Technical Information
- <SYSTEM32>\tasks\svchosts
- ClassName: 'OLLYDBG', WindowName: ''
- ClassName: 'GBDYLLO', WindowName: ''
- ClassName: 'pediy06', WindowName: ''
- %TEMP%\hhauoi.exe
- http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt
- DNS ASK 4.###.ngrok.io
- DNS ASK microsoft.com
- '%WINDIR%\syswow64\windowspowershell\v1.0\powershell.exe' –ExecutionPolicy Bypass Start-Process -FilePath '"%TEMP%\hhauoi.exe"'
- '%TEMP%\hhauoi.exe'
- '%WINDIR%\syswow64\cmd.exe' /c schtasks /create /f /sc onlogon /rl highest /tn "svchosts" /tr '"%APPDATA%\svchosts.exe"' & exit' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"%TEMP%\hhauoi.exe"' & exit' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c schtasks /create /f /sc onlogon /rl highest /tn "svchosts" /tr '"%APPDATA%\svchosts.exe"' & exit
- '%WINDIR%\syswow64\schtasks.exe' /create /f /sc onlogon /rl highest /tn "svchosts" /tr '"%APPDATA%\svchosts.exe"'
- '%WINDIR%\syswow64\cmd.exe' /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"%TEMP%\hhauoi.exe"' & exit