Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
17/04/2024, 12:37
240417-pths4afc45 817/04/2024, 12:37
240417-ptg7kafc43 817/04/2024, 12:36
240417-ptcbbafc34 817/04/2024, 12:36
240417-ptbpsafc29 817/04/2024, 12:36
240417-pta39afc28 816/04/2024, 13:44
240416-q1vxnsda7z 8Analysis
-
max time kernel
600s -
max time network
601s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
17/04/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win11-20240412-en
General
-
Target
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
-
Size
5.3MB
-
MD5
63552c60caeefe5f2d0e4028b3cc65d3
-
SHA1
dbed3040d53495a6afda01bfb8399376792eb48c
-
SHA256
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab
-
SHA512
caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0
-
SSDEEP
98304:vwrOjNr08jQxkFg97Nw76XgfqCPa1AQy2cmw:YC5r0wQxKg97Nw76XgyC6
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 10 IoCs
pid Process 3044 netsh.exe 3820 netsh.exe 4808 netsh.exe 876 netsh.exe 3048 netsh.exe 3968 netsh.exe 1476 netsh.exe 3716 netsh.exe 1252 netsh.exe 828 netsh.exe -
Executes dropped EXE 6 IoCs
pid Process 4412 svchost.exe 3516 ~tl9007.tmp 1152 svchost.exe 4720 ~tl741E.tmp 4952 svchost.exe 1700 ~tl9671.tmp -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[1].htm ~tl9671.tmp File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\output1[1].jpg svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat ~tl9671.tmp File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[1].htm svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\System\svchost.exe 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe File opened for modification C:\Windows\System\svchost.exe 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak ~tl9007.tmp File opened for modification C:\Windows\System\svchost.exe ~tl9007.tmp File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3808 schtasks.exe 3512 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace\Session netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ~tl9671.tmp Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet netsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ~tl9671.tmp Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 1064 powershell.exe 4072 powershell.exe 4072 powershell.exe 1064 powershell.exe 4072 powershell.exe 1064 powershell.exe 4024 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 4024 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 4452 powershell.exe 5028 powershell.exe 4452 powershell.exe 5028 powershell.exe 4452 powershell.exe 5028 powershell.exe 3516 ~tl9007.tmp 3516 ~tl9007.tmp 752 powershell.exe 752 powershell.exe 2652 powershell.exe 2652 powershell.exe 752 powershell.exe 2652 powershell.exe 3516 ~tl9007.tmp 3516 ~tl9007.tmp 1152 svchost.exe 1152 svchost.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3588 powershell.exe 3588 powershell.exe 3588 powershell.exe 4720 ~tl741E.tmp 4720 ~tl741E.tmp 684 powershell.exe 684 powershell.exe 4072 powershell.exe 4072 powershell.exe 4072 powershell.exe 684 powershell.exe 4952 svchost.exe 4952 svchost.exe 308 powershell.exe 308 powershell.exe 1088 powershell.exe 308 powershell.exe 1088 powershell.exe 1088 powershell.exe 1700 ~tl9671.tmp 1700 ~tl9671.tmp 4408 powershell.exe 4408 powershell.exe 5028 powershell.exe 5028 powershell.exe 4408 powershell.exe 