00000000024D0000-memory.dmp
                      Filesize

                      512KB

                    • memory/2408-27-0x000007FEF5F50000-0x000007FEF68ED000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/2408-28-0x0000000002450000-0x00000000024D0000-memory.dmp
                      Filesize

                      512KB

                    • memory/2408-29-0x0000000002450000-0x00000000024D0000-memory.dmp
                      Filesize

                      512KB

                    • memory/2408-26-0x0000000002450000-0x00000000024D0000-memory.dmp
                      Filesize

                      512KB

                    • memory/2408-25-0x000007FEF5F50000-0x000007FEF68ED000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/2544-575-0x0000000140000000-0x0000000140170400-memory.dmp
                      Filesize

                      1.4MB

                    • memory/2544-548-0x0000000140000000-0x0000000140170400-memory.dmp
                      Filesize

                      1.4MB

                    • memory/2744-488-0x0000000002710000-0x0000000002790000-memory.dmp
                      Filesize

                      512KB

                    • memory/2744-491-0x0000000002710000-0x0000000002790000-memory.dmp
                      Filesize

                      512KB

                    • memory/2744-487-0x000007FEF59E0000-0x000007FEF637D000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/2744-492-0x000007FEF59E0000-0x000007FEF637D000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/2744-489-0x000007FEF59E0000-0x000007FEF637D000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/2760-16-0x0000000002590000-0x0000000002610000-memory.dmp
                      Filesize

                      512KB

                    • memory/2760-13-0x000007FEF5F50000-0x000007FEF68ED000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/2760-10-0x000000001B350000-0x000000001B632000-memory.dmp
                      Filesize

                      2.9MB

                    • memory/2760-15-0x0000000002590000-0x0000000002610000-memory.dmp
                      Filesize

                      512KB

                    • memory/2760-11-0x0000000002460000-0x0000000002468000-memory.dmp
                      Filesize

                      32KB

                    • memory/2760-17-0x000007FEF5F50000-0x000007FEF68ED000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/2760-18-0x0000000002590000-0x0000000002610000-memory.dmp
                      Filesize

                      512KB

                    • memory/2760-20-0x000007FEF5F50000-0x000007FEF68ED000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/2760-14-0x0000000002590000-0x0000000002610000-memory.dmp
                      Filesize

                      512KB

                    • memory/2996-71-0x00000000023C0000-0x0000000002440000-memory.dmp
                      Filesize

                      512KB

                    • memory/2996-69-0x000007FEF55B0000-0x000007FEF5F4D000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/2996-67-0x000007FEF55B0000-0x000007FEF5F4D000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/2996-68-0x00000000023C0000-0x0000000002440000-memory.dmp
                      Filesize

                      512KB

                    • memory/2996-73-0x000007FEF55B0000-0x000007FEF5F4D000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/2996-72-0x00000000023C0000-0x0000000002440000-memory.dmp
                      Filesize

                      512KB

                    • memory/3052-56-0x000007FEF55B0000-0x000007FEF5F4D000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/3052-59-0x0000000002930000-0x00000000029B0000-memory.dmp
                      Filesize

                      512KB

                    • memory/3052-54-0x000000001B3A0000-0x000000001B682000-memory.dmp
                      Filesize

                      2.9MB

                    • memory/3052-70-0x000007FEF55B0000-0x000007FEF5F4D000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/3052-57-0x0000000002930000-0x00000000029B0000-memory.dmp
                      Filesize

                      512KB

                    • memory/3052-55-0x0000000002220000-0x0000000002228000-memory.dmp
                      Filesize

                      32KB

                    • memory/3052-58-0x000007FEF55B0000-0x000007FEF5F4D000-memory.dmp
                      Filesize

                      9.6MB

                    • memory/3052-60-0x0000000002930000-0x00000000029B0000-memory.dmp
                      Filesize

                      512KB

                    • memory/3064-544-0x0000000140000000-0x000000014015E400-memory.dmp
                      Filesize

                      1.4MB

                    • memory/3064-507-0x0000000140000000-0x000000014015E400-memory.dmp
                      Filesize

                      1.4MB

                    • memory/3064-506-0x0000000140000000-0x000000014015E400-memory.dmp
                      Filesize

                      1.4MB

                    • memory/3064-509-0x0000000140000000-0x000000014015E400-memory.dmp
                      Filesize

                      1.4MB