Resubmissions
28-11-2024 02:19
241128-cr9sks1kht 1027-11-2024 21:08
241127-zyzyaawqgn 1027-11-2024 20:16
241127-y145caymbs 1027-11-2024 20:13
241127-yzlxdavlen 1027-11-2024 19:53
241127-yl61dsxpcs 1027-11-2024 19:38
241127-ycrjcaxkfx 1027-11-2024 19:03
241127-xqsswsslej 1027-11-2024 19:03
241127-xqf44aslcr 327-11-2024 19:02
241127-xpxqfsslan 327-11-2024 18:32
241127-w6pkqs1mek 10Analysis
-
max time kernel
299s -
max time network
300s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-08-2024 22:28
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
New Text Document mod.exe
Resource
win11-20240802-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
phorphiex
http://185.215.113.66/
http://91.202.233.141/
0xCa90599132C4D88907Bd8E046540284aa468a035
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
LLeT2zkStY3cvxMBFhoWXkG5VuZPoezduv
rwc4LVd9ABpULQ1CuCpDkgX2xVB1fUijyb
4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
17hgMFyLDwMjxWqw5GhijhnPdJDyFDqecY
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3FerB8kUraAVGCVCNkgv57zTBjUGjAUkU3
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1epx67ne4vckqmaj4gwke8m322f4yjr6eh52wqw
bc1qmpkehfffkr6phuklsksnd7nhgx0369sxu772m3
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
-
mutex
x88767657x
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
Extracted
quasar
1.4.1
newoffice
117.18.7.76:3782
d908c8ed-ea88-484e-a3d2-dcbe66ac7cfc
-
encryption_key
FD2DE574AF7E363A5304DF85B3475F93A948C103
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Client Startup
-
subdirectory
SubDir
Extracted
redline
25072023
185.215.113.67:40960
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Password: )NYyffR0 1 - Email To:
[email protected]
Extracted
redline
LiveTraffic
20.52.165.210:39030
Signatures
-
Modifies security service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysarddrvs.exe -
Phorphiex payload 3 IoCs
resource yara_rule behavioral1/files/0x000100000002aac8-34.dat family_phorphiex behavioral1/files/0x0003000000025e59-54.dat family_phorphiex behavioral1/files/0x000100000002aadf-264.dat family_phorphiex -
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/4340-334-0x0000000005A70000-0x0000000005D94000-memory.dmp family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x000600000002aaf3-583.dat family_redline behavioral1/memory/3196-588-0x0000000000870000-0x00000000008C2000-memory.dmp family_redline behavioral1/memory/2872-855-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral1/memory/2748-805-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
description pid Process procid_target PID 4672 created 3244 4672 nxmr.exe 52 PID 4672 created 3244 4672 nxmr.exe 52 PID 3556 created 3244 3556 wupgrdsv.exe 52 PID 3556 created 3244 3556 wupgrdsv.exe 52 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmysldrv.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ PCHunter64_pps.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ PCHunter64_new.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1844 powershell.exe 1088 powershell.exe 2104 powershell.exe 1132 powershell.exe 3056 powershell.exe -
Downloads MZ/PE file
-
Sets service image path in registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\zvtdzimqyyxigiblg\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Files\\zvtdzimqyyxigiblg.sys" PCHunter64_pps.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PCHunter64_ppsas\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Files\\PCHunter64_ppsas.sys" PCHunter64_pps.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PCHunter64_pps\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Files\\PCHunter64_pps.sys" PCHunter64_pps.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\gaqzslqimafjcxr\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Files\\gaqzslqimafjcxr.sys" PCHunter64_pps.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\rmytjgtjmzklwxqd\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Files\\rmytjgtjmzklwxqd.sys" PCHunter64_pps.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\dhggeogdlrvujrfjl\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Files\\dhggeogdlrvujrfjl.sys" PCHunter64_pps.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PCHunter64_pps.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PCHunter64_pps.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PCHunter64_new.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PCHunter64_new.exe -
Executes dropped EXE 52 IoCs
