Resubmissions
17/04/2024, 11:54
240417-n29fcafd81 817/04/2024, 11:54
240417-n285ksdh43 817/04/2024, 11:54
240417-n28h2sfd8z 817/04/2024, 11:54
240417-n246mafd8x 817/04/2024, 11:54
240417-n24j4afd8w 816/04/2024, 10:48
240416-mwlxesad2t 8Analysis
-
max time kernel
599s -
max time network
601s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
17/04/2024, 11:54
Static task
static1
Behavioral task
behavioral1
Sample
e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe
Resource
win10-20240319-en
Behavioral task
behavioral2
Sample
e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe
Resource
win11-20240412-en
General
-
Target
e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe
-
Size
5.3MB
-
MD5
4a6096deaaaf3fe393b61d66540ce4ab
-
SHA1
9f91f6feae419a73a3371e06206b5e459281cff0
-
SHA256
e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5
-
SHA512
9322c12a042ef7914bedf73618b135775f99bcc352e23b606e6887f1e7843bda3fb9025a06eefb4bd1468a69565f6f8d34bacf0d0fcbd4ee7c34cd46c96e6d01
-
SSDEEP
98304:GBze+DWzwgfjGmMdivlucHq81K0U4DzRtNCC6rYOALRiNKpRyE3Rb1:4ze9cidud8pUSzpXOALRi4pT91
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 10 IoCs
pid Process 2780 netsh.exe 2472 netsh.exe 2284 netsh.exe 1648 netsh.exe 2512 netsh.exe 4368 netsh.exe 3008 netsh.exe 4156 netsh.exe 2472 netsh.exe 588 netsh.exe -
Executes dropped EXE 6 IoCs
pid Process 816 svchost.exe 3016 ~tlEEA1.tmp 4352 svchost.exe 3864 ~tlC4EC.tmp 3496 svchost.exe 3476 ~tlBAA8.tmp -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\output1[1].jpg svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[1].htm ~tlBAA8.tmp File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[1].htm svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat ~tlBAA8.tmp -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\System\svchost.exe e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak ~tlEEA1.tmp File opened for modification C:\Windows\System\svchost.exe ~tlEEA1.tmp File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe File created C:\Windows\System\svchost.exe e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4640 schtasks.exe 2928 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ~tlBAA8.tmp Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix ~tlBAA8.tmp Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control netsh.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ~tlBAA8.tmp Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 3236 powershell.exe 1016 powershell.exe 3236 powershell.exe 1016 powershell.exe 3236 powershell.exe 1016 powershell.exe 4296 e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe 4296 e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe 2680 powershell.exe 3480 powershell.exe 2680 powershell.exe 3480 powershell.exe 3480 powershell.exe 2680 powershell.exe 3016 ~tlEEA1.tmp 3016 ~tlEEA1.tmp 4740 powershell.exe 4740 powershell.exe 2636 powershell.exe 4740 powershell.exe 2636 powershell.exe 2636 powershell.exe 3016 ~tlEEA1.tmp 3016 ~tlEEA1.tmp 4352 svchost.exe 4352 svchost.exe 4128 powershell.exe 4128 powershell.exe 408 powershell.exe 408 powershell.exe 4128 powershell.exe 408 powershell.exe 3864 ~tlC4EC.tmp 3864 ~tlC4EC.tmp 1984 powershell.exe 1984 powershell.exe 1984 powershell.exe 164 powershell.exe 164 powershell.exe 164 powershell.exe 3496 svchost.exe 3496 svchost.exe 4092 powershell.exe 3016 powershell.exe 4092 powershell.exe 3016 powershell.exe 4092 powershell.exe 3016 powershell.exe 3476 ~tlBAA8.tmp 3476 ~tlBAA8.tmp 