5028 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1064 powershell.exe Token: SeDebugPrivilege 4072 powershell.exe Token: SeIncreaseQuotaPrivilege 1064 powershell.exe Token: SeSecurityPrivilege 1064 powershell.exe Token: SeTakeOwnershipPrivilege 1064 powershell.exe Token: SeLoadDriverPrivilege 1064 powershell.exe Token: SeSystemProfilePrivilege 1064 powershell.exe Token: SeSystemtimePrivilege 1064 powershell.exe Token: SeProfSingleProcessPrivilege 1064 powershell.exe Token: SeIncBasePriorityPrivilege 1064 powershell.exe Token: SeCreatePagefilePrivilege 1064 powershell.exe Token: SeBackupPrivilege 1064 powershell.exe Token: SeRestorePrivilege 1064 powershell.exe Token: SeShutdownPrivilege 1064 powershell.exe Token: SeDebugPrivilege 1064 powershell.exe Token: SeSystemEnvironmentPrivilege 1064 powershell.exe Token: SeRemoteShutdownPrivilege 1064 powershell.exe Token: SeUndockPrivilege 1064 powershell.exe Token: SeManageVolumePrivilege 1064 powershell.exe Token: 33 1064 powershell.exe Token: 34 1064 powershell.exe Token: 35 1064 powershell.exe Token: 36 1064 powershell.exe Token: SeDebugPrivilege 4452 powershell.exe Token: SeDebugPrivilege 5028 powershell.exe Token: SeIncreaseQuotaPrivilege 5028 powershell.exe Token: SeSecurityPrivilege 5028 powershell.exe Token: SeTakeOwnershipPrivilege 5028 powershell.exe Token: SeLoadDriverPrivilege 5028 powershell.exe Token: SeSystemProfilePrivilege 5028 powershell.exe Token: SeSystemtimePrivilege 5028 powershell.exe Token: SeProfSingleProcessPrivilege 5028 powershell.exe Token: SeIncBasePriorityPrivilege 5028 powershell.exe Token: SeCreatePagefilePrivilege 5028 powershell.exe Token: SeBackupPrivilege 5028 powershell.exe Token: SeRestorePrivilege 5028 powershell.exe Token: SeShutdownPrivilege 5028 powershell.exe Token: SeDebugPrivilege 5028 powershell.exe Token: SeSystemEnvironmentPrivilege 5028 powershell.exe Token: SeRemoteShutdownPrivilege 5028 powershell.exe Token: SeUndockPrivilege 5028 powershell.exe Token: SeManageVolumePrivilege 5028 powershell.exe Token: 33 5028 powershell.exe Token: 34 5028 powershell.exe Token: 35 5028 powershell.exe Token: 36 5028 powershell.exe Token: SeDebugPrivilege 752 powershell.exe Token: SeDebugPrivilege 2652 powershell.exe Token: SeIncreaseQuotaPrivilege 752 powershell.exe Token: SeSecurityPrivilege 752 powershell.exe Token: SeTakeOwnershipPrivilege 752 powershell.exe Token: SeLoadDriverPrivilege 752 powershell.exe Token: SeSystemProfilePrivilege 752 powershell.exe Token: SeSystemtimePrivilege 752 powershell.exe Token: SeProfSingleProcessPrivilege 752 powershell.exe Token: SeIncBasePriorityPrivilege 752 powershell.exe Token: SeCreatePagefilePrivilege 752 powershell.exe Token: SeBackupPrivilege 752 powershell.exe Token: SeRestorePrivilege 752 powershell.exe Token: SeShutdownPrivilege 752 powershell.exe Token: SeDebugPrivilege 752 powershell.exe Token: SeSystemEnvironmentPrivilege 752 powershell.exe Token: SeRemoteShutdownPrivilege 752 powershell.exe Token: SeUndockPrivilege 752 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4024 wrote to memory of 1064 4024 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 73 PID 4024 wrote to memory of 1064 4024 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 73 PID 4024 wrote to memory of 4072 4024 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 