pid Process 2528 dccrypt.exe 1532 peinf.exe 4580 r.exe 1292 tpeinf.exe 3184 sysmablsvr.exe 3652 2032529430.exe 4676 sysmysldrv.exe 3372 2961321255.exe 2808 3130932277.exe 3116 PCHunter64_pps.exe 4860 t2.exe 3052 1966312418.exe 3008 1590123746.exe 3820 66ae9b60d9863_otr.exe 1652 m.exe 980 a.exe 2772 66ae97ac4c30d_crypted.exe 1324 11.exe 2716 npp.exe 4280 sysarddrvs.exe 3164 1129519889.exe 4340 qNVQKFyM.exe 4212 226327991.exe 3324 Portwebwin.exe 1568 3185832176.exe 2200 Identifications.exe 460 tdrpload.exe 2064 aaa.exe 2256 verus-solver.exe 4804 DecryptJohn.exe 3196 25072023.exe 3948 t1.exe 4544 tt.exe 240 1.exe 2440 66b1f63c9578f_doz.exe 1668 pp.exe 1584 wahost.exe 2056 o.exe 4672 nxmr.exe 3556 wupgrdsv.exe 2748 wahost.exe 2792 GOLD.exe 1964 pei.exe 2300 2818411319.exe 3432 newtpp.exe 1800 jp.exe 3784 regasm.exe 700 t.exe 1528 PCHunter64_new.exe 4892 regasm.exe 3420 x64.exe 1360 s.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\zvtdzimqyyxigiblg.sys PCHunter64_pps.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT\MINIMAL\ZVTDZIMQYYXIGIBLG.SYS PCHunter64_pps.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\gaqzslqimafjcxr.sys PCHunter64_pps.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT\MINIMAL\GAQZSLQIMAFJCXR.SYS PCHunter64_pps.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\rmytjgtjmzklwxqd.sys PCHunter64_pps.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT\MINIMAL\RMYTJGTJMZKLWXQD.SYS PCHunter64_pps.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\dhggeogdlrvujrfjl.sys PCHunter64_pps.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT\MINIMAL\DHGGEOGDLRVUJRFJL.SYS PCHunter64_pps.exe -
Loads dropped DLL 1 IoCs
pid Process 4804 DecryptJohn.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000100000002aace-118.dat themida behavioral1/memory/3116-125-0x0000000140000000-0x0000000141242000-memory.dmp themida behavioral1/memory/3116-145-0x0000000140000000-0x0000000141242000-memory.dmp themida behavioral1/memory/3116-146-0x0000000140000000-0x0000000141242000-memory.dmp themida behavioral1/memory/3116-147-0x0000000140000000-0x0000000141242000-memory.dmp themida behavioral1/memory/3116-148-0x0000000140000000-0x0000000141242000-memory.dmp themida behavioral1/memory/3116-152-0x0000000140000000-0x0000000141242000-memory.dmp themida behavioral1/memory/3116-499-0x0000000140000000-0x0000000141242000-memory.dmp themida behavioral1/files/0x000100000002ab1b-904.dat themida behavioral1/memory/1528-909-0x0000000140000000-0x000000014118D000-memory.dmp themida behavioral1/memory/1528-924-0x0000000140000000-0x000000014118D000-memory.dmp themida -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wahost.exe Key opened \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 regasm.exe Key opened \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 regasm.exe Key opened \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 regasm.exe Key opened \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wahost.exe Key opened \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wahost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysmablsvr.exe" r.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysmysldrv.exe" 2032529430.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysarddrvs.exe" 11.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PCHunter64_pps.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PCHunter64_new.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 71 raw.githubusercontent.com 74 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 162 checkip.dyndns.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3116 PCHunter64_pps.exe 1528 PCHunter64_new.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 3820 set thread context of 4708 3820 66ae9b60d9863_otr.exe 104 PID 2772 set thread context of 324 2772 66ae97ac4c30d_crypted.exe 111 PID 4804 set thread context of 3456 4804 DecryptJohn.exe 144 PID 2440 set thread context of 3320 2440 66b1f63c9578f_doz.exe 151 PID 1584 set thread context of 2748 1584 wahost.exe 166 PID 2792 set thread context of 2872 2792 GOLD.exe 172 PID 3784 set thread context of 4892 3784 regasm.exe 183 -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\sysmablsvr.exe r.exe File created C:\Windows\sysmysldrv.exe 2032529430.exe File opened for modification C:\Windows\sysmysldrv.exe 2032529430.exe File created C:\Windows\sysarddrvs.exe 11.exe File opened for modification C:\Windows\sysarddrvs.exe 11.exe File created C:\Windows\sysmablsvr.exe r.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1048 sc.exe 940 sc.exe 3400 sc.exe 1420 sc.exe 2604 sc.exe 2452 sc.exe 1304 sc.exe 4400 sc.exe 996 sc.exe 4800 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1590123746.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66ae9b60d9863_otr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wahost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2961321255.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3130932277.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language t2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2818411319.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysarddrvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wahost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysmysldrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language peinf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66ae97ac4c30d_crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regasm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysmablsvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66b1f63c9578f_doz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tpeinf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25072023.