304 powershell.exe 304 powershell.exe 304 powershell.exe 3832 powershell.exe 3832 powershell.exe 3832 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3236 powershell.exe Token: SeDebugPrivilege 1016 powershell.exe Token: SeIncreaseQuotaPrivilege 3236 powershell.exe Token: SeSecurityPrivilege 3236 powershell.exe Token: SeTakeOwnershipPrivilege 3236 powershell.exe Token: SeLoadDriverPrivilege 3236 powershell.exe Token: SeSystemProfilePrivilege 3236 powershell.exe Token: SeSystemtimePrivilege 3236 powershell.exe Token: SeProfSingleProcessPrivilege 3236 powershell.exe Token: SeIncBasePriorityPrivilege 3236 powershell.exe Token: SeCreatePagefilePrivilege 3236 powershell.exe Token: SeBackupPrivilege 3236 powershell.exe Token: SeRestorePrivilege 3236 powershell.exe Token: SeShutdownPrivilege 3236 powershell.exe Token: SeDebugPrivilege 3236 powershell.exe Token: SeSystemEnvironmentPrivilege 3236 powershell.exe Token: SeRemoteShutdownPrivilege 3236 powershell.exe Token: SeUndockPrivilege 3236 powershell.exe Token: SeManageVolumePrivilege 3236 powershell.exe Token: 33 3236 powershell.exe Token: 34 3236 powershell.exe Token: 35 3236 powershell.exe Token: 36 3236 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 3480 powershell.exe Token: SeIncreaseQuotaPrivilege 2680 powershell.exe Token: SeSecurityPrivilege 2680 powershell.exe Token: SeTakeOwnershipPrivilege 2680 powershell.exe Token: SeLoadDriverPrivilege 2680 powershell.exe Token: SeSystemProfilePrivilege 2680 powershell.exe Token: SeSystemtimePrivilege 2680 powershell.exe Token: SeProfSingleProcessPrivilege 2680 powershell.exe Token: SeIncBasePriorityPrivilege 2680 powershell.exe Token: SeCreatePagefilePrivilege 2680 powershell.exe Token: SeBackupPrivilege 2680 powershell.exe Token: SeRestorePrivilege 2680 powershell.exe Token: SeShutdownPrivilege 2680 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeSystemEnvironmentPrivilege 2680 powershell.exe Token: SeRemoteShutdownPrivilege 2680 powershell.exe Token: SeUndockPrivilege 2680 powershell.exe Token: SeManageVolumePrivilege 2680 powershell.exe Token: 33 2680 powershell.exe Token: 34 2680 powershell.exe Token: 35 2680 powershell.exe Token: 36 2680 powershell.exe Token: SeDebugPrivilege 4740 powershell.exe Token: SeDebugPrivilege 2636 powershell.exe Token: SeIncreaseQuotaPrivilege 4740 powershell.exe Token: SeSecurityPrivilege 4740 powershell.exe Token: SeTakeOwnershipPrivilege 4740 powershell.exe Token: SeLoadDriverPrivilege 4740 powershell.exe Token: SeSystemProfilePrivilege 4740 powershell.exe Token: SeSystemtimePrivilege 4740 powershell.exe Token: SeProfSingleProcessPrivilege 4740 powershell.exe Token: SeIncBasePriorityPrivilege 4740 powershell.exe Token: SeCreatePagefilePrivilege 4740 powershell.exe Token: SeBackupPrivilege 4740 powershell.exe Token: SeRestorePrivilege 4740 powershell.exe Token: SeShutdownPrivilege 4740 powershell.exe Token: SeDebugPrivilege 4740 powershell.exe Token: SeSystemEnvironmentPrivilege 4740 powershell.exe Token: SeRemoteShutdownPrivilege 4740 powershell.exe Token: SeUndockPrivilege 4740 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4296 wrote to memory of 3236 4296 e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe 73 PID 4296 wrote to memory of 3236 4296 e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe 73 PID 4296 wrote to memory of 1016 4296 e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe 75 PID 4296 wrote to memory of 1016 4296 