Resubmissions
17/04/2024, 11:54
240417-n29fcafd81 817/04/2024, 11:54
240417-n285ksdh43 817/04/2024, 11:54
240417-n28h2sfd8z 817/04/2024, 11:54
240417-n246mafd8x 817/04/2024, 11:54
240417-n24j4afd8w 816/04/2024, 10:48
240416-mwlxesad2t 8Analysis
-
max time kernel
1799s -
max time network
1802s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
17/04/2024, 11:54
Static task
static1
Behavioral task
behavioral1
Sample
e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe
Resource
win11-20240412-en
General
-
Target
e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe
-
Size
5.3MB
-
MD5
4a6096deaaaf3fe393b61d66540ce4ab
-
SHA1
9f91f6feae419a73a3371e06206b5e459281cff0
-
SHA256
e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5
-
SHA512
9322c12a042ef7914bedf73618b135775f99bcc352e23b606e6887f1e7843bda3fb9025a06eefb4bd1468a69565f6f8d34bacf0d0fcbd4ee7c34cd46c96e6d01
-
SSDEEP
98304:GBze+DWzwgfjGmMdivlucHq81K0U4DzRtNCC6rYOALRiNKpRyE3Rb1:4ze9cidud8pUSzpXOALRi4pT91
Malware Config
Signatures
-
Contacts a large (1126) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall 2 TTPs 22 IoCs
pid Process 3464 netsh.exe 192 netsh.exe 3944 netsh.exe 4592 netsh.exe 2296 netsh.exe 4340 netsh.exe 996 netsh.exe 2948 netsh.exe 1572 netsh.exe 3100 netsh.exe 4584 netsh.exe 4712 netsh.exe 1444 netsh.exe 60 netsh.exe 4936 netsh.exe 1804 netsh.exe 1888 netsh.exe 2728 netsh.exe 1372 netsh.exe 4240 netsh.exe 1956 netsh.exe 4424 netsh.exe -
Executes dropped EXE 12 IoCs
pid Process 4388 svchost.exe 4512 ~tl7896.tmp 64 svchost.exe 2284 ~tl6B53.tmp 1748 svchost.exe 1524 ~tl682E.tmp 216 svchost.exe 4288 ~tlCFF3.tmp 2920 svchost.exe 900 ~tl40A1.tmp 3924 svchost.exe 2428 ~tlAF3D.tmp -
Drops file in System32 directory 41 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[1].htm svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat ~tlCFF3.tmp File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[1].htm svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat ~tlAF3D.tmp File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\output1[1].jpg svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[1].htm ~tlCFF3.tmp File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[1].htm ~tl682E.tmp File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\output1[1].jpg svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\output1[1].jpg svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat ~tl682E.tmp File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[2].htm svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[2].htm ~tl40A1.tmp File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\output1[1].jpg svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[2].htm ~tl682E.tmp File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[1].htm ~tlAF3D.tmp File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[1].htm svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[1].htm ~tl40A1.tmp File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[1].htm svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat ~tl40A1.tmp File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[2].htm ~tlCFF3.tmp File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\System\svchost.exe e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe File opened for modification C:\Windows\System\svchost.exe ~tl7896.tmp File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak ~tl7896.tmp File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak svchost.exe File opened for modification C:\Windows\System\svchost.exe e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3268 schtasks.exe 1664 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4576 powershell.exe 2780 powershell.exe 2780 powershell.exe 4576 powershell.exe 4576 powershell.exe 2780 powershell.exe 4496 e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe 4496 e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe 68 powershell.exe 772 powershell.exe 68 