Tags:
backdoor defense_evasion discovery evasion execution persistence privilege_escalation ransomware rat spyware trojan
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies system certificate store
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy WMI provider
Uses Volume Shadow Copy service COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Checks system information in the registry
Drops file in System32 directory
Checks installed software on the system
Enumerates connected drives
Checks BIOS information in registry
Checks computer location settings
Detects GoToResolve remote administration tool
Event Triggered Execution: Component Object Model Hijacking
Badlisted process makes network request
Boot or Logon Autostart Execution: Active Setup
Command and Scripting Interpreter: PowerShell
Modifies Windows Defender DisableAntiSpyware settings
Modifies Windows Defender Real-time Protection settings
Dropper Extraction:
https://store9.gofile.io/download/direct/cad2b711-6299-4806-9b5a-c439bf6b2e5d/LogMeInResolve_Unattended.msi
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.