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regasm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1129519889.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 226327991.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DecryptJohn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newtpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2032529430.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOLD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qNVQKFyM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdrpload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dccrypt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2236 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000_Classes\Local Settings dccrypt.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 25072023.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 0b000000010000004800000054006900740061006e00690075006d00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f00720069007400790000000200000001000000cc0000001c0000006c00000001000000000000000000000000000000010000007b00340031003700340034004200450034002d0031003100430035002d0034003900340043002d0041003200310033002d004200410030004300450039003400340039003300380045007d00000000004d006900630072006f0073006f0066007400200045006e00680061006e006300650064002000430072007900700074006f0067007200610070006800690063002000500072006f00760069006400650072002000760031002e00300000000000030000000100000014000000f1a578c4cb5de79a370893983fd4da8b67b2b06420000000010000000a03000030820306308201eea003020102020867f7beb96a4c2798300d06092a864886f70d01010b0500302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f72697479301e170d3233303331343130333532305a170d3236303631373130333532305a302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a028201010086e4577a5861ce819177d005fa51d5515a936c610ccfcbde5332cd151da647ee881a245c9b02833b02af3d76fe20bd3bfaf7a20973e72ebd9440d09d8c3d2713bdf0d09feb9532acd7a42da2a952daa86a2a88ee427d30959d90bfba05276aa02998a6986fc01306629b79b8405d1f1fa6d9a42f827afc7566340dc2de27012b94bb4a27b3cb1c219a3cb2c14203f34451bd626520edd4dbcc414f593f2acbc48479f7143cbe139cfd129c913e5303dc20f94c44358901b69a848d7ea02e308a311560ac00ae009a29109aeed9713dd8919b97ed598058e17f0726c7a020f710abc06291dfaaf181c6be6a76c89cb68eb0b0ec1cd95f326c7e55588bfd76c5190203010001a328302630130603551d25040c300a06082b06010505070301300f0603551d130101ff040530030101ff300d06092a864886f70d01010b0500038201010070851293d757e982797dc5f7f27da894ef0cdb329f06a6096e0cf604b0e54711560ef40f5282082e210f55a3db41f312548b7611f5f0dacea3c78b13f6fc243c02b106665be69e184088415b273999b877bee353a248cec7eeb5a095c2174bc9526cafe3372c59dbfbe758134ed351e5147273fec68577ae4552a6f99ac80ca8d0ee422af528858c6be81cb0a8031ab0ae83c0eb5564f4e87a5c06295d3903eee2fdf92d62a7f4d4054deaa79bcaebda4e8b1a6efd42aef9d01c7075728cb13aa8557c85a72532b5e2d6c3e55041c9867ca8f562bbd2ab0c3710d83173ec3781d1dcaac5c6e07ee726624dfdc5814cffd336e17932f89beb9cf7fdbee9bebf61 25072023.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4628 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2104 powershell.exe 2104 powershell.exe 324 RegAsm.exe 1844 powershell.exe 1844 powershell.exe 3320 MSBuild.exe 3320 MSBuild.exe 4672 nxmr.exe 4672 nxmr.exe 1132 powershell.exe 1132 powershell.exe 4672 nxmr.exe 4672 nxmr.exe 1584 wahost.exe 1088 powershell.exe 1584 wahost.exe 2748 wahost.exe 1088 powershell.exe 2748 wahost.exe 3556 wupgrdsv.exe 3556 wupgrdsv.exe 3056 powershell.exe 3056 powershell.exe 3556 wupgrdsv.exe 3556 wupgrdsv.exe 3320 MSBuild.exe 3320 MSBuild.exe 3320 MSBuild.exe 3320 MSBuild.exe 3784 regasm.exe 3784 regasm.exe 4892 regasm.exe 4892 regasm.exe -
Suspicious behavior: LoadsDriver 32 IoCs
pid Process 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe 3116 PCHunter64_pps.exe -
Suspicious behavior: SetClipboardViewer 2 IoCs
pid Process 4676 sysmysldrv.exe 4280 sysarddrvs.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3188 4363463463464363463463463.exe Token: SeDebugPrivilege 2104 powershell.exe Token: SeDebugPrivilege 3116 PCHunter64_pps.exe Token: SeDebugPrivilege 3820 66ae9b60d9863_otr.exe Token: SeDebugPrivilege 324 RegAsm.exe Token: SeBackupPrivilege 324 RegAsm.exe Token: SeSecurityPrivilege 324 RegAsm.exe Token: SeSecurityPrivilege 324 RegAsm.exe Token: SeSecurityPrivilege 324 RegAsm.exe Token: SeSecurityPrivilege 324 RegAsm.exe Token: SeDebugPrivilege 1844 powershell.exe Token: SeDebugPrivilege 4340 qNVQKFyM.