powershell.exe 772 powershell.exe 68 powershell.exe 772 powershell.exe 4512 ~tl7896.tmp 4512 ~tl7896.tmp 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe 3732 powershell.exe 3732 powershell.exe 3732 powershell.exe 4512 ~tl7896.tmp 4512 ~tl7896.tmp 64 svchost.exe 64 svchost.exe 1428 powershell.exe 1428 powershell.exe 1428 powershell.exe 1680 powershell.exe 1680 powershell.exe 1680 powershell.exe 2284 ~tl6B53.tmp 2284 ~tl6B53.tmp 4512 powershell.exe 4512 powershell.exe 1472 powershell.exe 1472 powershell.exe 4512 powershell.exe 1472 powershell.exe 1748 svchost.exe 1748 svchost.exe 3384 powershell.exe 3384 powershell.exe 4676 powershell.exe 4676 powershell.exe 3384 powershell.exe 4676 powershell.exe 1524 ~tl682E.tmp 1524 ~tl682E.tmp 4644 powershell.exe 4572 powershell.exe 4572 powershell.exe 4644 powershell.exe 4572 powershell.exe 4644 powershell.exe 216 svchost.exe 216 svchost.exe 4648 powershell.exe 4648 powershell.exe 3548 powershell.exe 4648 powershell.exe 3548 powershell.exe 3548 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4576 powershell.exe Token: SeDebugPrivilege 2780 powershell.exe Token: SeIncreaseQuotaPrivilege 2780 powershell.exe Token: SeSecurityPrivilege 2780 powershell.exe Token: SeTakeOwnershipPrivilege 2780 powershell.exe Token: SeLoadDriverPrivilege 2780 powershell.exe Token: SeSystemProfilePrivilege 2780 powershell.exe Token: SeSystemtimePrivilege 2780 powershell.exe Token: SeProfSingleProcessPrivilege 2780 powershell.exe Token: SeIncBasePriorityPrivilege 2780 powershell.exe Token: SeCreatePagefilePrivilege 2780 powershell.exe Token: SeBackupPrivilege 2780 powershell.exe Token: SeRestorePrivilege 2780 powershell.exe Token: SeShutdownPrivilege 2780 powershell.exe Token: SeDebugPrivilege 2780 powershell.exe Token: SeSystemEnvironmentPrivilege 2780 powershell.exe Token: SeRemoteShutdownPrivilege 2780 powershell.exe Token: SeUndockPrivilege 2780 powershell.exe Token: SeManageVolumePrivilege 2780 powershell.exe Token: 33 2780 powershell.exe Token: 34 2780 powershell.exe Token: 35 2780 powershell.exe Token: 36 2780 powershell.exe Token: SeDebugPrivilege 68 powershell.exe Token: SeDebugPrivilege 772 powershell.exe Token: SeIncreaseQuotaPrivilege 772 powershell.exe Token: SeSecurityPrivilege 772 powershell.exe Token: SeTakeOwnershipPrivilege 772 powershell.exe Token: SeLoadDriverPrivilege 772 powershell.exe Token: SeSystemProfilePrivilege 772 powershell.exe Token: SeSystemtimePrivilege 772 powershell.exe Token: SeProfSingleProcessPrivilege 772 powershell.exe Token: SeIncBasePriorityPrivilege 772 powershell.exe Token: SeCreatePagefilePrivilege 772 powershell.exe Token: SeBackupPrivilege 772 powershell.exe Token: SeRestorePrivilege 772 powershell.exe Token: SeShutdownPrivilege 772 powershell.exe Token: SeDebugPrivilege 772 powershell.exe Token: SeSystemEnvironmentPrivilege 772 powershell.exe Token: SeRemoteShutdownPrivilege 772 powershell.exe Token: SeUndockPrivilege 772 powershell.exe Token: SeManageVolumePrivilege 772 powershell.exe Token: 33 772 powershell.exe Token: 34 772 powershell.exe Token: 35 772 powershell.exe Token: 36 772 powershell.exe Token: SeDebugPrivilege 5024 powershell.exe Token: SeDebugPrivilege 3732 powershell.exe Token: SeIncreaseQuotaPrivilege 5024 powershell.exe Token: SeSecurityPrivilege 5024 powershell.exe Token: SeTakeOwnershipPrivilege 5024 powershell.exe Token: SeLoadDriverPrivilege 5024 powershell.exe Token: SeSystemProfilePrivilege 5024 powershell.exe Token: SeSystemtimePrivilege 5024 powershell.exe Token: SeProfSingleProcessPrivilege 5024 powershell.exe Token: SeIncBasePriorityPrivilege 5024 powershell.exe Token: SeCreatePagefilePrivilege 5024 powershell.exe Token: SeBackupPrivilege 5024 powershell.exe Token: SeRestorePrivilege 5024 powershell.exe Token: SeShutdownPrivilege 5024 powershell.exe Token: SeDebugPrivilege 5024 powershell.exe Token: SeSystemEnvironmentPrivilege 5024 powershell.exe Token: SeRemoteShutdownPrivilege 5024 powershell.exe