One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
Allocates read-write-execute memory (usually to unpack itself)
(4 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619826882.976784
NtAllocateVirtualMemory
|
process_identifier:
1464
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x02930000
|
success
|
0 |
0
|
1619826883.069784
NtAllocateVirtualMemory
|
process_identifier:
1464
region_size:
131072
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x02940000
|
success
|
0 |
0
|
1619839768.136875
NtAllocateVirtualMemory
|
process_identifier:
3288
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00730000
|
success
|
0 |
0
|
1619839768.496875
NtAllocateVirtualMemory
|
process_identifier:
3288
region_size:
131072
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00740000
|
success
|
0 |
0
|
Creates executable files on the filesystem
(2 个事件)
| file |
C:\Users\Administrator.Oskar-PC\AppData\Roaming\CapabilityAccessHandlers\sfc.exe |
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\install.vbs |
Creates a suspicious process
(3 个事件)
| cmdline |
"C:\Windows\System32\cmd.exe" /c "C:\Users\Administrator.Oskar-PC\AppData\Roaming\remcos\remcos.exe" |
| cmdline |
schtasks /create /tn setx /tr "C:\Users\Administrator.Oskar-PC\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F |
| cmdline |
"C:\Windows\SysWOW64\schtasks.exe" /create /tn setx /tr "C:\Users\Administrator.Oskar-PC\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F |
Drops a binary and executes it
(1 个事件)
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\install.vbs |
Drops an executable to the user AppData folder
(1 个事件)
| file |
C:\Users\Administrator.Oskar-PC\AppData\Roaming\CapabilityAccessHandlers\sfc.exe |
A process created a hidden window
(4 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619826885.022784
ShellExecuteExW
|
parameters:
/create /tn setx /tr "C:\Users\Administrator.Oskar-PC\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F
filepath:
schtasks
filepath_r:
schtasks
show_type:
0
|
success
|
1 |
0
|
1619839761.683875
ShellExecuteExW
|
parameters:
filepath:
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\install.vbs
filepath_r:
C:\Users\ADMINI~1.OSK\AppData\Local\Temp\install.vbs
show_type:
0
|
success
|
1 |
0
|
1619839765.012125
ShellExecuteExW
|
parameters:
/c "C:\Users\Administrator.Oskar-PC\AppData\Roaming\remcos\remcos.exe"
filepath:
cmd
filepath_r:
cmd
show_type:
0
|
success
|
1 |
0
|
1619839773.496875
ShellExecuteExW
|
parameters:
/create /tn setx /tr "C:\Users\Administrator.Oskar-PC\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F
filepath:
schtasks
filepath_r:
schtasks
show_type:
0
|
success
|
1 |
0
|
Uses Windows utilities for basic Windows functionality
(2 个事件)
| cmdline |
schtasks /create /tn setx /tr "C:\Users\Administrator.Oskar-PC\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F |
| cmdline |
"C:\Windows\SysWOW64\schtasks.exe" /create /tn setx /tr "C:\Users\Administrator.Oskar-PC\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F |