e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe 75 PID 4296 wrote to memory of 4640 4296 e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe 78 PID 4296 wrote to memory of 4640 4296 e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe 78 PID 4296 wrote to memory of 816 4296 e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe 80 PID 4296 wrote to memory of 816 4296 e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe 80 PID 816 wrote to memory of 2680 816 svchost.exe 82 PID 816 wrote to memory of 2680 816 svchost.exe 82 PID 816 wrote to memory of 3480 816 svchost.exe 84 PID 816 wrote to memory of 3480 816 svchost.exe 84 PID 816 wrote to memory of 3016 816 svchost.exe 86 PID 816 wrote to memory of 3016 816 svchost.exe 86 PID 3016 wrote to memory of 1508 3016 ~tlEEA1.tmp 87 PID 3016 wrote to memory of 1508 3016 ~tlEEA1.tmp 87 PID 3016 wrote to memory of 2284 3016 ~tlEEA1.tmp 89 PID 3016 wrote to memory of 2284 3016 ~tlEEA1.tmp 89 PID 3016 wrote to memory of 4156 3016 ~tlEEA1.tmp 91 PID 3016 wrote to memory of 4156 3016 ~tlEEA1.tmp 91 PID 3016 wrote to memory of 4740 3016 ~tlEEA1.tmp 93 PID 3016 wrote to memory of 4740 3016 ~tlEEA1.tmp 93 PID 3016 wrote to memory of 2636 3016 ~tlEEA1.tmp 95 PID 3016 wrote to memory of 2636 3016 ~tlEEA1.tmp 95 PID 3016 wrote to memory of 4620 3016 ~tlEEA1.tmp 98 PID 3016 wrote to memory of 4620 3016 ~tlEEA1.tmp 98 PID 3016 wrote to memory of 2928 3016 ~tlEEA1.tmp 100 PID 3016 wrote to memory of 2928 3016 ~tlEEA1.tmp 100 PID 3016 wrote to memory of 4352 3016 ~tlEEA1.tmp 102 PID 3016 wrote to memory of 4352 3016 ~tlEEA1.tmp 102 PID 4352 wrote to memory of 1332 4352 svchost.exe 103 PID 4352 wrote to memory of 1332 4352 svchost.exe 103 PID 4352 wrote to memory of 2472 4352 svchost.exe 105 PID 4352 wrote to memory of 2472 4352 svchost.exe 105 PID 4352 wrote to memory of 1648 4352 svchost.exe 107 PID 4352 wrote to memory of 1648 4352 svchost.exe 107 PID 4352 wrote to memory of 4128 4352 svchost.exe 108 PID 4352 wrote to memory of 4128 4352 svchost.exe 108 PID 4352 wrote to memory of 408 4352 svchost.exe 111 PID 4352 wrote to memory of 408 4352 svchost.exe 111 PID 4352 wrote to memory of 3864 4352 svchost.exe 113 PID 4352 wrote to memory of 3864 4352 svchost.exe 113 PID 3864 wrote to memory of 2112 3864 ~tlC4EC.tmp 114 PID 3864 wrote to memory of 2112 3864 ~tlC4EC.tmp 114 PID 3864 wrote to memory of 2512 3864 ~tlC4EC.tmp 116 PID 3864 wrote to memory of 2512 3864 ~tlC4EC.tmp 116 PID 3864 wrote to memory of 4368 3864 ~tlC4EC.tmp 118 PID 3864 wrote to memory of 4368 3864 ~tlC4EC.tmp 118 PID 3864 wrote to memory of 1984 3864 ~tlC4EC.tmp 120 PID 3864 wrote to memory of 1984 3864 ~tlC4EC.tmp 120 PID 3864 wrote to memory of 164 3864 ~tlC4EC.tmp 122 PID 3864 wrote to memory of 164 3864 ~tlC4EC.tmp 122 PID 3496 wrote to memory of 436 3496 svchost.exe 125 PID 3496 wrote to memory of 436 3496 svchost.exe 125 PID 3496 wrote to memory of 588 3496 svchost.exe 127 PID 3496 wrote to memory of 588 3496 svchost.exe 127 PID 3496 wrote to memory of 3008 3496 svchost.exe 129 PID 3496 wrote to memory of 3008 3496 svchost.exe 129 PID 3496 wrote to memory of 4092 3496 svchost.exe 131 PID 3496 wrote to memory of 4092 3496 svchost.exe 131 PID 3496 wrote to memory of 3016 3496 svchost.exe 133 PID 3496 wrote to memory of 3016 3496 svchost.exe 133 PID 3496 wrote to memory of 3476 3496 svchost.exe 136 PID 3496 wrote to memory of 3476 3496 svchost.exe 136 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe"C:\Users\Admin\AppData\Local\Temp\e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM2⤵