Token: SeUndockPrivilege 5024 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4496 wrote to memory of 2780 4496 e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe 74 PID 4496 wrote to memory of 2780 4496 e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe 74 PID 4496 wrote to memory of 4576 4496 e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe 76 PID 4496 wrote to memory of 4576 4496 e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe 76 PID 4496 wrote to memory of 3268 4496 e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe 79 PID 4496 wrote to memory of 3268 4496 e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe 79 PID 4496 wrote to memory of 4388 4496 e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe 81 PID 4496 wrote to memory of 4388 4496 e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe 81 PID 4388 wrote to memory of 772 4388 svchost.exe 83 PID 4388 wrote to memory of 772 4388 svchost.exe 83 PID 4388 wrote to memory of 68 4388 svchost.exe 85 PID 4388 wrote to memory of 68 4388 svchost.exe 85 PID 4388 wrote to memory of 4512 4388 svchost.exe 87 PID 4388 wrote to memory of 4512 4388 svchost.exe 87 PID 4512 wrote to memory of 1836 4512 ~tl7896.tmp 88 PID 4512 wrote to memory of 1836 4512 ~tl7896.tmp 88 PID 4512 wrote to memory of 3100 4512 ~tl7896.tmp 90 PID 4512 wrote to memory of 3100 4512 ~tl7896.tmp 90 PID 4512 wrote to memory of 4592 4512 ~tl7896.tmp 92 PID 4512 wrote to memory of 4592 4512 ~tl7896.tmp 92 PID 4512 wrote to memory of 5024 4512 ~tl7896.tmp 94 PID 4512 wrote to memory of 5024 4512 ~tl7896.tmp 94 PID 4512 wrote to memory of 3732 4512 ~tl7896.tmp 96 PID 4512 wrote to memory of 3732 4512 ~tl7896.tmp 96 PID 4512 wrote to memory of 4420 4512 ~tl7896.tmp 98 PID 4512 wrote to memory of 4420 4512 ~tl7896.tmp 98 PID 4512 wrote to memory of 1664 4512 ~tl7896.tmp 100 PID 4512 wrote to memory of 1664 4512 ~tl7896.tmp 100 PID 4512 wrote to memory of 64 4512 ~tl7896.tmp 102 PID 4512 wrote to memory of 64 4512 ~tl7896.tmp 102 PID 64 wrote to memory of 3852 64 svchost.exe 103 PID 64 wrote to memory of 3852 64 svchost.exe 103 PID 64 wrote to memory of 4936 64 svchost.exe 105 PID 64 wrote to memory of 4936 64 svchost.exe 105 PID 64 wrote to memory of 4584 64 svchost.exe 107 PID 64 wrote to memory of 4584 64 svchost.exe 107 PID 64 wrote to memory of 1428 64 svchost.exe 109 PID 64 wrote to memory of 1428 64 svchost.exe 109 PID 64 wrote to memory of 1680 64 svchost.exe 111 PID 64 wrote to memory of 1680 64 svchost.exe 111 PID 64 wrote to memory of 2284 64 svchost.exe 113 PID 64 wrote to memory of 2284 64 svchost.exe 113 PID 2284 wrote to memory of 3480 2284 ~tl6B53.tmp 114 PID 2284 wrote to memory of 3480 2284 ~tl6B53.tmp 114 PID 2284 wrote to memory of 4712 2284 ~tl6B53.tmp 116 PID 2284 wrote to memory of 4712 2284 ~tl6B53.tmp 116 PID 2284 wrote to memory of 1804 2284 ~tl6B53.tmp 118 PID 2284 wrote to memory of 1804 2284 ~tl6B53.tmp 118 PID 2284 wrote to memory of 4512 2284 ~tl6B53.tmp 120 PID 2284 wrote to memory of 4512 2284 ~tl6B53.tmp 120 PID 2284 wrote to memory of 1472 2284 ~tl6B53.tmp 122 PID 2284 wrote to memory of 1472 2284 ~tl6B53.tmp 122 PID 1748 wrote to memory of 3516 1748 svchost.exe 125 PID 1748 wrote to memory of 3516 1748 svchost.exe 125 PID 1748 wrote to memory of 2296 1748 svchost.exe 127 PID 1748 wrote to memory of 2296 1748 svchost.exe 127 PID 1748 wrote to memory of 1888 1748 svchost.exe 129 PID 1748 wrote to memory of 1888 1748 svchost.exe 129 PID 1748 wrote to memory of 3384 1748 svchost.exe 131 PID 1748 wrote to memory of 3384 1748 svchost.exe 131 PID 1748 wrote to memory of 4676 1748 svchost.exe 133 PID 1748 wrote to memory of 4676 1748 svchost.exe 133 PID 1748 wrote to memory of 1524 1748 svchost.exe 136 PID 1748 wrote to memory of 1524 1748 svchost.exe 136 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe"C:\Users\Admin\AppData\Local\Temp\e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM2⤵