75 PID 4024 wrote to memory of 4072 4024 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 75 PID 4024 wrote to memory of 3808 4024 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 78 PID 4024 wrote to memory of 3808 4024 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 78 PID 4024 wrote to memory of 4412 4024 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 80 PID 4024 wrote to memory of 4412 4024 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 80 PID 4412 wrote to memory of 5028 4412 svchost.exe 82 PID 4412 wrote to memory of 5028 4412 svchost.exe 82 PID 4412 wrote to memory of 4452 4412 svchost.exe 83 PID 4412 wrote to memory of 4452 4412 svchost.exe 83 PID 4412 wrote to memory of 3516 4412 svchost.exe 86 PID 4412 wrote to memory of 3516 4412 svchost.exe 86 PID 3516 wrote to memory of 4340 3516 ~tl9007.tmp 87 PID 3516 wrote to memory of 4340 3516 ~tl9007.tmp 87 PID 3516 wrote to memory of 1476 3516 ~tl9007.tmp 89 PID 3516 wrote to memory of 1476 3516 ~tl9007.tmp 89 PID 3516 wrote to memory of 3716 3516 ~tl9007.tmp 91 PID 3516 wrote to memory of 3716 3516 ~tl9007.tmp 91 PID 3516 wrote to memory of 752 3516 ~tl9007.tmp 93 PID 3516 wrote to memory of 752 3516 ~tl9007.tmp 93 PID 3516 wrote to memory of 2652 3516 ~tl9007.tmp 95 PID 3516 wrote to memory of 2652 3516 ~tl9007.tmp 95 PID 3516 wrote to memory of 2940 3516 ~tl9007.tmp 98 PID 3516 wrote to memory of 2940 3516 ~tl9007.tmp 98 PID 3516 wrote to memory of 3512 3516 ~tl9007.tmp 100 PID 3516 wrote to memory of 3512 3516 ~tl9007.tmp 100 PID 3516 wrote to memory of 1152 3516 ~tl9007.tmp 102 PID 3516 wrote to memory of 1152 3516 ~tl9007.tmp 102 PID 1152 wrote to memory of 3176 1152 svchost.exe 103 PID 1152 wrote to memory of 3176 1152 svchost.exe 103 PID 1152 wrote to memory of 828 1152 svchost.exe 105 PID 1152 wrote to memory of 828 1152 svchost.exe 105 PID 1152 wrote to memory of 1252 1152 svchost.exe 106 PID 1152 wrote to memory of 1252 1152 svchost.exe 106 PID 1152 wrote to memory of 3908 1152 svchost.exe 109 PID 1152 wrote to memory of 3908 1152 svchost.exe 109 PID 1152 wrote to memory of 3588 1152 svchost.exe 111 PID 1152 wrote to memory of 3588 1152 svchost.exe 111 PID 1152 wrote to memory of 4720 1152 svchost.exe 113 PID 1152 wrote to memory of 4720 1152 svchost.exe 113 PID 4720 wrote to memory of 3808 4720 ~tl741E.tmp 114 PID 4720 wrote to memory of 3808 4720 ~tl741E.tmp 114 PID 4720 wrote to memory of 3044 4720 ~tl741E.tmp 116 PID 4720 wrote to memory of 3044 4720 ~tl741E.tmp 116 PID 4720 wrote to memory of 3048 4720 ~tl741E.tmp 117 PID 4720 wrote to memory of 3048 4720 ~tl741E.tmp 117 PID 4720 wrote to memory of 684 4720 ~tl741E.tmp 120 PID 4720 wrote to memory of 684 4720 ~tl741E.tmp 120 PID 4720 wrote to memory of 4072 4720 ~tl741E.tmp 122 PID 4720 wrote to memory of 4072 4720 ~tl741E.tmp 122 PID 4952 wrote to memory of 1912 4952 svchost.exe 125 PID 4952 wrote to memory of 1912 4952 svchost.exe 125 PID 4952 wrote to memory of 3820 4952 svchost.exe 127 PID 4952 wrote to memory of 3820 4952 svchost.exe 127 PID 4952 wrote to memory of 3968 4952 svchost.exe 129 PID 4952 wrote to memory of 3968 4952 svchost.exe 129 PID 4952 wrote to memory of 308 4952 svchost.exe 131 PID 4952 wrote to memory of 308 4952 svchost.exe 131 PID 4952 wrote to memory of 1088 4952 svchost.exe 133 PID 4952 wrote to memory of 1088 4952 svchost.exe 133 PID 4952 wrote to memory of 1700 4952 svchost.exe 136 PID 4952 wrote to memory of 1700 4952 svchost.exe 136 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM2⤵
