Analysis
-
max time kernel
70s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
28-04-2024 08:58
Behavioral task
behavioral1
Sample
Delta.exe
Resource
win10-20240404-en
General
-
Target
Delta.exe
-
Size
77KB
-
MD5
ccb29e859a2e8b208a32a1b9465c1a98
-
SHA1
b580f6721b6dfb0fb7918bb274c53d39b53f024e
-
SHA256
3453e80601ac6d0a84e8119a494552e96d7de44de2ae01e5ec84d1e12d13b165
-
SHA512
4b095b10ee0d5bef1672805df0094c9d52a705a876b945f15511be1400923cce374a235bcf13ab042ab97090d42a6b9a5dcb6fc150b5ef5bebfc6f51c31a3345
-
SSDEEP
1536:AFQyer8xk6kI3JJEqYH1oecoaWNyb3AYfa3wzJr6NYiOlCZT36EU:Am3IF3vEtH1oTb3AYxiOlCZbLU
Malware Config
Extracted
xworm
materials-thumbzilla.gl.at.ply.gg:24190
-
Install_directory
%Temp%
-
install_file
Microsoft Network.exe
Signatures
-
Detect Xworm Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1468-0-0x0000000000C20000-0x0000000000C3A000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\Microsoft Network.exe family_xworm -
Drops startup file 2 IoCs
Processes:
Delta.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Network.lnk Delta.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Network.lnk Delta.exe -
Executes dropped EXE 1 IoCs
Processes:
Microsoft Network.exepid process 4808 Microsoft Network.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Delta.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Network = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft Network.exe" Delta.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Drops file in Windows directory 4 IoCs
Processes:
taskmgr.exesvchost.exesvchost.exedescription ioc process File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\INF\netsstpa.PNF svchost.exe File created C:\Windows\INF\netrasa.PNF svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Mfg svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe -
Modifies registry class 1 IoCs
Processes:
taskmgr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exetaskmgr.exepowershell.exepowershell.exepowershell.exeDelta.exepid process 3116 powershell.exe 3116 powershell.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 3116 powershell.exe 4468 taskmgr.exe 4988 powershell.exe 4988 powershell.exe 4988 powershell.exe 4468 taskmgr.exe 2172 powershell.exe 2172 powershell.exe 2172 powershell.exe 3676 powershell.exe 3676 powershell.exe 4468 taskmgr.exe 3676 powershell.exe 4468 taskmgr.exe 1468 Delta.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe -
Suspicious behavior: LoadsDriver 6 IoCs
Processes:
pid 4 4 4 4 4 632 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Delta.exepowershell.exetaskmgr.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1468 Delta.exe Token: SeDebugPrivilege 3116 powershell.exe Token: SeDebugPrivilege 4468 taskmgr.exe Token: SeSystemProfilePrivilege 4468 taskmgr.exe Token: SeCreateGlobalPrivilege 4468 taskmgr.exe Token: SeIncreaseQuotaPrivilege 3116 powershell.exe Token: SeSecurityPrivilege 3116 powershell.exe Token: SeTakeOwnershipPrivilege 3116 powershell.exe Token: SeLoadDriverPrivilege 3116 powershell.exe Token: SeSystemProfilePrivilege 3116 powershell.exe Token: SeSystemtimePrivilege 3116 powershell.exe Token: SeProfSingleProcessPrivilege 3116 powershell.exe Token: SeIncBasePriorityPrivilege 3116 powershell.exe Token: SeCreatePagefilePrivilege 3116 powershell.exe Token: SeBackupPrivilege 3116 powershell.exe Token: SeRestorePrivilege 3116 powershell.exe Token: SeShutdownPrivilege 3116 powershell.exe Token: SeDebugPrivilege 3116 powershell.exe Token: SeSystemEnvironmentPrivilege 3116 powershell.exe Token: SeRemoteShutdownPrivilege 3116 powershell.exe Token: SeUndockPrivilege 