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeLoadDriverPrivilege 3116 PCHunter64_pps.exe Token: SeDebugPrivilege 2440 66b1f63c9578f_doz.exe Token: SeDebugPrivilege 1132 powershell.exe Token: SeIncreaseQuotaPrivilege 1132 powershell.exe Token: SeSecurityPrivilege 1132 powershell.exe Token: SeTakeOwnershipPrivilege 1132 powershell.exe Token: SeLoadDriverPrivilege 1132 powershell.exe Token: SeSystemProfilePrivilege 1132 powershell.exe Token: SeSystemtimePrivilege 1132 powershell.exe Token: SeProfSingleProcessPrivilege 1132 powershell.exe Token: SeIncBasePriorityPrivilege 1132 powershell.exe Token: SeCreatePagefilePrivilege 1132 powershell.exe Token: SeBackupPrivilege 1132 powershell.exe Token: SeRestorePrivilege 1132 powershell.exe Token: SeShutdownPrivilege 1132 powershell.exe Token: SeDebugPrivilege 1132 powershell.exe Token: SeSystemEnvironmentPrivilege 1132 powershell.exe Token: SeRemoteShutdownPrivilege 1132 powershell.exe Token: SeUndockPrivilege 1132 powershell.exe Token: SeManageVolumePrivilege 1132 powershell.exe Token: 33 1132 powershell.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3116 PCHunter64_pps.exe 4340 qNVQKFyM.exe 3116 PCHunter64_pps.exe 1528 PCHunter64_new.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3188 wrote to memory of 2528 3188 4363463463464363463463463.exe 79 PID 3188 wrote to memory of 2528 3188 4363463463464363463463463.exe 79 PID 3188 wrote to memory of 2528 3188 4363463463464363463463463.exe 79 PID 3188 wrote to memory of 1532 3188 4363463463464363463463463.exe 80 PID 3188 wrote to memory of 1532 3188 4363463463464363463463463.exe 80 PID 3188 wrote to memory of 1532 3188 4363463463464363463463463.exe 80 PID 2528 wrote to memory of 5060 2528 dccrypt.exe 81 PID 2528 wrote to memory of 5060 2528 dccrypt.exe 81 PID 2528 wrote to memory of 5060 2528 dccrypt.exe 81 PID 3188 wrote to memory of 4580 3188 4363463463464363463463463.exe 82 PID 3188 wrote to memory of 4580 3188 4363463463464363463463463.exe 82 PID 3188 wrote to memory of 4580 3188 4363463463464363463463463.exe 82 PID 3188 wrote to memory of 1292 3188 4363463463464363463463463.exe 83 PID 3188 wrote to memory of 1292 3188 4363463463464363463463463.exe 83 PID 3188 wrote to memory of 1292 3188 4363463463464363463463463.exe 83 PID 4580 wrote to memory of 3184 4580 r.exe 84 PID 4580 wrote to memory of 3184 4580 r.exe 84 PID 4580 wrote to memory of 3184 4580 r.exe 84 PID 1292 wrote to memory of 3652 1292 tpeinf.exe 85 PID 1292 wrote to memory of 3652 1292 tpeinf.exe 85 PID 1292 wrote to memory of 3652 1292 tpeinf.exe 85 PID 3652 wrote to memory of 4676 3652 2032529430.exe 86 PID 3652 wrote to memory of 4676 3652 2032529430.exe 86 PID 3652 wrote to memory of 4676 3652 2032529430.exe 86 PID 4676 wrote to memory of 240 4676 sysmysldrv.exe 87 PID 4676 wrote to memory of 240 4676 sysmysldrv.exe 87 PID 4676 wrote to memory of 240 4676 sysmysldrv.exe 87 PID 4676 wrote to memory of 2888 4676 sysmysldrv.exe 88 PID 4676 wrote to memory of 2888 4676 sysmysldrv.exe 88 PID 4676 wrote to memory of 2888 4676 sysmysldrv.exe 88 PID 2888 wrote to memory of 1048 2888 cmd.exe 91 PID 2888 wrote to memory of 1048 2888 cmd.exe 91 PID 2888 wrote to memory of 1048 2888 cmd.exe 91 PID 240 wrote to memory of 2104 240 cmd.exe 92 PID 240 wrote to memory of 2104 240 cmd.exe 92 PID 240 wrote to memory of 2104 240 cmd.exe 92 PID 2888 wrote to memory of 940 2888 cmd.exe 93 PID 2888 wrote to memory of 940 2888 cmd.exe 93 PID 2888 wrote to memory of 940 2888 cmd.exe 93 PID 2888 wrote to memory of 1304 2888 cmd.exe 94 PID 2888 wrote to memory of 1304 2888 cmd.exe 94 PID 2888 wrote to memory of 1304 2888 cmd.exe 94 PID 2888 wrote to memory of 4400 2888 cmd.exe 95 PID 2888 wrote to memory of 4400 2888 cmd.exe 95 PID 2888 wrote to memory of 4400 2888 cmd.exe 95 PID 2888 wrote to memory of 996 2888 cmd.exe 96 PID 2888 wrote to memory of 996 2888 cmd.exe 96 PID 2888 wrote to memory of 996 2888 cmd.exe 96 PID 3184 wrote to memory of 3372 3184 sysmablsvr.exe 97 PID 3184 wrote to memory of 3372 3184 sysmablsvr.exe 97 PID 3184 wrote to memory of 3372 3184 sysmablsvr.exe 97 PID 4676 wrote to memory of 2808 4676 sysmysldrv.exe 98 PID 4676 wrote to memory of 2808 4676 sysmysldrv.exe 98 PID 4676 wrote to memory of 2808 4676 sysmysldrv.exe 98 PID 3188 wrote to memory of 3116 3188 4363463463464363463463463.exe 99 PID 3188 wrote to memory of 3116 3188 4363463463464363463463463.exe 99 PID 3188 wrote to memory of 4860 3188 4363463463464363463463463.exe 100 PID 3188 wrote to memory of 4860 3188 4363463463464363463463463.exe 100 PID 3188 wrote to memory of 4860 3188 4363463463464363463463463.exe 100 PID 3184 wrote to memory of 3052 3184 sysmablsvr.exe 101 PID 3184 wrote to memory of 3052 3184 sysmablsvr.exe 101 PID 3184 wrote to memory of 3052 3184 sysmablsvr.exe 101 PID 4676 wrote to memory of 3008 4676 sysmysldrv.exe 102 PID 4676 wrote to memory of 3008 4676 sysmysldrv.exe 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 regasm.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 regasm.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\Files\dccrypt.exe"C:\Users\Admin\AppData\Local\Temp\Files\dccrypt.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\serverperf\Rf9n8rAaQutOZQd6TFDgcQ0Y3BLG9XLXz1nDso2.vbe"4⤵
- System Location Discovery: System Language Discovery
