Resubmissions
11/04/2024, 06:38
240411-hd63esha9z 811/04/2024, 06:37
240411-hdp4xaha9x 811/04/2024, 06:37
240411-hdlrgsha9w 811/04/2024, 06:37
240411-hdk5ysha9t 811/04/2024, 06:37
240411-hdkjesha9s 807/04/2024, 08:23
240407-kabhfsgg71 807/04/2024, 08:23
240407-j97t9shc64 807/04/2024, 08:22
240407-j93wbagg7w 807/04/2024, 08:22
240407-j9yatsgg7s 7Analysis
-
max time kernel
1199s -
max time network
1201s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
11/04/2024, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
tmp.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
tmp.exe
Resource
win11-20240319-en
General
-
Target
tmp.exe
-
Size
5.3MB
-
MD5
5fe4ea367cee11e92ad4644d8ac3cef7
-
SHA1
44faea4a352b7860a9eafca82bd3c9b054b6db29
-
SHA256
1a69f2fcfe5b35bf44ea42a1efe89f18f6b0d522cbbea5c51bae93aff7d3188b
-
SHA512
1c4499eadaf44847a7a001c2622e558bc130c9ad608b4ec977480e002cf50c9eb36a65974b86a2db69e9bc43e7d239122389a6cf1ca2849c59bc137441fb0a4f
-
SSDEEP
98304:lgU5484Bq1qdguoOzv4I3KOn6Ka1uFof9Hn6sdw5yOc4:iU54mqL9zvH3qO
Malware Config
Signatures
-
Contacts a large (741) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall 2 TTPs 14 IoCs
pid Process 624 netsh.exe 4788 netsh.exe 3116 netsh.exe 2584 netsh.exe 4540 netsh.exe 1076 netsh.exe 2396 netsh.exe 4368 netsh.exe 3100 netsh.exe 4612 netsh.exe 4176 netsh.exe 3396 netsh.exe 696 netsh.exe 5068 netsh.exe -
Executes dropped EXE 8 IoCs
pid Process 3300 svchost.exe 2428 ~tl3421.tmp 5092 svchost.exe 4584 ~tl1B2.tmp 2764 svchost.exe 4236 ~tlEB2E.tmp 1220 svchost.exe 3784 ~tl59E8.tmp -
Drops file in System32 directory 19 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat ~tlEB2E.tmp File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[1].htm svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat ~tl59E8.tmp File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[1].htm svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\output1[1].jpg svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[1].htm ~tl59E8.tmp File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[1].htm ~tlEB2E.tmp File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\output1[1].jpg svchost.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak tmp.exe File created C:\Windows\System\svchost.exe tmp.exe File opened for modification C:\Windows\System\svchost.exe tmp.exe File created C:\Windows\System\xxx1.bak svchost.exe File opened for modification C:\Windows\System\svchost.exe ~tl3421.tmp File created C:\Windows\System\xxx1.bak ~tl3421.tmp File created C:\Windows\System\xxx1.bak svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4672 schtasks.exe 1016 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM netsh.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" ~tl59E8.tmp Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace\Session netsh.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace\Session netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix ~tl59E8.tmp Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" ~tl59E8.tmp Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace\Session netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 372 powershell.exe 436 powershell.exe 372 powershell.exe 436 powershell.exe 372 powershell.exe 436 powershell.exe 1452 tmp.exe 1452 tmp.exe 3616 powershell.exe 4180 powershell.exe 3616 powershell.exe 4180 powershell.exe 3616 powershell.exe 4180 powershell.exe 2428 ~tl3421.tmp 2428 ~tl3421.tmp 4620 powershell.exe 4620 powershell.exe 892 powershell.exe 892 powershell.exe 4620 powershell.exe 892 powershell.exe 2428 ~tl3421.tmp 2428 ~tl3421.tmp 5092 svchost.exe 5092 svchost.exe 3224 powershell.exe 3224 powershell.exe 3588 powershell.exe 3224 powershell.exe 3588 