3116 powershell.exe Token: SeManageVolumePrivilege 3116 powershell.exe Token: 33 3116 powershell.exe Token: 34 3116 powershell.exe Token: 35 3116 powershell.exe Token: 36 3116 powershell.exe Token: SeDebugPrivilege 4988 powershell.exe Token: SeIncreaseQuotaPrivilege 4988 powershell.exe Token: SeSecurityPrivilege 4988 powershell.exe Token: SeTakeOwnershipPrivilege 4988 powershell.exe Token: SeLoadDriverPrivilege 4988 powershell.exe Token: SeSystemProfilePrivilege 4988 powershell.exe Token: SeSystemtimePrivilege 4988 powershell.exe Token: SeProfSingleProcessPrivilege 4988 powershell.exe Token: SeIncBasePriorityPrivilege 4988 powershell.exe Token: SeCreatePagefilePrivilege 4988 powershell.exe Token: SeBackupPrivilege 4988 powershell.exe Token: SeRestorePrivilege 4988 powershell.exe Token: SeShutdownPrivilege 4988 powershell.exe Token: SeDebugPrivilege 4988 powershell.exe Token: SeSystemEnvironmentPrivilege 4988 powershell.exe Token: SeRemoteShutdownPrivilege 4988 powershell.exe Token: SeUndockPrivilege 4988 powershell.exe Token: SeManageVolumePrivilege 4988 powershell.exe Token: 33 4988 powershell.exe Token: 34 4988 powershell.exe Token: 35 4988 powershell.exe Token: 36 4988 powershell.exe Token: SeDebugPrivilege 2172 powershell.exe Token: SeIncreaseQuotaPrivilege 2172 powershell.exe Token: SeSecurityPrivilege 2172 powershell.exe Token: SeTakeOwnershipPrivilege 2172 powershell.exe Token: SeLoadDriverPrivilege 2172 powershell.exe Token: SeSystemProfilePrivilege 2172 powershell.exe Token: SeSystemtimePrivilege 2172 powershell.exe Token: SeProfSingleProcessPrivilege 2172 powershell.exe Token: SeIncBasePriorityPrivilege 2172 powershell.exe Token: SeCreatePagefilePrivilege 2172 powershell.exe Token: SeBackupPrivilege 2172 powershell.exe Token: SeRestorePrivilege 2172 powershell.exe Token: SeShutdownPrivilege 2172 powershell.exe Token: SeDebugPrivilege 2172 powershell.exe Token: SeSystemEnvironmentPrivilege 2172 powershell.exe Token: SeRemoteShutdownPrivilege 2172 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe 4468 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Delta.exepid process 1468 Delta.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Delta.exedescription pid process target process PID 1468 wrote to memory of 3116 1468 Delta.exe powershell.exe PID 1468 wrote to memory of 3116 1468 Delta.exe powershell.exe PID 1468 wrote to memory of 4988 1468 Delta.exe powershell.exe PID 1468 wrote to memory of 4988 1468 Delta.exe powershell.exe PID 1468 wrote to memory of 2172 1468 Delta.exe powershell.exe PID 1468 wrote to memory of 2172 1468 Delta.exe powershell.exe PID 1468 wrote to memory of 3676 1468 Delta.exe powershell.exe PID 1468 wrote to memory of 3676 1468 Delta.exe powershell.exe PID 1468 wrote to memory of 648 1468 Delta.exe schtasks.exe PID 1468 wrote to memory of 648 1468 Delta.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\Delta.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Delta.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Delta.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Microsoft Network.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft Network.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Microsoft Network" /tr "C:\Users\Admin\AppData\Local\Temp\Microsoft Network.exe"2⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\System32\SystemSettingsBroker.exeC:\Windows\System32\SystemSettingsBroker.exe -Embedding1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s RmSvc1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s SstpSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵
