Technical Information
- %APPDATA%\microsoft\windows\start menu\programs\startup\svchost.exe
- '<SYSTEM32>\taskkill.exe' /im powershell.exe /f
- %TEMP%\payload.ps1
- %TEMP%\w7fbjbaa.0.cs
- %TEMP%\w7fbjbaa.cmdline
- %TEMP%\w7fbjbaa.out
- %TEMP%\csc1290.tmp
- %TEMP%\res12a0.tmp
- %TEMP%\w7fbjbaa.dll
- %TEMP%\res12a0.tmp
- %TEMP%\csc1290.tmp
- %TEMP%\w7fbjbaa.out
- %TEMP%\w7fbjbaa.cmdline
- %TEMP%\w7fbjbaa.dll
- %TEMP%\w7fbjbaa.0.cs
- %TEMP%\w7fbjbaa.pdb
- '2.###.ngrok.io':11642
- 'pa###bin.com':443
- DNS ASK pa###bin.com
- DNS ASK 2.###.ngrok.io
- ClassName: '' WindowName: ''
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -executionpolicy bypass -noprofile -windowstyle hidden -noexit -file %TEMP%\payload.ps1
- '<SYSTEM32>\taskkill.exe' /im powershell.exe /f' (with hidden window)
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -executionpolicy bypass -noprofile -windowstyle hidden -noexit -file %TEMP%\payload.ps1' (with hidden window)
- '%WINDIR%\microsoft.net\framework64\v2.0.50727\csc.exe' /noconfig /fullpaths @"%TEMP%\w7fbjbaa.cmdline"' (with hidden window)
- '%WINDIR%\microsoft.net\framework64\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES12A0.tmp" "%TEMP%\CSC1290.tmp"' (with hidden window)
- '%WINDIR%\microsoft.net\framework64\v2.0.50727\csc.exe' /noconfig /fullpaths @"%TEMP%\w7fbjbaa.cmdline"
- '%WINDIR%\microsoft.net\framework64\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES12A0.tmp" "%TEMP%\CSC1290.tmp"