One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
Allocates read-write-execute memory (usually to unpack itself)
(3 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619910886.859524
NtAllocateVirtualMemory
|
process_identifier:
2288
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x01000000
|
success
|
0 |
0
|
1619910887.422524
NtAllocateVirtualMemory
|
process_identifier:
2288
region_size:
118784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x02640000
|
success
|
0 |
0
|
1619938268.4805
NtAllocateVirtualMemory
|
process_identifier:
1424
region_size:
65536
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffffffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x0000000004150000
|
success
|
0 |
0
|
Checks whether any human activity is being performed by constantly checking whether the foreground window changed
Creates executable files on the filesystem
(1 个事件)
| file |
C:\Users\Administrator.Oskar-PC\bi\UevAppMonitor.exe |
Creates a suspicious process
(4 个事件)
| cmdline |
"C:\Windows\system32\cmd.exe" /k ping 127.0.0.1 -t 0 & del C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\d2bf1c6195e07a2c063e3dbb686301d4.exe & exit |
| cmdline |
schtasks /create /tn CloudStorageWizard /tr "C:\Users\Administrator.Oskar-PC\bi\UevAppMonitor.exe" /sc minute /mo 1 /F |
| cmdline |
C:\Windows\System32\cmd.exe /k ping 127.0.0.1 -t 0 & del C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\d2bf1c6195e07a2c063e3dbb686301d4.exe & exit |
| cmdline |
"C:\Windows\SysWOW64\schtasks.exe" /create /tn CloudStorageWizard /tr "C:\Users\Administrator.Oskar-PC\bi\UevAppMonitor.exe" /sc minute /mo 1 /F |
Drops a binary and executes it
(1 个事件)
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\d2bf1c6195e07a2c063e3dbb686301d4.exe |
Drops an executable to the user AppData folder
(1 个事件)
| file |
C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\d2bf1c6195e07a2c063e3dbb686301d4.exe |
A process created a hidden window
(2 个事件)
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619910889.125524
ShellExecuteExW
|
parameters:
/create /tn CloudStorageWizard /tr "C:\Users\Administrator.Oskar-PC\bi\UevAppMonitor.exe" /sc minute /mo 1 /F
filepath:
schtasks
filepath_r:
schtasks
show_type:
0
|
success
|
1 |
0
|
1619910889.890524
ShellExecuteExW
|
parameters:
/k ping 127.0.0.1 -t 0 & del C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\d2bf1c6195e07a2c063e3dbb686301d4.exe & exit
filepath:
C:\Windows\System32\cmd.exe
filepath_r:
C:\Windows\system32\cmd.exe
show_type:
0
|
success
|
1 |
0
|
The binary likely contains encrypted or compressed data indicative of a packer
(2 个事件)
| entropy |
7.904723308458711 |
section |
{'size_of_data': '0x000ad400', 'virtual_address': '0x00090000', 'entropy': 7.904723308458711, 'name': 'UPX1', 'virtual_size': '0x000ae000'} |
description |
A section with a high entropy has been found |
| entropy |
0.9885877318116976 |
description |
Overall entropy of this PE file is high |
The executable is compressed using UPX
(2 个事件)
| section |
UPX0 |
description |
Section name indicates UPX |
| section |
UPX1 |
description |
Section name indicates UPX |
Uses Windows utilities for basic Windows functionality
(5 个事件)
| cmdline |
"C:\Windows\system32\cmd.exe" /k ping 127.0.0.1 -t 0 & del C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\d2bf1c6195e07a2c063e3dbb686301d4.exe & exit |
| cmdline |
schtasks /create /tn CloudStorageWizard /tr "C:\Users\Administrator.Oskar-PC\bi\UevAppMonitor.exe" /sc minute /mo 1 /F |
| cmdline |
C:\Windows\System32\cmd.exe /k ping 127.0.0.1 -t 0 & del C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\d2bf1c6195e07a2c063e3dbb686301d4.exe & exit |
| cmdline |
ping 127.0.0.1 -t 0 |
| cmdline |
"C:\Windows\SysWOW64\schtasks.exe" /create /tn CloudStorageWizard /tr "C:\Users\Administrator.Oskar-PC\bi\UevAppMonitor.exe" /sc minute /mo 1 /F |