powershell.exe 3588 powershell.exe 4584 ~tl1B2.tmp 4584 ~tl1B2.tmp 488 powershell.exe 488 powershell.exe 488 powershell.exe 4832 powershell.exe 4832 powershell.exe 4832 powershell.exe 2764 svchost.exe 2764 svchost.exe 4764 powershell.exe 4764 powershell.exe 396 powershell.exe 396 powershell.exe 396 powershell.exe 4764 powershell.exe 4236 ~tlEB2E.tmp 4236 ~tlEB2E.tmp 3516 powershell.exe 3600 powershell.exe 3600 powershell.exe 3516 powershell.exe 3600 powershell.exe 3516 powershell.exe 1220 svchost.exe 1220 svchost.exe 424 powershell.exe 5004 powershell.exe 424 powershell.exe 5004 powershell.exe 5004 powershell.exe 424 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 372 powershell.exe Token: SeDebugPrivilege 436 powershell.exe Token: SeIncreaseQuotaPrivilege 372 powershell.exe Token: SeSecurityPrivilege 372 powershell.exe Token: SeTakeOwnershipPrivilege 372 powershell.exe Token: SeLoadDriverPrivilege 372 powershell.exe Token: SeSystemProfilePrivilege 372 powershell.exe Token: SeSystemtimePrivilege 372 powershell.exe Token: SeProfSingleProcessPrivilege 372 powershell.exe Token: SeIncBasePriorityPrivilege 372 powershell.exe Token: SeCreatePagefilePrivilege 372 powershell.exe Token: SeBackupPrivilege 372 powershell.exe Token: SeRestorePrivilege 372 powershell.exe Token: SeShutdownPrivilege 372 powershell.exe Token: SeDebugPrivilege 372 powershell.exe Token: SeSystemEnvironmentPrivilege 372 powershell.exe Token: SeRemoteShutdownPrivilege 372 powershell.exe Token: SeUndockPrivilege 372 powershell.exe Token: SeManageVolumePrivilege 372 powershell.exe Token: 33 372 powershell.exe Token: 34 372 powershell.exe Token: 35 372 powershell.exe Token: 36 372 powershell.exe Token: SeDebugPrivilege 3616 powershell.exe Token: SeDebugPrivilege 4180 powershell.exe Token: SeIncreaseQuotaPrivilege 3616 powershell.exe Token: SeSecurityPrivilege 3616 powershell.exe Token: SeTakeOwnershipPrivilege 3616 powershell.exe Token: SeLoadDriverPrivilege 3616 powershell.exe Token: SeSystemProfilePrivilege 3616 powershell.exe Token: SeSystemtimePrivilege 3616 powershell.exe Token: SeProfSingleProcessPrivilege 3616 powershell.exe Token: SeIncBasePriorityPrivilege 3616 powershell.exe Token: SeCreatePagefilePrivilege 3616 powershell.exe Token: SeBackupPrivilege 3616 powershell.exe Token: SeRestorePrivilege 3616 powershell.exe Token: SeShutdownPrivilege 3616 powershell.exe Token: SeDebugPrivilege 3616 powershell.exe Token: SeSystemEnvironmentPrivilege 3616 powershell.exe Token: SeRemoteShutdownPrivilege 3616 powershell.exe Token: SeUndockPrivilege 3616 powershell.exe Token: SeManageVolumePrivilege 3616 powershell.exe Token: 33 3616 powershell.exe Token: 34 3616 powershell.exe Token: 35 3616 powershell.exe Token: 36 3616 powershell.exe Token: SeDebugPrivilege 4620 powershell.exe Token: SeDebugPrivilege 892 powershell.exe Token: SeIncreaseQuotaPrivilege 4620 powershell.exe Token: SeSecurityPrivilege 4620 powershell.exe Token: SeTakeOwnershipPrivilege 4620 powershell.exe Token: SeLoadDriverPrivilege 4620 powershell.exe Token: SeSystemProfilePrivilege 4620 powershell.exe Token: SeSystemtimePrivilege 4620 powershell.exe Token: SeProfSingleProcessPrivilege 4620 powershell.exe Token: SeIncBasePriorityPrivilege 4620 powershell.exe Token: SeCreatePagefilePrivilege 4620 powershell.exe Token: SeBackupPrivilege 4620 powershell.exe Token: SeRestorePrivilege 4620 powershell.exe Token: SeShutdownPrivilege 4620 powershell.exe Token: SeDebugPrivilege 4620 powershell.exe Token: SeSystemEnvironmentPrivilege 4620 powershell.exe Token: SeRemoteShutdownPrivilege 4620 powershell.exe Token: SeUndockPrivilege 4620 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1452 wrote to memory of 372 1452 tmp.exe 