PID:5060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\serverperf\gc411KmXHpEBvwsmBcLMcGXH8jhoDdLsi9TAz2QKUXLoYkYDWV2rtqOl.bat" "5⤵
- System Location Discovery: System Language Discovery
PID:2396 -
C:\serverperf\Portwebwin.exe"C:\serverperf/Portwebwin.exe"6⤵
- Executes dropped EXE
PID:3324
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\peinf.exe"C:\Users\Admin\AppData\Local\Temp\Files\peinf.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1532
-
-
C:\Users\Admin\AppData\Local\Temp\Files\r.exe"C:\Users\Admin\AppData\Local\Temp\Files\r.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\sysmablsvr.exeC:\Windows\sysmablsvr.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\2961321255.exeC:\Users\Admin\AppData\Local\Temp\2961321255.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3372
-
-
C:\Users\Admin\AppData\Local\Temp\1966312418.exeC:\Users\Admin\AppData\Local\Temp\1966312418.exe5⤵
- Executes dropped EXE
PID:3052
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tpeinf.exe"C:\Users\Admin\AppData\Local\Temp\Files\tpeinf.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\2032529430.exeC:\Users\Admin\AppData\Local\Temp\2032529430.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\sysmysldrv.exeC:\Windows\sysmysldrv.exe5⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS6⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc7⤵
- Launches sc.exe
PID:1048
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:940
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1304
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc7⤵
- Launches sc.exe
PID:4400
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:996
-
-
-
C:\Users\Admin\AppData\Local\Temp\3130932277.exeC:\Users\Admin\AppData\Local\Temp\3130932277.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\1590123746.exeC:\Users\Admin\AppData\Local\Temp\1590123746.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3008
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\PCHunter64_pps.exe"C:\Users\Admin\AppData\Local\Temp\Files\PCHunter64_pps.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Sets service image path in registry
- Checks BIOS information in registry
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3116
-
-
C:\Users\Admin\AppData\Local\Temp\Files\t2.exe"C:\Users\Admin\AppData\Local\Temp\Files\t2.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4860
-
-
C:\Users\Admin\AppData\Local\Temp\Files\66ae9b60d9863_otr.exe"C:\Users\Admin\AppData\Local\Temp\Files\66ae9b60d9863_otr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3820 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4708
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\m.exe"C:\Users\Admin\AppData\Local\Temp\Files\m.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\Files\a.exe"C:\Users\Admin\AppData\Local\Temp\Files\a.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:980
-
-
C:\Users\Admin\AppData\Local\Temp\Files\66ae97ac4c30d_crypted.exe"C:\Users\Admin\AppData\Local\Temp\Files\66ae97ac4c30d_crypted.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2772 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:4364
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:2784
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:324
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\11.exe"C:\Users\Admin\AppData\Local\Temp\Files\11.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1324 -
C:\Windows\sysarddrvs.exeC:\Windows\sysarddrvs.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
PID:4280 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- System Location Discovery: System Language Discovery
PID:1636 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS5⤵
- System Location Discovery: System Language Discovery
PID:2560 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3400
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1420
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2604
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
PID:2452
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4800
-
-
-
C:\Users\Admin\AppData\Local\Temp\226327991.exeC:\Users\Admin\AppData\Local\Temp\226327991.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4212
-
-
C:\Users\Admin\AppData\Local\Temp\3185832176.exeC:\Users\Admin\AppData\Local\Temp\3185832176.exe5⤵
- Executes dropped EXE
PID:1568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\npp.exe"C:\Users\Admin\AppData\Local\Temp\Files\npp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\1129519889.exeC:\Users\Admin\AppData\Local\Temp\1129519889.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3164
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\qNVQKFyM.exe"C:\Users\Admin\AppData\Local\Temp\Files\qNVQKFyM.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Identifications.exe"C:\Users\Admin\AppData\Local\Temp\Files\Identifications.exe"3⤵
- Executes dropped EXE
PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tdrpload.exe"C:\Users\Admin\AppData\Local\Temp\Files\tdrpload.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:460
-
-
C:\Users\Admin\AppData\Local\Temp\Files\aaa.exe"C:\Users\Admin\AppData\Local\Temp\Files\aaa.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2064
-
-
C:\Users\Admin\AppData\Local\Temp\Files\verus-solver.exe"C:\Users\Admin\AppData\Local\Temp\Files\verus-solver.exe"3⤵
- Executes dropped EXE
PID:2256
-
-
C:\Users\Admin\AppData\Local\Temp\Files\DecryptJohn.exe"C:\Users\Admin\AppData\Local\Temp\Files\DecryptJohn.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3456
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\25072023.exe"C:\Users\Admin\AppData\Local\Temp\Files\25072023.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:3196
-
-
C:\Users\Admin\AppData\Local\Temp\Files\t1.exe"C:\Users\Admin\AppData\Local\Temp\Files\t1.exe"3⤵
- Executes dropped EXE
PID:3948
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tt.exe"C:\Users\Admin\AppData\Local\Temp\Files\tt.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4544
-
-
C:\Users\Admin\AppData\Local\Temp\Files\1.exe"C:\Users\Admin\AppData\Local\Temp\Files\1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:240
-
-
C:\Users\Admin\AppData\Local\Temp\Files\66b1f63c9578f_doz.exe"C:\Users\Admin\AppData\Local\Temp\Files\66b1f63c9578f_doz.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3320 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" & rd /s /q "C:\ProgramData\FIDHIEBAAKJD" & exit5⤵
- System Location Discovery: System Language Discovery
PID:3544 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2236
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pp.exe"C:\Users\Admin\AppData\Local\Temp\Files\pp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\Files\wahost.exe"C:\Users\Admin\AppData\Local\Temp\Files\wahost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1584 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\qdevaGeIZsRT.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qdevaGeIZsRT" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCA46.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4628
-
-
C:\Users\Admin\AppData\Local\Temp\Files\wahost.exe"C:\Users\Admin\AppData\Local\Temp\Files\wahost.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\o.exe"C:\Users\Admin\AppData\Local\Temp\Files\o.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2056
-
-
C:\Users\Admin\AppData\Local\Temp\Files\nxmr.exe"C:\Users\Admin\AppData\Local\Temp\Files\nxmr.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Users\Admin\AppData\Local\Temp\Files\GOLD.exe"C:\Users\Admin\AppData\Local\Temp\Files\GOLD.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2792 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pei.exe"C:\Users\Admin\AppData\Local\Temp\Files\pei.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\2818411319.exeC:\Users\Admin\AppData\Local\Temp\2818411319.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2300
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe"C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3432
-
-
C:\Users\Admin\AppData\Local\Temp\Files\jp.exe"C:\Users\Admin\AppData\Local\Temp\Files\jp.exe"3⤵
- Executes dropped EXE
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\Files\regasm.exe"C:\Users\Admin\AppData\Local\Temp\Files\regasm.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\Files\regasm.exe"C:\Users\Admin\AppData\Local\Temp\Files\regasm.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:4892
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\t.exe"C:\Users\Admin\AppData\Local\Temp\Files\t.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:700
-
-
C:\Users\Admin\AppData\Local\Temp\Files\PCHunter64_new.exe"C:\Users\Admin\AppData\Local\Temp\Files\PCHunter64_new.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\Files\x64.exe"C:\Users\Admin\AppData\Local\Temp\Files\x64.exe"3⤵
- Executes dropped EXE
PID:3420
-
-
C:\Users\Admin\AppData\Local\Temp\Files\s.exe"C:\Users\Admin\AppData\Local\Temp\Files\s.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1360
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#llzqlmcx#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Windows Upgrade Manager' /tr '''C:\Users\Admin\Windows Upgrade\wupgrdsv.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Windows Upgrade\wupgrdsv.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Windows Upgrade Manager' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Windows Upgrade Manager"2⤵PID:1852
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#llzqlmcx#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Windows Upgrade Manager' /tr '''C:\Users\Admin\Windows Upgrade\wupgrdsv.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Windows Upgrade\wupgrdsv.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Windows Upgrade Manager' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3056
-
-