- Creates scheduled task(s)
PID:3808
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\~tl9007.tmpC:\Users\Admin\AppData\Local\Temp\~tl9007.tmp3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SYSTEM32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645114⤵PID:4340
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1476
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3716
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /TN "Timer"4⤵PID:2940
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM4⤵
- Creates scheduled task(s)
PID:3512
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SYSTEM32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645115⤵PID:3176
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:828
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:1252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\5⤵
- Suspicious behavior: EnumeratesProcesses
PID:3908
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \5⤵
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
-
C:\Users\Admin\AppData\Local\Temp\~tl741E.tmpC:\Users\Admin\AppData\Local\Temp\~tl741E.tmp5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SYSTEM32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645116⤵PID:3808
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:3044
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:3048
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\6⤵
- Suspicious behavior: EnumeratesProcesses
PID:684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \6⤵
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
-
-
-
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645112⤵
- Modifies data under HKEY_USERS
PID:1912
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:3820
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:3968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:308
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
-
C:\Windows\TEMP\~tl9671.tmpC:\Windows\TEMP\~tl9671.tmp2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1700 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645113⤵
- Modifies data under HKEY_USERS
PID:3136
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:4808
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5268b890dae39e430e8b127909067ed96
SHA135939515965c0693ef46e021254c3e73ea8c4a2b
SHA2567643d492a6f1e035b63b2e16c9c21d974a77dfd2d8e90b9c15ee412625e88c4c
SHA512abc4b2ce10a6566f38c00ad55e433791dd45fca47deec70178daf0763578ff019fb0ec70792d5e9ecde4eb6778a35ba8a8c7ecd07550597d9bbb13521c9b98fb
-
Filesize
1KB
MD5246694a613262d9e401f6be4615dff88
SHA140c86e65658237804991ec9c493649313a959656
SHA2560d8527acc24a3fd358d629c9108f4863efb773b299a67f265b0075b394bd60d0
SHA5120135b3e9ef9f1085a518c076abaaa5e12bcebbbd2ab7ebd8948c894ceac59e763e6d4c0ceb089011197523c492286cb0ae04a5a2d38bb2cdf2b16f79d4d611b7
-
Filesize
1KB
MD5ccc63e24453ce834e007e1fcf4ebbd5b
SHA1e94e9bb96127809dd73d78da16bf713dc42819db
SHA256eed35806ac0670c93c02cf7620055bd578671a262438e30fc9c018d342ab3f25
SHA512c2681a50865ce9718e53ff0238747475a7a47a52a45b7045abe36104c5f219a0c17975afb29640823e78ff1822f0075fba2a8c07cb1cd1373bed104d85622ad1