72 PID 1452 wrote to memory of 372 1452 tmp.exe 72 PID 1452 wrote to memory of 436 1452 tmp.exe 73 PID 1452 wrote to memory of 436 1452 tmp.exe 73 PID 1452 wrote to memory of 4672 1452 tmp.exe 77 PID 1452 wrote to memory of 4672 1452 tmp.exe 77 PID 1452 wrote to memory of 3300 1452 tmp.exe 79 PID 1452 wrote to memory of 3300 1452 tmp.exe 79 PID 3300 wrote to memory of 3616 3300 svchost.exe 81 PID 3300 wrote to memory of 3616 3300 svchost.exe 81 PID 3300 wrote to memory of 4180 3300 svchost.exe 83 PID 3300 wrote to memory of 4180 3300 svchost.exe 83 PID 3300 wrote to memory of 2428 3300 svchost.exe 85 PID 3300 wrote to memory of 2428 3300 svchost.exe 85 PID 2428 wrote to memory of 2576 2428 ~tl3421.tmp 86 PID 2428 wrote to memory of 2576 2428 ~tl3421.tmp 86 PID 2428 wrote to memory of 4788 2428 ~tl3421.tmp 88 PID 2428 wrote to memory of 4788 2428 ~tl3421.tmp 88 PID 2428 wrote to memory of 3116 2428 ~tl3421.tmp 90 PID 2428 wrote to memory of 3116 2428 ~tl3421.tmp 90 PID 2428 wrote to memory of 4620 2428 ~tl3421.tmp 92 PID 2428 wrote to memory of 4620 2428 ~tl3421.tmp 92 PID 2428 wrote to memory of 892 2428 ~tl3421.tmp 94 PID 2428 wrote to memory of 892 2428 ~tl3421.tmp 94 PID 2428 wrote to memory of 372 2428 ~tl3421.tmp 97 PID 2428 wrote to memory of 372 2428 ~tl3421.tmp 97 PID 2428 wrote to memory of 1016 2428 ~tl3421.tmp 99 PID 2428 wrote to memory of 1016 2428 ~tl3421.tmp 99 PID 2428 wrote to memory of 5092 2428 ~tl3421.tmp 101 PID 2428 wrote to memory of 5092 2428 ~tl3421.tmp 101 PID 5092 wrote to memory of 1372 5092 svchost.exe 102 PID 5092 wrote to memory of 1372 5092 svchost.exe 102 PID 5092 wrote to memory of 2396 5092 svchost.exe 104 PID 5092 wrote to memory of 2396 5092 svchost.exe 104 PID 5092 wrote to memory of 2584 5092 svchost.exe 106 PID 5092 wrote to memory of 2584 5092 svchost.exe 106 PID 5092 wrote to memory of 3224 5092 svchost.exe 107 PID 5092 wrote to memory of 3224 5092 svchost.exe 107 PID 5092 wrote to memory of 3588 5092 svchost.exe 110 PID 5092 wrote to memory of 3588 5092 svchost.exe 110 PID 5092 wrote to memory of 4584 5092 svchost.exe 112 PID 5092 wrote to memory of 4584 5092 svchost.exe 112 PID 4584 wrote to memory of 4236 4584 ~tl1B2.tmp 113 PID 4584 wrote to memory of 4236 4584 ~tl1B2.tmp 113 PID 4584 wrote to memory of 4540 4584 ~tl1B2.tmp 115 PID 4584 wrote to memory of 4540 4584 ~tl1B2.tmp 115 PID 4584 wrote to memory of 4612 4584 ~tl1B2.tmp 116 PID 4584 wrote to memory of 4612 4584 ~tl1B2.tmp 116 PID 4584 wrote to memory of 488 4584 ~tl1B2.tmp 118 PID 4584 wrote to memory of 488 4584 ~tl1B2.tmp 118 PID 4584 wrote to memory of 4832 4584 ~tl1B2.tmp 121 PID 4584 wrote to memory of 4832 4584 ~tl1B2.tmp 121 PID 2764 wrote to memory of 2576 2764 svchost.exe 124 PID 2764 wrote to memory of 2576 2764 svchost.exe 124 PID 2764 wrote to memory of 4368 2764 svchost.exe 126 PID 2764 wrote to memory of 4368 2764 svchost.exe 126 PID 2764 wrote to memory of 1076 2764 svchost.exe 128 PID 2764 wrote to memory of 1076 2764 svchost.exe 128 PID 2764 wrote to memory of 4764 2764 svchost.exe 130 PID 2764 wrote to memory of 4764 2764 svchost.exe 130 PID 2764 wrote to memory of 396 2764 svchost.exe 132 PID 2764 wrote to memory of 396 2764 svchost.exe 132 PID 2764 wrote to memory of 4236 2764 svchost.exe 135 PID 2764 wrote to memory of 4236 2764 svchost.exe 135 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:372
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:436
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM2⤵
- Creates scheduled task(s)
PID:4672
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4180
-
-
C:\Users\Admin\AppData\Local\Temp\~tl3421.tmpC:\Users\Admin\AppData\Local\Temp\~tl3421.tmp3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SYSTEM32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645114⤵PID:2576