C:\Users\Admin\Windows Upgrade\wupgrdsv.exe"C:\Users\Admin\Windows Upgrade\wupgrdsv.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3556
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify Tools
2Safe Mode Boot
1Modify Registry
6Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
Filesize
92KB
MD5e57f9e2fc24a1ace0267a7962c9e465e
SHA1840f5f4aed29f241642dab534e14f86c7cd5dfc6
SHA256aa66df748ef74df48c7d1c2954c49702b15e95787b1d3b562dba50894abc0910
SHA512d62dde392715a6c6869d621d87f3df2713293190676b24fdbac5b40dea07530edd8770f3b7ba69f6f2fda4c5275a8a05b5f4e91b90a4feb9537ec051193040c0
-
Filesize
18KB
MD587cbe5c0dae5ab2b66cea4f8f089396e
SHA11803bfe833b2481765d8ae73412fb917344f7173
SHA256ff5dfe910b4d5bb5c00fcf5ea1d59df98ac8441347732a7d09451ae14612925c
SHA5128998bb316cdd70482674986075e2a3b23ef1fd8e83c766a2d6fb9e582d673532bd48a9651662b8e9ba5f05adeded04889a0b8d6c38badd0f5359ae2886cabf53
-
Filesize
92KB
MD5be9388b42333b3d4e163b0ace699897b
SHA14e1109772eb9cb59c557380822166fe1664403bd
SHA256d281e0a0f1e1073f2d290a7eb1f77bed4c210dbf83a0f4f4e22073f50faa843f
SHA5125f887f1060b898c9a88745cde7cf509fdf42947ab8e5948b46c2df659468dc245b24d089bdbec0b314c40b83934698bf4b6feb8954e32810ff8f522aab0af19a
-
Filesize
7KB
MD5cf14448f02d12e7bb6a449658848b16f
SHA16b626e9a288dd5844788bff075806f05bf653a18
SHA25632cac3b9230d88f0fdcae005ea8f92236a5dd2488df7ca9c97ef66f145ca4e37
SHA5123fb30aebe173d881c432550d7d4085536afbb7961be4c6ceef91e3386d3b81c5312eb5c4b97bbb6d6323842ada8a562d0da262b2bf6e053a1ba569028b65e22f
-
Filesize
79KB
MD5e2e3268f813a0c5128ff8347cbaa58c8
SHA14952cbfbdec300c048808d79ee431972b8a7ba84
SHA256d8b83f78ed905a7948e2e1e371f0f905bcaaabbb314c692fee408a454f8338a3
SHA512cb5aeda8378a9a5470f33f2b70c22e77d2df97b162ba953eb16da085b3c434be31a5997eac11501db0cb612cdb30fa9045719fcd10c7227c56cc782558e0c3bc
-
Filesize
304KB
MD5a9a37926c6d3ab63e00b12760fae1e73
SHA1944d6044e111bbad742d06852c3ed2945dc9e051
SHA25627955c80c620c31df686ccd2a92bce1d07e97c16fda6bd141812e9b0bdd7b06b
SHA512575485d1c53b1bf145c7385940423b16089cf9ab75404e2e9c7af42b594480470f0e28dadcddbd66e4cd469e45326a6eb4eb2362ccc37edb2a956d224e04cf97
-
Filesize
1007KB
MD5dbfb97dfac2ebd1c0c891897dee558a3
SHA1201ef46bae62cf281cdd957e3e8a6f0267f48726
SHA256af7560ea85884942b24ba8f222da1c2cf0a06d715efd932d8c55e87d6ae6b381
SHA51231c34dfac762645200b54e27ab46f9de61499dca4b8d4ebdf8b17dcf91b4c794cfad6ab443dc412038dedf20bcbd2099bc63f4d3f1821c7b1f307b38cd673c8d
-
Filesize
3.8MB
MD53d3191283ae8325423342c1e29e4472b
SHA16514198e8f0f62e1db527831a629af1362919448
SHA256c24d6c52c061973f5b76cf2fbf569004ad7d511550d1104d26f6a4dac9ce613a
SHA5125343b8b1ccbfb14ca2620ae2e8fa6c2463bd630cec96444be1c22426aff5007f29f6d742c49458fe16228db12bfcdd9ea0cf4b7bbee1023cfac7d540004d4cc5
-
Filesize
6.3MB
MD507d615115d848b9b21d425e72116537e
SHA109ab47a2200b722c874f720dce71311592e17f60
SHA25659778733797d1033f33e5803810777b199bab7a53710c385c9f8b1cea648d4ec
SHA5123472b97076d33a2f2a6e677cc1ab30768f39e07f697acda478626897d809b63f521b4016101e3a0d2cc5785ccd764b6e0e68d9b84b5b86c7157b31ac63fddbd7
-
Filesize
1.9MB
MD5c1853d1c36dc461668c9af843d07cc58
SHA13c59af9da25113235365a6c08b44a3d6bfd3a1e8
SHA25683cd3dcf4a855593ff0f594158ec9d27a8eb94172a92c4092138db7abfbc8793
SHA512fd110a42927d580586081647d4d03f4cac6dd5934855e55e07794eec91b9d9d2e61a3d6cee2da5399966beae6cd1652b4d5583c492646dde87c824907e231463
-
Filesize
954KB
MD5e71c0c5d72455dde6510ba23552d7d2f
SHA14dff851c07a9f9ebc9e71b7f675cc20b06a2439c
SHA256de1d7fe86a0b70a7a268d2960109833f4d126d5d9e3acb36697e8ff59c56017f
SHA512c6f4b1eb353a554ca49bab5e894a4d7c46e2674d32f2f0d5a9231400d14a9ea5604c079193cd0bed9fea409bb71b5779c0c03671e104cb0740fe8ade3e530ca6
-
Filesize
9.2MB
MD55f283d0e9d35b9c56fb2b3514a5c4f86
SHA15869ef600ba564ae7bc7db52b9c70375607d51aa
SHA25641657910cd010c7e5ebbbfc11a2636fa1868a9bffe78d98b8faa7bd0e9c5c3b8
SHA512b5b78975c6328feb5e1986698174a85ddf722a639234eb6fe80cfccabaa7d0c09678c9465fd6a9586a0a412f2586d9e9d38eb5243626a2b44a8c8512322415b3
-
Filesize
6.8MB
MD5a2ed2bf5957b0b2d33eb778a443d15d0
SHA1889b45e70070c3ef4b8cd900fdc43140a5ed8105
SHA256866f59529cf4e0a4c2c4bcd2b9d5d18ece73bf99470ea1be81b26f91b586b174
SHA512b50b7416bc75324866407e08fd9bb29b0abed501e0720bb77721ce4922d7512221f93becc9cd37efd73b4bf0984d4db5a4da13e896f988256333d972e22ffba8
-
Filesize
8.3MB
MD58cafdbb0a919a1de8e0e9e38f8aa19bd
SHA163910a00e3e63427ec72e20fb0eb404cc1ff7e9c
SHA2561e2e566871e5e2d6b37ed00747f8ecd4c7098d39a2fdc8f272b1ff2962122733
SHA512cd65da486929240c041a7c0316a23402fc0364d778056eeeb1a07cba9b0687e6604c4f46c6f0655c6e8b8992be633aac6741bc1b841e1058e1b46fca5f0bce22
-
Filesize
19KB
MD51318fbc69b729539376cb6c9ac3cee4c
SHA1753090b4ffaa151317517e8925712dd02908fe9e
SHA256e972fb08a4dcde8d09372f78fe67ba283618288432cdb7d33015fc80613cb408
SHA5127a72a77890aa74ea272473018a683f1b6961e5e765eb90e5be0bb397f04e58b09ab47cfb6095c2fea91f4e0d39bd65e21fee54a0eade36378878b7880bcb9d22
-
Filesize
2.4MB
MD555398a65a9d1abb512e943a0d8901cb0
SHA19dfa573fad30f5010bc91cdf0752461aacaf36cf
SHA256e91ebc7e19b4dec3ce6f2aaf4ee8fb9fb24cba265088781f9845d8a32d1f2948