-
Filesize
1KB
MD59450dfeeadfadc104552b3bcce0a193e
SHA144759f7521e156978008ce1c0dbad5e660d07e17
SHA256b2a99ff5cbbf1ecb8c32c0eefb6897cbc88da3b28e7880c8d83563d686200dee
SHA512c88fb94f01a418cb94cc73c5fa5bd4b57b7a1332db9db59e0fb3039d88de21c27510abb3d30402aef64e751097a1dca03ce2d1e4466bcf48983f7db428bb2ddc
-
Filesize
1KB
MD5553991c7ec92e59ae864f6e05439bb31
SHA11d2b0bc1f64a447788b1346ba5c1141c1bf2c132
SHA25669fe45a6004949f55d6f508fae8239349441f2dc1cc6084702e651379c65b981
SHA5120f410491d11e0b1e9f18b1491a56f9d3f3948ddf975270e54442d5a5b0ef1b9e5b1cb32f5146f2bbc2543558269c12059e79653b5e1d2b6c6154c51c0ce8e893
-
Filesize
1KB
MD5357f83db5efbfcfcfd7b341fd9083be8
SHA177173d713ca439c2858655b5e7961abceed6e15f
SHA2560c9e57545470180291f41257115f29c5743a5038a24a48e7bda2916ce93affd8
SHA512665c85bcd1928ce128d199d9014e5303158f52cc4400d902444f64db776527bee76af07c3c87865a09429f43fbfc778bc4cedb6e6b47ff87730bed7537a07d32
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
393KB
MD59dbdd43a2e0b032604943c252eaf634a
SHA19584dc66f3c1cce4210fdf827a1b4e2bb22263af
SHA25633c53cd5265502e7b62432dba0e1b5ed702b5007cc79973ccd1e71b2acc01e86
SHA512b7b20b06dac952a96eda254bad29966fe7a4f827912beb0bc66d5af5b302d7c0282d70c1b01ff782507dd03a1d58706f05cb157521c7f2887a43085ffe5f94d1
-
Filesize
385KB
MD5e802c96760e48c5139995ffb2d891f90
SHA1bba3d278c0eb1094a26e5d2f4c099ad685371578
SHA256cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c
SHA51297300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0
-
Filesize
2.6MB
MD5e7634067c1219da664e2c13a622988bf
SHA1b354b3912ec59fefecdaa660af50c679b136b6ca
SHA256e1f51b61149b811c5029caaa39ddf54faa18fcd18bbcf432155ad324fbc0fdb7
SHA512b61ea1448ec13e88c66e043c0f99d95a2626e631841bec0b0e2e1dd6cbbcb8f8587d414f3ad32794ccdadf7c763910ed844220684f3edc71109f47fe4353c944
-
Filesize
7.8MB
MD53d315351bdaada2981a6a538c3a4a0ee
SHA14f8037408234c77084febafad461c70de2b031b6
SHA2565b2507f85ea4755ac4cc1a96b246402e246979d1a059b78707a6aed7e3159fd2
SHA5120815202976f5535f66d970c7e6de0a7d7fb1306a6b951624d9263fe8a2b2aefd073716312818e2a94385cd0c21e5e90b4daa9e829adc6b881e2c9f61273c9ad4
-
Filesize
5.3MB
MD563552c60caeefe5f2d0e4028b3cc65d3
SHA1dbed3040d53495a6afda01bfb8399376792eb48c
SHA25664e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab
SHA512caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize3KB
MD570b3ee3839890cd6e33de100160aa0f3
SHA1ea985ff7cc4164f5f436cb0ab193bd598fd51a49
SHA256fe9953998fabade77ae9294bb7fedfe83a59e7289a7dece404a8c82f15f7e46e
SHA5125f12857006e4f6fe1130f2135a13575f606d3d7863cdcfdd207443bbfb9039b3b041cfb48ea5dd8daec318a7287891d3bfb2086c23bf6b0aa09bc254330274da
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5a2827d30b5145524f58d64c51b70c3f4
SHA18f4fecc26fded0f5c4c8c8ae948ce5d8d665c8dc
SHA256cbf45dc2498ce9f494b7eba11d06f1516e54a986861ad4a6617716f90580172d
SHA512a77b18e822eec9904329ba20e220de2389cdba1a94967b3ca04d4463e209a9744b0c84cded6d012247bae321fc71e8cbd36b8ad760a302aa9753598e082dff21
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5302a7c179ef577c237c5418fb770fd27
SHA1343ef00d1357a8d2ff6e1143541a8a29435ed30c
SHA2569e6b50764916c21c41d6e7c4999bdf27120c069ec7a9268100e1ce5df845149f
SHA512f2472371a322d0352772defb959ea0a9da0d5ca8f412f6abafac2e6547bcc8a53394a6fb81b488521fc256bfc9f3205d92c6b69d6d139bdb260fb46578946699