Technical Information
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Balls' = '"%APPDATA%\Balls\Ballsusus.exe"'
- <SYSTEM32>\tasks\balls
- <SYSTEM32>\tasks\windowssystemhost
- %APPDATA%\balls\ballsusus.exe
- %APPDATA%\logs\03-13-2023
- %APPDATA%\balls\ballsusus.exe
- 'ip##pi.com':80
- http://ip##pi.com/json/
- DNS ASK ip##pi.com
- '%APPDATA%\balls\ballsusus.exe'
- '<SYSTEM32>\schtasks.exe' /create /tn "WINDOWSSYSTEMHOST" /tr "%APPDATA%\Balls\Ballsusus.exe" /sc MINUTE /MO 1' (with hidden window)
- '%APPDATA%\balls\ballsusus.exe' ' (with hidden window)
- '<SYSTEM32>\schtasks.exe' /create /tn "Balls" /sc ONLOGON /tr "<Full path to file>" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "Balls" /sc ONLOGON /tr "%APPDATA%\Balls\Ballsusus.exe" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "WINDOWSSYSTEMHOST" /tr "%APPDATA%\Balls\Ballsusus.exe" /sc MINUTE /MO 1
- '<SYSTEM32>\taskeng.exe' {203E1362-08E2-40CD-A109-B43CE33871B3} S-1-5-21-1960123792-2022915161-3775307078-1001:tamgafcjars\user:Interactive:[1]