One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
Allocates read-write-execute memory (usually to unpack itself)
(4 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619514363.024875
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x02540000
|
success
|
0 |
0
|
1619514363.086875
NtAllocateVirtualMemory
|
process_identifier:
1916
region_size:
131072
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x02950000
|
success
|
0 |
0
|
1619514376.742875
NtAllocateVirtualMemory
|
process_identifier:
3272
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00420000
|
success
|
0 |
0
|
1619514376.774875
NtAllocateVirtualMemory
|
process_identifier:
3272
region_size:
131072
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x009e0000
|
success
|
0 |
0
|
Creates executable files on the filesystem
(2 个事件)
| file |
C:\Users\Administrator.Oskar-PC\AppData\Roaming\CapabilityAccessHandlers\sfc.exe |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\install.vbs |
Creates a suspicious process
(3 个事件)
| cmdline |
"C:\Windows\System32\cmd.exe" /c "C:\Users\Administrator.Oskar-PC\AppData\Roaming\remcos\remcos.exe" |
| cmdline |
schtasks /create /tn setx /tr "C:\Users\Administrator.Oskar-PC\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F |
| cmdline |
"C:\Windows\SysWOW64\schtasks.exe" /create /tn setx /tr "C:\Users\Administrator.Oskar-PC\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F |
Drops a binary and executes it
(1 个事件)
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\install.vbs |
Drops an executable to the user AppData folder
(1 个事件)
| file |
C:\Users\Administrator.Oskar-PC\AppData\Roaming\CapabilityAccessHandlers\sfc.exe |
A process created a hidden window
(4 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619514365.445875
ShellExecuteExW
|
parameters:
/create /tn setx /tr "C:\Users\Administrator.Oskar-PC\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F
filepath:
schtasks
filepath_r:
schtasks
show_type:
0
|
success
|
1 |
0
|
1619514364.617875
ShellExecuteExW
|
parameters:
filepath:
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\install.vbs
filepath_r:
C:\Users\ADMINI~1.OSK\AppData\Local\Temp\install.vbs
show_type:
0
|
success
|
1 |
0
|
1619514375.352875
ShellExecuteExW
|
parameters:
/c "C:\Users\Administrator.Oskar-PC\AppData\Roaming\remcos\remcos.exe"
filepath:
cmd
filepath_r:
cmd
show_type:
0
|
success
|
1 |
0
|
1619514377.336875
ShellExecuteExW
|
parameters:
/create /tn setx /tr "C:\Users\Administrator.Oskar-PC\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F
filepath:
schtasks
filepath_r:
schtasks
show_type:
0
|
success
|
1 |
0
|
Uses Windows utilities for basic Windows functionality
(2 个事件)
| cmdline |
schtasks /create /tn setx /tr "C:\Users\Administrator.Oskar-PC\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F |
| cmdline |
"C:\Windows\SysWOW64\schtasks.exe" /create /tn setx /tr "C:\Users\Administrator.Oskar-PC\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F |