- Creates scheduled task(s)
PID:3268
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:68
-
-
C:\Users\Admin\AppData\Local\Temp\~tl7896.tmpC:\Users\Admin\AppData\Local\Temp\~tl7896.tmp3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SYSTEM32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645114⤵PID:1836
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3100
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4592
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /TN "Timer"4⤵PID:4420
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM4⤵
- Creates scheduled task(s)
PID:1664
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SYSTEM32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645115⤵PID:3852
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:4936
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:4584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\~tl6B53.tmpC:\Users\Admin\AppData\Local\Temp\~tl6B53.tmp5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SYSTEM32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645116⤵PID:3480
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4712
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:1804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\6⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \6⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
-
-
-
-
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645112⤵
- Modifies data under HKEY_USERS
PID:3516
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:2296
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:1888
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Windows\TEMP\~tl682E.tmpC:\Windows\TEMP\~tl682E.tmp2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1524 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645113⤵PID:5112
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:4340
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:996
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4572
-
-
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:216 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645112⤵PID:932
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:1372
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:1444
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3548
-
-
C:\Windows\TEMP\~tlCFF3.tmpC:\Windows\TEMP\~tlCFF3.tmp2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4288 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645113⤵PID:4596
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:4240
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:1956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:64
-
-
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2920 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645112⤵PID:3256
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:4424
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:3464
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4916
-
-
C:\Windows\TEMP\~tl40A1.tmpC:\Windows\TEMP\~tl40A1.tmp2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:900 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645113⤵PID:3908
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:192
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:2948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:972
-
-
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:3924 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645112⤵PID:4116
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:1572
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:2728
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4540
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3684
-
-
C:\Windows\TEMP\~tlAF3D.tmpC:\Windows\TEMP\~tlAF3D.tmp2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2428 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645113⤵
- Modifies data under HKEY_USERS
PID:648
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:3944