- Creates scheduled task(s)
PID:4640
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\~tlEEA1.tmpC:\Users\Admin\AppData\Local\Temp\~tlEEA1.tmp3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SYSTEM32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645114⤵PID:1508
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2284
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4156
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4740
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /TN "Timer"4⤵PID:4620
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM4⤵
- Creates scheduled task(s)
PID:2928
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SYSTEM32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645115⤵PID:1332
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:2472
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:1648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\5⤵
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \5⤵
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
C:\Users\Admin\AppData\Local\Temp\~tlC4EC.tmpC:\Users\Admin\AppData\Local\Temp\~tlC4EC.tmp5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SYSTEM32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645116⤵PID:2112
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:2512
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4368
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\6⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \6⤵
- Suspicious behavior: EnumeratesProcesses
PID:164
-
-
-
-
-
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645112⤵
- Modifies data under HKEY_USERS
PID:436
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:588
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:3008
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4092
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3016
-
-
C:\Windows\TEMP\~tlBAA8.tmpC:\Windows\TEMP\~tlBAA8.tmp2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3476 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645113⤵PID:700
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:2780
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:2472
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:304
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5cd5b15b46b9fe0d89c2b8d351c303d2a
SHA1e1d30a8f98585e20c709732c013e926c7078a3c2
SHA2560a8a0dcbec27e07c8dc9ef31622ac41591871416ccd9146f40d8cc9a2421da7a
SHA512d7261b2ff89adcdb909b775c6a47b3cd366b7c3f5cbb4f60428e849582c93e14e76d7dcadec79003eef7c9a3059e305d5e4f6b5b912b9ebc3518e06b0d284dd7
-
Filesize
1KB
MD5085a7a3f168a8bcf7e1cb29f4560f51d
SHA14007c2c9691c5d5e656bdd0c9d0f8585d5a1b973
SHA256c4d27137d5aa0f8d429fa54e0f799299349cc591b706033b586aa60f3503b898
SHA5125275464f569700ffcc48dcd41201a6dad110d03ba2d097d125866e5a9452e735b1ad05d13bbd246709501ff5e1d91207455a9e77239a7307477b63198dbcf75e
-
Filesize
360B
MD58195deb9f187f788091c7f280fc2c945
SHA17bf93a4c91e31dafcb4a2106a606d287f1e9a3de
SHA256b5505c40bbaba11a5e19fb94fb7a4915fd14b44eed8fbe0881380f24e154dbae
SHA5120e1ade66edf965f5317b7d1409ff49ea773605ccdc9dd8921de183c83a1462ce9b61933fd68bd165708de18ceb553ff2bd1ea7a27626ac5e62ac343c770bd8f3
-
Filesize
1KB
MD5fe5d38603e29ba4d9bd46ea2e0c8123e
SHA17f23d455c7cafc0d6c241d145bb82f75e257bb25
SHA256f4f835135ce6018ab97f6f9dae542192e664ea698a5cb8def2fbfc5488264a81