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4788
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3116
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /TN "Timer"4⤵PID:372
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM4⤵
- Creates scheduled task(s)
PID:1016
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SYSTEM32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645115⤵PID:1372
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:2396
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:2584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\5⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \5⤵
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
-
C:\Users\Admin\AppData\Local\Temp\~tl1B2.tmpC:\Users\Admin\AppData\Local\Temp\~tl1B2.tmp5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SYSTEM32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645116⤵PID:4236
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4540
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\6⤵
- Suspicious behavior: EnumeratesProcesses
PID:488
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \6⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
-
-
-
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645112⤵
- Modifies data under HKEY_USERS
PID:2576
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:4368
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:1076
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:396
-
-
C:\Windows\TEMP\~tlEB2E.tmpC:\Windows\TEMP\~tlEB2E.tmp2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4236 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645113⤵PID:5088
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:4176
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:3396
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3600
-
-
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1220 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645112⤵PID:2156
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:696
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:5068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:424
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Windows\TEMP\~tl59E8.tmpC:\Windows\TEMP\~tl59E8.tmp2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3784 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645113⤵
- Modifies data under HKEY_USERS
PID:3224
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:624
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:3100
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1376
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5268b890dae39e430e8b127909067ed96
SHA135939515965c0693ef46e021254c3e73ea8c4a2b
SHA2567643d492a6f1e035b63b2e16c9c21d974a77dfd2d8e90b9c15ee412625e88c4c
SHA512abc4b2ce10a6566f38c00ad55e433791dd45fca47deec70178daf0763578ff019fb0ec70792d5e9ecde4eb6778a35ba8a8c7ecd07550597d9bbb13521c9b98fb
-
Filesize
1KB
MD54546a6f8ea6ea04bdb361e2b8d51becd
SHA1b91e033b0d166514af762086a3b6071d68ad2c8e
SHA256c14571be1a068649386e4cf5bac68bd74b274c7852422cc3ce05e4d4594ba15e
SHA5120b86f2ae18286271eecc3db236274158478569ce8c06a1325bddea96561cf834b6b4cabac47c29d0f7a9fd88e3335db7bd6ec154c58da1620b72ebfaadf4b302
-
Filesize
1KB
MD5bc40cccfc258251d21dd5ab71395e192
SHA198d1f4c3c00241c43cc71dbd22f06183703e34a2
SHA2561bbd73dc161823f32c29d97f5f7e885d5765d92cc88f99795985781c6d01fbd0
SHA5122dd55969d6c1289d0220be275bd51012ad13ec61bfebde3ec71dd28abf76bb2a6c789f88e484bdeb4fffb6e2d00714124538fe52327778e397d0d8bfb1113dfb
-
Filesize
1KB
MD5548bdb51303c174f1341d64204324304
SHA16245603c1419ce0c1ea96338ccfe840a6fd6a068