- Drops file in Windows directory
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s RasMan1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Network.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Network.exe"1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD58592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5fe4bf909ae9efaf3f256888a05e50cd4
SHA19b01c948a2227b9285f080667c4c497add1c585b
SHA2569e0758d21ba516270ec32eac23d0964915523d3f4d7a9d689188040a0850d781
SHA5127714d0e02c997613c89cb5ccddce6aea211f107b6aef9fd53db3d898df9327498a685136cdcbc16bcf3d2eb8e65adee92e8ba6c4c6e4bb4def50c61a4a4ae9e9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5092e21ac5a2e9e01c734d0ab7daa29bf
SHA18ddb3cb7abdff968174a3590a084348ff81fa4de
SHA2567314c098591f9b537084f4bc1b587142f442dd05bb38f35177dcfb1b7bbc2ff0
SHA5127a28bc142c7c8994c0dc41d4c36f2396e7fdab9be96e276186c09c6c0ed382900b895705d76090778a26298bed4551c53ebe0181f81e470c7b03c07157926eb3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5a953721d088e3d07456fdfca2220f99c
SHA15b12aded20d8ab611f9e8fa25d458f9ef0f91a72
SHA2567dcf742206203a1a98cc04e546ae8482a43e6c1a449e34fb1f5a97b414af66e4
SHA51277564f706ffda97a399c1c06b12774385f2f4a64c74037069c6d2549dc5bf127b5f70bfaefb30b0e76a9aae360131b4203e2fd2de2a8b6ff89cc420b63a3fb18
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Network.exeFilesize
77KB
MD5ccb29e859a2e8b208a32a1b9465c1a98
SHA1b580f6721b6dfb0fb7918bb274c53d39b53f024e
SHA2563453e80601ac6d0a84e8119a494552e96d7de44de2ae01e5ec84d1e12d13b165
SHA5124b095b10ee0d5bef1672805df0094c9d52a705a876b945f15511be1400923cce374a235bcf13ab042ab97090d42a6b9a5dcb6fc150b5ef5bebfc6f51c31a3345
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jfbtrelq.v3l.ps1Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Network.lnkFilesize
1KB
MD5101ddf9221db5f5eb3909676808cde69
SHA1c59cded34a24879f68211d2d20dae513b6cda2f4
SHA256574299a8b5c8b986e529db1c1662da5e001776f20644ce6395f4c1c708de4388
SHA51299f0bd4ed8a085e1b617b91f82a1445d1a1bb7622f51d48ba5c3d9e2bf6ec17b37be77103395a42563aeb7f0082e0a066a6370964d9ddabfc41606a140adb36e
-
C:\Windows\INF\netrasa.PNFFilesize
22KB
MD580648b43d233468718d717d10187b68d
SHA1a1736e8f0e408ce705722ce097d1adb24ebffc45
SHA2568ab9a39457507e405ade5ef9d723e0f89bc46d8d8b33d354b00d95847f098380
SHA512eec0ac7e7abcf87b3f0f4522b0dd95c658327afb866ceecff3c9ff0812a521201d729dd71d43f3ac46536f8435d4a49ac157b6282077c7c1940a6668f3b3aea9
-
C:\Windows\INF\netsstpa.PNFFilesize
6KB
MD501e21456e8000bab92907eec3b3aeea9
SHA139b34fe438352f7b095e24c89968fca48b8ce11c
SHA25635ad0403fdef3fce3ef5cd311c72fef2a95a317297a53c02735cda4bd6e0c74f
SHA5129d5153450e8fe3f51f20472bae4a2ab2fed43fad61a89b04a70325559f6ffed935dd72212671cc6cfc0288458d359bc71567f0d9af8e5770d696adc5bdadd7ec
-
memory/1468-2-0x0000000001450000-0x0000000001460000-memory.dmpFilesize
64KB
-
memory/1468-1-0x00007FFA2DF70000-0x00007FFA2E95C000-memory.dmpFilesize
9.9MB
-
memory/1468-0-0x0000000000C20000-0x0000000000C3A000-memory.dmpFilesize
104KB
-
memory/1468-197-0x00007FFA2DF70000-0x00007FFA2E95C000-memory.dmpFilesize
9.9MB
-
memory/1468-198-0x0000000001450000-0x0000000001460000-memory.dmpFilesize
64KB
-
memory/3116-10-0x0000021E40D60000-0x0000021E40D70000-memory.dmpFilesize
64KB
-
memory/3116-8-0x00007FFA2DF70000-0x00007FFA2E95C000-memory.dmpFilesize
9.9MB
-
memory/3116-7-0x0000021E40EA0000-0x0000021E40EC2000-memory.dmpFilesize
136KB
-
memory/3116-13-0x0000021E595C0000-0x0000021E59636000-memory.dmpFilesize
472KB
-
memory/3116-56-0x00007FFA2DF70000-0x00007FFA2E95C000-memory.dmpFilesize
9.9MB
-
memory/3116-9-0x0000021E40D60000-0x0000021E40D70000-memory.dmpFilesize
64KB