SHA51262bb041920e7d1a9a9b5517283e80ad5249ace65a2c01a600129199d655340b29f64a933f4ee5b2b306932b7f0938b9954dd6fbf7e2ce63f37a670db85ac62dc
-
Filesize
1KB
MD509ed3973e0bdc3687abb09ae67ddd22c
SHA1a66787c04ce0e47e4418fd5d8f92af65f9501aa1
SHA256b8942316f788a4283a262bc9ee90ec55349245649c4be67f5de17a11243f6f9a
SHA512c02b7c0003cfc190b578d10646ba8c026e445524428c40132fe324cb19e26f4c13a4b229c0d589e2057580197f90f60ab2f08fb5b71ebf461ef4edd4dbde8f0b
-
Filesize
1KB
MD5c794031f08200ae70d89601065c0360c
SHA179d5b0e9aaa1e8f849f3a2fc7a635c7fdeb6ec50
SHA256e9920c21cd22f9755e414f1ffe885688d8876943588054ed0f136885a26a04be
SHA512658dd5dc1adbc35fb0d8138d44f6a8e5444c4d523e13bac4dfc2f6ffec793c017d9599db815fd5393b2f38dfd4edb5042889b62696a465abae6d649720820a3b
-
Filesize
1KB
MD5ad6d56cc387588fb0918343816247092
SHA1d352a6ef397aa6573ff451a571fef3ccecae598f
SHA256e7937de0bb4ccede7e62052fec2aeedad3ea4dce928327fc1258b8efe80687e4
SHA512dadc279c384b085a8242e1a611eae43caa91e4698efaf48c004265272d3889ca52417383d16ab68b30aeea72156344389479b122d25812447237efb5079d5fa8
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
393KB
MD59dbdd43a2e0b032604943c252eaf634a
SHA19584dc66f3c1cce4210fdf827a1b4e2bb22263af
SHA25633c53cd5265502e7b62432dba0e1b5ed702b5007cc79973ccd1e71b2acc01e86
SHA512b7b20b06dac952a96eda254bad29966fe7a4f827912beb0bc66d5af5b302d7c0282d70c1b01ff782507dd03a1d58706f05cb157521c7f2887a43085ffe5f94d1
-
Filesize
385KB
MD5e802c96760e48c5139995ffb2d891f90
SHA1bba3d278c0eb1094a26e5d2f4c099ad685371578
SHA256cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c
SHA51297300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0
-
Filesize
2.6MB
MD5c7e7df0119da2669c8d05dcf0f2cb4c5
SHA199324bd69525feb253c665023c9261b3f078818b
SHA2566b92f204e74bf781bdd6e46152bf993deb86e367e749a29a47ba65f23d8846ff
SHA512a9fd3259cbca5411df9791b215348d21b5ddd0cad942131ef852167737ee17f76e62c827edcd22c49868063d1af87d878663a15ec02cb53e8afbb75e19f45bab
-
Filesize
9.4MB
MD51424571b3f8b6f97b24cf5aae5b96d83
SHA16b4ad47908b18e9836bd7f968f5f66f5b296fc9d
SHA256d32df7ab6c633e1b9640c15bb46bd24ca23572f94dca6c4537c2942465f64921
SHA51249ae6fc0e26d0e92d7478a06615790ca1f19751fcb3432e1627243c371a0e8fcaa2173d80db9ff99207db5336d182e3b8132937b675b19bd2d2a6fa3357f15c5
-
Filesize
5.3MB
MD54a6096deaaaf3fe393b61d66540ce4ab
SHA19f91f6feae419a73a3371e06206b5e459281cff0
SHA256e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5
SHA5129322c12a042ef7914bedf73618b135775f99bcc352e23b606e6887f1e7843bda3fb9025a06eefb4bd1468a69565f6f8d34bacf0d0fcbd4ee7c34cd46c96e6d01
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize3KB
MD5573d77d4e77a445f5db769812a0be865
SHA17473d15ef2d3c6894edefd472f411c8e3209a99c
SHA2565ec3f268845a50e309ae0d80bcee4f4dd4cd1b279ab1e64b523a057c11074f1c
SHA512af2422a9790a91cdcbe39e6ef6d17899c2cbd4159b1b71ac56f633015068d3afc678fcef34892575bf59bdf7d5914ec6070864940d44130263fe84e28abba2dc
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD52d3ab22b8c6f41c04913296cf2856bed
SHA16304965e54e9e11c2f3dde492994ab60448e0f4e
SHA256541215a6836232733c6df6b852b27bc32ad6367e12602839ea1e886f1a4b6d1a
SHA5124bdd896bfeab457fddf7f34c4ac96c4ebfe8e640d87cc967dccb5c3db138b993cfece3742901c6896f88b960f451e26c53bff3657772b100759a09713c4611d3
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD513ce9ceca4c790047cc87f00c68dceab
SHA1773d4dbc2c028f115c9e7a15b220868fe6607b5f
SHA256fb913170b3ce01e039d21928ef8a8891a2052fbd106b2d7f0a98c083e7f9a470
SHA512756487c0fcf8c525570e7bf190a2085c785d03870e47c031f76922768a113b446a33c0a7bcbb0f100cd0c7e27f71423cba41efef5dd58b3fb590cb38870c5ca7