SHA5125cc41e3b79e35597f288737a7f65c035c56524c94d98dcb9892d656d92a6652a9f3b42a96b09d3fb10bd6e3c84fbe326efc64e252c0bc62d19ee6e80f1fdd556
-
Filesize
624KB
MD55eb2f44651d3e4b90664bab3070409ff
SHA16d71d69243bc2495a107ca45d5989a6fc1545570
SHA25632726fa33be861472d0b26286073b49500e3fd3bd1395f63bc114746a9195efb
SHA51255eef39a6845567c8bf64d04e5414537837ae7937229849f7bb1f28e4ddc22428aa1d56af177606c1ea31dd8799ff96d1dfa0f80cb266afe31ca1b43fe9313b5
-
Filesize
339KB
MD5808502752ca0492aca995e9b620d507b
SHA1668c40bb6c792b3502b4eefd0916febc8dbd5182
SHA2560f56c703e9b7ddeb90646927bac05a5c6d95308c8e13b88e5d4f4b572423e036
SHA5129a35ea626bb411531efe905a4a81c3dfdebf86b222d3005e846c87f9501b3d91a6164ef44c2ca72070fe8c33f2bfbfb58b4f96353be1aa8c2c6f9390827a5afa
-
Filesize
9KB
MD58d8e6c7952a9dc7c0c73911c4dbc5518
SHA19098da03b33b2c822065b49d5220359c275d5e94
SHA256feb4c3ae4566f0acbb9e0f55417b61fefd89dc50a4e684df780813fb01d61278
SHA51291a573843c28dd32a9f31a60ba977f9a3d4bb19ffd1b7254333e09bcecef348c1b3220a348ebb2cb08edb57d56cb7737f026519da52199c9dc62c10aea236645
-
Filesize
5.4MB
MD541ab08c1955fce44bfd0c76a64d1945a
SHA12b9cb05f4de5d98c541d15175d7f0199cbdd0eea
SHA256dd12cb27b3867341bf6ca48715756500d3ec56c19b21bb1c1290806aa74cb493
SHA51238834ae703a8541b4fec9a1db94cfe296ead58649bb1d4873b517df14d0c6a9d25e49ff04c2bf6bb0188845116a4e894aae930d849f9be8c98d2ce51da1ef116
-
Filesize
20KB
MD51382c0a4a9e0a9a2c942458652a4a0e4
SHA155ed8ebd6281c280c3e77763773d789a6057e743
SHA2564cb590dfafb7653379326e840d9b904a3cf05451999c4f9eb66c6e7116b68875
SHA512cc1ba7e779536b57409c974f16b0d8706fdf8749fb9eca36716d4e84d4f420a650b6476ac08570e684ad1e492da3bbacc15a4e5be4b94a1b708909d683da0b7e
-
Filesize
3.8MB
MD5e3a6a985899b7b14de0e539045fa8856
SHA11fdfc2ea75c2f52526dfa96834ec2f383d0c02f8
SHA25630ab8dea3f9af09e931fe9c72cc52c5a1a69ab6de752f20d13e465c7a4bda6d4
SHA5127e5f43999a1c4e46134446a259604fe9ea8d3c5688751baa83c33fa3d104e8ef2a35e2ac3c437d6ab98bf8f74696508ab643ac6030ba63c9aec7c219441ce451
-
Filesize
88KB
MD5ababca6d12d96e8dd2f1d7114b406fae
SHA1dcd9798e83ec688aacb3de8911492a232cb41a32
SHA256a992920e64a64763f3dd8c2a431a0f5e56e5b3782a1496de92bc80ee71cca5ba
SHA512b7fc70c176bdc74cf68b14e694f3e53142e64d39bd6d3e0f2e3a74ce3178ea606f92f760d21db69d72ae6677545a47c7bf390fb65cd5247a48e239f6ae8f7b8f
-
Filesize
694KB
MD562b9f8d4c98febbcd68e635c14d8d882
SHA19689119fff4101543313c9fc73072cc3f7cb9736
SHA256e93063292dbb2c3209541ea13e57d0cca3225f35eb18977d2b3400a97255a49d
SHA5127eb0993733bd683b5b4ad128c1f7d746de4125da05d5e8bdbde1070705175ac12b431ab1924d08652462a3f4e5bf63bfb60717ac6b476186eff30e4aa9e2ee05
-
Filesize
6KB
MD5cfb7fbf1d4b077a0e74ed6e9aab650a8
SHA1a91cfbcc9e67e8f4891dde04e7d003fc63b7d977
SHA256d93add71a451ec7c04c99185ae669e59fb866eb38f463e9425044981ed1bcae0
SHA512b174d0fed1c605decc4e32079a76fbb324088b710ce1a3fe427a9a30c7bdcd6ac1ad223970cdc64061705f9a268afa96463ee73536b46991981d041517b77785
-
Filesize
432KB
MD5409a8395747cebaefa1e1981c4eef62e
SHA1987ae8b6741df673b230df04e349228b06bf1207
SHA25662262e9b886df554547c1645a2048a2ee57d406718d89036b1f2c600eacde7cc
SHA512a35ce7cf39ca2d6eaf26feb3c242be4936c56b4b41f82517c6788e2ad84ed4737f9033e3f88c7982727584a0d4914b98770b47c0f1bdf9e0b6c0fd3c8c71fcdf
-
Filesize
561KB
MD5c4e132981278de75588c85590d9bbad4
SHA1f071a2714fec8215dd88cd96f82f52de38c49fa6
SHA256ec48091b8b9cc09fd9d73415078622d8b3c5fb2de818caa20814a43b1d1c14c7
SHA512665f360c8b9835bd5e6183fbd3e197a2546ed9585c80fb3019715ed9581cf0ffc16ec11dc9d9b93b14377b003b138fb56c83018c0ff0392fe0684b60c0a60498
-
Filesize
19KB
MD5c5a325ee2a50f7670cd5bd685721ee06
SHA170d2ea04f1def5eb21e50d2721963f6f86878085
SHA256be612ad3ca300081821d969d2e57bd3c1b01362caf13496d311677762a0387c5
SHA5127cdd860c8e6e60c7f7b3694167543ea77e6c4beb1ce81560af5ecb913147f25161b13041632e37fa9bc4ab15ac7eeb5995effc24cd5a4558d7b34c16cc9571b3
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3KB
MD58f585cfd4bcb25d0c06778ef82f37804
SHA13e7f6d52f672a3f17d7da0d2f141fcb44d621b0a
SHA2569fe63f3bb2d7a142c208fe8e9978b8cc2a7de22cf5256fd60581bb461614d1be
SHA512057a5c7985a9ccab37258b5f49a7bfe814b82e4bcddef200ab1ee19e78bc61c173821059e0b410cb3cb44c2dd55adc72300ed8b2908da596d64eb8ad36d1532a
-
Filesize
2.1MB
MD5b706af07e8a87b688024a52a49d9676f
SHA175e94c859ba5acfe7a09f59b4d3c50a92fa9192a
SHA25640a6508de2984c0b3869ee1de21a5aa04cabddc21d54554956f3ad9d2a390c2a
SHA512227d8199d6674f3ff51fd02b9105ab06314e1fb82ab7057bd43660b4c58e843bc6399c8c0f3d381c0ed6748a7e9089b13f0f3f177689cd7a35d136c408453d55
-
Filesize
245B
MD5ca5432879ede28c26db0fe6abeff116f
SHA169018b42d1d0fb90675ed89b5ef470060bccf2c4
SHA2568a12973aa5a19751ea7fd0d01ce30fa1dad714d241084b8b2055dc63aec152c4
SHA51203759619209d2ccd50f2710d55fe3ecdb9522d69a6509be9af2c6b70b9bf735eaf6a36503bd1b62db8be7a7e57e01d158fd6011b664ab93d38a65a7e29633336
-
Filesize
80B
MD5ae1623f3f34bd2670cd2ce4c6628b08e
SHA1955bcf3d0ed3e8dbe4e654f955eb55e34bf59c89
SHA256babf7e33e87db860f527fe5cef835786b0d85d75129252e26bbfd6079a74b50e
SHA512c7109605eb0a40d273344f998b6205422508604335f567652f785dfa7cf6b7a6d055f9327c6f0ace2ef7334e7cd4530087f09bccc508e7bf2d1e7b43a010f56f