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:60
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2204
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:680
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5cd5b15b46b9fe0d89c2b8d351c303d2a
SHA1e1d30a8f98585e20c709732c013e926c7078a3c2
SHA2560a8a0dcbec27e07c8dc9ef31622ac41591871416ccd9146f40d8cc9a2421da7a
SHA512d7261b2ff89adcdb909b775c6a47b3cd366b7c3f5cbb4f60428e849582c93e14e76d7dcadec79003eef7c9a3059e305d5e4f6b5b912b9ebc3518e06b0d284dd7
-
Filesize
291B
MD534e83e3d702f89263d216834036dd351
SHA11cacb59d7015a31d701398943367b50fd66506b6
SHA2566da7ce13a46c3d11aced521aa8f388e341ace0dcf86180e5e0fedd108d3928c8
SHA5127bc3593567b0dc0a41ce3baad0205fc9228fd61381e94971448ae4b87b8dcad4032deac039070469851e972f636beec3212cccff379509d1fe72c6cc28732706
-
Filesize
1KB
MD5cd6448170a2a479bc0eecbbbedbf288c
SHA168151783f621f379cb6b75c184bb2dddc3dad40c
SHA256cc93065ef11aed27cec65cc5cfcb695d7a281972977908fd94e4b4a6fd13835f
SHA5128a23c82433cf271a4cd78d6517a51a93dcb24e038f49b1dc18f6b9fdb17dcd7fca8672ccd7ff84a60ef9c72bc6753b85803314dd318e69f569e633b537bc0b37
-
Filesize
1KB
MD5d847d0d0f1713fa8ad7f9c3acee8f322
SHA1a35692962caa89e60166af7a8969a9b4e36c562c
SHA256387a48b6628332f6fbd0bf50d15d955a125bb40b99a4ee6b08479a9ab33a072c
SHA512971b536ac22a514c3ab49c40623062a6dcb951a76f983d382536e99056592ea9e3a280262aeafe8c2ffae908fe66f641ada1d1f9affd1e825336a0934c8c5eae
-
Filesize
1KB
MD5adac08c1d01400753eea2f92af36880b
SHA1a60759bdf444338148171b355d86f4af298e4de1
SHA256a0d2153301a1a461d8abd06465243a05fc09761a949ed312381a7971e18e59f1
SHA51225e39967f39e8e3eeb2df9892da830fde43936417697ac1cfebab049e7555299a5f8171f5132307ee83935dd645a7f3bcc91aac80b6c6d91a5492352ef57c43d
-
Filesize
1KB
MD5a09666eac37fbaec8eb9921971ca13d7
SHA192e9d22c8ef0509bfe6da6702738a359b7344192
SHA2569efb065ac67af0f22dd03721a9ed1b1d65e0f5348cd34f3f71dfa1eae4e1c0ac
SHA512e0eeac934a9569f935371e689b504790ddd1ba5fe7c35b972b83ac82892dd20624c62f6a78d0a9261af4330d7e9b9fbfe6ac949ae7bcd2c71a618a428f7f9344
-
Filesize
1KB
MD5569dfcf2759fb1fcff9ce7209cc0894d
SHA17515ef58a95919e6457eb1e454620e565f270738
SHA2561a69e712afc463828fbc3de7414f9de4a213efa2e20e1fae7e7b09d8d9421e70
SHA51294c6aec9555028cd759edfd28c183542ecab1d4f00eac1bccb4f351c9c1ab0f023a52f937e145bd6e78727e006c4e0cabccc33e34d6cf86942f6e9150be29dc3
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
393KB
MD59dbdd43a2e0b032604943c252eaf634a
SHA19584dc66f3c1cce4210fdf827a1b4e2bb22263af
SHA25633c53cd5265502e7b62432dba0e1b5ed702b5007cc79973ccd1e71b2acc01e86
SHA512b7b20b06dac952a96eda254bad29966fe7a4f827912beb0bc66d5af5b302d7c0282d70c1b01ff782507dd03a1d58706f05cb157521c7f2887a43085ffe5f94d1
-
Filesize
385KB
MD5e802c96760e48c5139995ffb2d891f90
SHA1bba3d278c0eb1094a26e5d2f4c099ad685371578
SHA256cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c
SHA51297300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0
-
Filesize
2.6MB
MD5ce429ca18521f43e55a599bb78c1cc24
SHA1264524f1bf8939e983069aa7752fd2f66798f7b0
SHA256ed9ec12bba9fded5d2021a7c9f0474e2f09cc7f1b85617d3e789653dd3e581a4
SHA512f8bc49d99fc4958e96e39331b80ea795c2124048ec9c199bce6b33ecf435a27c53c8b3517142d9a8695b125ee750afb8503fd6de384fd67c7ca2364d6f8999ab
-
Filesize
15.0MB
MD518b3e45d47deaffe6bd46ad4b71d13ba
SHA1ab92f95e99593c1452a150d08888d521cffa3065
SHA256c66116b9b379bd2eb625c7abdd9bba8e4088610948fcf9650f6d96f48e828f9d
SHA512081178f574e7d49f329b46477259647833e19ab401624c402a6f12b0ff59a7fca955d51e6ebf4c28774da32a2ff1c1acee21a9a8d8d99a2123770988cc93e88a
-
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\output1[1].jpg
Filesize393KB
MD572e28e2092a43e0d70289f62bec20e65
SHA1944f2b81392ee946f4767376882c5c1bda6dddb5
SHA2566ec8fe67dc01d8c3de9cfc94ca49ae25e46ed61f5a48f1a956ef269efa4ae08f
SHA51231c0587cd1df4d63088973d72a015b144b64411031ac4c1904c54c4f43b5990b8016cc6d29e3b0238f86432005588c72b98806306918fdaf2786498de340e466
-
Filesize
5.3MB
MD54a6096deaaaf3fe393b61d66540ce4ab