SHA256e5634c406da663990d6b3ab4d48d6578f86799f9b54dd3d2eadb039305081556
SHA512502fca31a55bec79f12c44e9634da54e9f01fff9358d5198350fb3bbd5685b76fc8b2c2cbe56e75c2bba40dab9b6fcbaedf383603baf24494781e32318e4cda7
-
Filesize
1KB
MD521d07258f62ce6475d2776f9a499f2a4
SHA17b771739c412aaafcb5c04ab495f527c9ed03530
SHA2563218572b1b197e0f0480d3743cda35db089826107a925741f04cb508ad2c7a62
SHA512df8177d6c679a51a637654449b4530e1450c65cdb12d729404130c785c7d255b8e3ec1d7bede88f5bdedb09e9bcf31879771e8ecca540c378357f840c56b529e
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
393KB
MD59dbdd43a2e0b032604943c252eaf634a
SHA19584dc66f3c1cce4210fdf827a1b4e2bb22263af
SHA25633c53cd5265502e7b62432dba0e1b5ed702b5007cc79973ccd1e71b2acc01e86
SHA512b7b20b06dac952a96eda254bad29966fe7a4f827912beb0bc66d5af5b302d7c0282d70c1b01ff782507dd03a1d58706f05cb157521c7f2887a43085ffe5f94d1
-
Filesize
385KB
MD5e802c96760e48c5139995ffb2d891f90
SHA1bba3d278c0eb1094a26e5d2f4c099ad685371578
SHA256cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c
SHA51297300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0
-
Filesize
2.7MB
MD5c9b1dde253446b4b2bc6a0ad4d3022c2
SHA166cf356f3717f3d07a1c568c7146f9f9f14adf9f
SHA2564fcc265cafab726d5e03b652e7b3fb4681a28f0dc5349825fe28b5413c96d3f3
SHA5120e8f41766a67cea5d48950d0f30b5c5e1c6b7e9a5d77515e2be72d719c11bed624991c8764c7edddb0981dffd34fbd6e6e89d9ac9bd65164a14b27f21a2ce005
-
Filesize
7.4MB
MD5bd6e39247468b93ab963b08866800998
SHA1fa339ba8ffc99fb5d0c109196484652c1a9230f9
SHA2564e4428327e85e0fe717cb92cc12a17ad2e476c68295bcb6ac9497c07ca5b0c2a
SHA512b5ce1362d799a642080907ff36ed209bdd207c8a4d468a00925f00ac60ad1e55903c4b7ff721d2736ec901fd943df43b15a60e9efa1336113d51ec691aaf1506
-
Filesize
5.3MB
MD55fe4ea367cee11e92ad4644d8ac3cef7
SHA144faea4a352b7860a9eafca82bd3c9b054b6db29
SHA2561a69f2fcfe5b35bf44ea42a1efe89f18f6b0d522cbbea5c51bae93aff7d3188b
SHA5121c4499eadaf44847a7a001c2622e558bc130c9ad608b4ec977480e002cf50c9eb36a65974b86a2db69e9bc43e7d239122389a6cf1ca2849c59bc137441fb0a4f
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize3KB
MD5478f1c1fcff584f4f440469ed71d2d43
SHA10900e9dc39580d527c145715f985a5a86e80b66c
SHA256c918bf6bad93b653f9d05007634b088be7b91ed4350b777905d0520d93d650eb
SHA5124ed62f2add77e0dd8e07e101ee06bdb8a15808b701c7580b09704bd4befdecf7cfe2fa29d6e96f2149a92f4e1b0cae0d9810a5cde3f4940145f8120f7322d1a7
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5f7281178f164538b3d1892e9b0e0e565
SHA13f9d8b0cd9244fc0ea9f74f56b7aa363db311f35
SHA256f383008a4071cea4298985d1f1f5c75c14ed427438eeffe0730a7e3459d5921b
SHA5128a5c3c59720e227e75c35b09da3a9837985a33793532e9262eac47b75f130dd3ca001e802050b04873462470e47a3a81d9d317c6919e2f75cb3d35d7d7c6d2ae
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD50579a250c33eee3926c62a028de8cc5f
SHA18e1667c7d70efded97fe0195f5f6fc36517eb018
SHA2569e8ef80ea50b9ddd0d3e843b0fcb6894edfab14e8133a5a79c4e88ac16ac6995
SHA512a4e24c42539658705e9839685c37111a62cd5f7c08086ea30c0bb84d56d49c4e0ffedb514712f7c9bd2bf307c8be2c14fe1ea8ce481f787ff6561b0e50ee3a38
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize192B
MD5ad1844e2e35d24dce3531e2093fb89b9
SHA1910903e67737141d2b31da413fdb26a24d025817
SHA2568c9c7a09fceb896e4c9bd46f02399404ffaacdd580334796dd7503047d30c52a
SHA51249a2836a6baacad19f25d35cb0c38869063d38e40c6be37e9174bd000f9bb9a973a4d0bce7655605e6c8173ef8cdc5760f1ff3fbb8fa2d7faa5cb829fc00fbe3
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5631f4b3792b263fdda6b265e93be4747
SHA11d6916097d419198bfdf78530d59d0d9f3e12d45
SHA2564e68d2d067c5680a2e55853ac58b16f199b09f1b9e5f2174605fff18da828976
SHA512e0280041c4ca63971ab2524f25d2047820f031c1b4aeb6021a3367297045ddf6616ffccafb54630eb07fd154571d844329ebcc34d6ce64834cb77cba373e4fbe