SHA19f91f6feae419a73a3371e06206b5e459281cff0
SHA256e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5
SHA5129322c12a042ef7914bedf73618b135775f99bcc352e23b606e6887f1e7843bda3fb9025a06eefb4bd1468a69565f6f8d34bacf0d0fcbd4ee7c34cd46c96e6d01
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize3KB
MD5478f1c1fcff584f4f440469ed71d2d43
SHA10900e9dc39580d527c145715f985a5a86e80b66c
SHA256c918bf6bad93b653f9d05007634b088be7b91ed4350b777905d0520d93d650eb
SHA5124ed62f2add77e0dd8e07e101ee06bdb8a15808b701c7580b09704bd4befdecf7cfe2fa29d6e96f2149a92f4e1b0cae0d9810a5cde3f4940145f8120f7322d1a7
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize238B
MD59ba6b6d4349205355156f622caeab348
SHA1732a088122a20b3ef02895c6b23ce6213b147d3f
SHA2567682364047d3ab80513edb7de403e5d38644bc7d7c958f777137492b80c3edd1
SHA512543dff25f76fb3b727e39885a3f0e6db0186fc629e94e69f0ddbafbe8e6cc9d38b355536d837db47e46e30102e08380ab6ff993aa25edcb8a7d4804ba004b81c
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5d03d7688ce6a97b613f1d70ac7d35bb7
SHA1ed6013656778a4e42f603e1f90e17a44b53609dc
SHA2569ed9637e10b509e13ebe42cd29cdeeb27502862b243349dae5955b17836e2ec5
SHA512de2fbbb173a6d5dbe50b014105a3b9fe76c759e4e3f3569f6be7f8ea56b8aa055724680c9879531ba334d81e730be102ede9cffe40a88096c65c5e33f26e4050
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5e9d12fbdb708bc93bbcdc58836932664
SHA19d30d763acbe3fc11c7abc76211a0e6a96d7729e
SHA256d5a80b5c419dbaff5a9fa7fe681702950c9b56eb1975aaed0cdb1412cceeed55
SHA5128ae8f1a7ba72ee42690758605ef6ef7c2fd53a9860bbadbe192574eeacbbc5fa633a7ccf24873e00deb9e43b968bfce2f4a92146d7ba72514b5ac6a4a1961f5b
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5090d628911e80097006ddd9b5185acf0
SHA1393dcb147dc9a39fd5c7034a60998f9f4eb3d9d9
SHA256129cb956614253f37a24fd398eeb0f9b58d8c37af2e725920eb677714c06da58
SHA51298ff306980bf8ed2168958824aff6f5a60cede491d3070569f3d43819511083dba36962e977b78833bb95cdc645eafac40732c07fbdf3772c5df8f901b8864ed
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD562dfe980c7cb47220278044b9227b88e
SHA11daf71e3ff9f7ba2915e939c6c3cf7ec5a309d98
SHA2563d13cf90f22ec2a6fe9da67db00545581aa8f8c3bbfe1812832a216f92cdd23a
SHA512dceb60199539aab1db79bea6530808f3714d254a6ef1083df770bcd4cdb984ab9932f41c2644714ae5b14968acee40e4e3b8215eb34134edb0503b342dca1f76
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5107546403faea127d3b37b9fe17c8049
SHA1b456310efda3af71e89887c5a46e0aa493e244b5
SHA256253805320c8c265a9c295e453d9bfc19484cab5e5756ec44e07c359fe14ac650
SHA512ad98a463e566d8e6afa5abcc91f18e96f711e31319c44ce0b39bb24a60fd9ed5829522362718db268add261a1c022aba4fe46ca21cc58cda112658e57e7d9e65
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD50f0a22392f443d7245e77f82ded37bde
SHA15bfd4604694f2807167f7f45e953375135319ebf
SHA256890d8344a25f28df64cd133988764a0dc987e762b5cf366f10cf1bb89a8d9273
SHA51226ddce3739b28d5779fac72a509156ac463d73d3281d6819b2e24d3e47438d156f1a1029fbbc8526789d8a7ec39b2cf38ace2da8d410c8c86457a01003e8dc88
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD58b4e261fdbc669a3ab4ce1951f64b6d0
SHA1f220df89c6d4ac24e31a542af997a35a512de365
SHA25657041b41d40f0c36f7653beab1718fbdaaf7d5ffc0fd72b64c8a541a5dc8c8d2
SHA512eb7ea8f5d08af67f841c45321a174f806d3fc19e907e02999b0aa4388042bf9b7879e939e3ffac94394a7442a920a8f9d96586a50d00cc51f32f3a5bc71d8ae2
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD57a1ebcc51380124f1bafbe67c5f83fad
SHA1888c905d49922b0da1083bb8d819d7244d61efae
SHA25649026bdb74d4716f39b249208bf3e4949b0cae59841d1ba4f8d3953cb5fa8a04
SHA512b9a1217efb52debb78fc2569fe1921a0b417ec911ba9139b780b402951d15723a5ea5eb71f4cf8a04d0dd909ac9aebc728195a1466392806943b1af652f670a5
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5631f4b3792b263fdda6b265e93be4747
SHA11d6916097d419198bfdf78530d59d0d9f3e12d45
SHA2564e68d2d067c5680a2e55853ac58b16f199b09f1b9e5f2174605fff18da828976
SHA512e0280041c4ca63971ab2524f25d2047820f031c1b4aeb6021a3367297045ddf6616ffccafb54630eb07fd154571d844329ebcc34d6ce64834cb77cba373e4fbe