Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 11:16
Behavioral task
behavioral1
Sample
0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe
Resource
win7-20221111-en
General
-
Target
0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe
-
Size
643KB
-
MD5
3d8791d281ae6a73bb52fcec92badb90
-
SHA1
3492649ce3410c39a0634a12f4afe51fc2cc0464
-
SHA256
0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0
-
SHA512
4a63507d648de7abb487bda3416d9df0b6052768cfb3d30af3db63c56747e34ed5dbe768985ef1966bf48ee8b80527f802aa6dc7cd1527ab2ad711d3f97abcfb
-
SSDEEP
12288:J4zr8W2XcMMnlWmPFqZXnFpE00YglJLobyQqVtQhU7:SgMMMlW2FqBPB0YMNYyQqV5
Malware Config
Extracted
cybergate
v3.4.2.2
l2ru
brosto.strangled.net:81
brosto.strangled.net:4123
brosto.strangled.net:6745
brosto.strangled.net:7534
brosto.strangled.net:7653
sasaze.chickenkiller.com:7875
sasaze.chickenkiller.com:8545
sasaze.chickenkiller.com:8642
sasaze.chickenkiller.com:8742
sasaze.chickenkiller.com:8954
brostod.jumpingcrab.com:9647
brostod.jumpingcrab.com:9743
brostod.jumpingcrab.com:9866
brostod.jumpingcrab.com:10535
brostod.jumpingcrab.com:10877
1844205166:53575
1844205166:58656
1844205166:59534
1844205166:59642
1J06T62M0GRU16
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
interface
-
install_file
csrsc.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
a123123123
-
regkey_hkcu
exploruse
-
regkey_hklm
exploruse
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\taskmgi = "C:\\Windows\\system32\\interface\\csrsc.exe" 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\taskmgi = "C:\\Windows\\system32\\interface\\csrsc.exe" 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exeexplorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{6OGA7127-5C37-657A-L4Q6-15W15NGG1HHI} 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6OGA7127-5C37-657A-L4Q6-15W15NGG1HHI}\StubPath = "C:\\Windows\\system32\\interface\\csrsc.exe Restart" 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{6OGA7127-5C37-657A-L4Q6-15W15NGG1HHI} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6OGA7127-5C37-657A-L4Q6-15W15NGG1HHI}\StubPath = "C:\\Windows\\system32\\interface\\csrsc.exe" explorer.exe -
Processes:
resource yara_rule behavioral2/memory/308-140-0x0000000010410000-0x0000000010480000-memory.dmp upx behavioral2/memory/308-145-0x0000000010480000-0x00000000104F0000-memory.dmp upx behavioral2/memory/4700-148-0x0000000010480000-0x00000000104F0000-memory.dmp upx behavioral2/memory/4700-151-0x0000000010480000-0x00000000104F0000-memory.dmp upx behavioral2/memory/308-153-0x00000000104F0000-0x0000000010560000-memory.dmp upx behavioral2/memory/308-158-0x0000000010560000-0x00000000105D0000-memory.dmp upx behavioral2/memory/636-161-0x0000000010560000-0x00000000105D0000-memory.dmp upx behavioral2/memory/636-162-0x0000000010560000-0x00000000105D0000-memory.dmp upx behavioral2/memory/636-164-0x0000000010560000-0x00000000105D0000-memory.dmp upx -
Drops startup file 3 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrsc.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrsc.exe explorer.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule C:\Windows\SysWOW64\interface\csrsc.exe agile_net -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\exploruse = "C:\\Windows\\system32\\interface\\csrsc.exe" 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\exploruse = "C:\\Windows\\system32\\interface\\csrsc.exe" 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe -
Drops file in System32 directory 2 IoCs
Processes:
0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exedescription ioc process File opened for modification C:\Windows\SysWOW64\interface\csrsc.exe 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe File created C:\Windows\SysWOW64\interface\csrsc.exe 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exedescription pid process target process PID 3248 set thread context of 308 3248 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exepid process 3248 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exeexplorer.exedescription pid process Token: SeDebugPrivilege 3248 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Token: SeDebugPrivilege 636 explorer.exe Token: SeDebugPrivilege 636 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exepid process 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exedescription pid process target process PID 3248 wrote to memory of 308 3248 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe PID 3248 wrote to memory of 308 3248 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe PID 3248 wrote to memory of 308 3248 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe PID 3248 wrote to memory of 308 3248 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe PID 3248 wrote to memory of 308 3248 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe PID 3248 wrote to memory of 308 3248 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe PID 3248 wrote to memory of 308 3248 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe PID 3248 wrote to memory of 308 3248 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe PID 3248 wrote to memory of 308 3248 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe PID 3248 wrote to memory of 308 3248 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe PID 3248 wrote to memory of 308 3248 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE PID 308 wrote to memory of 2440 308 0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe"C:\Users\Admin\AppData\Local\Temp\0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe"C:\Users\Admin\AppData\Local\Temp\0e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0.exe"3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Admin2.txtFilesize
234KB
MD5752f9d9d08494d0fb4d68fbe3f15ce39
SHA174f008ed52f7e94877ba5fab76df11b48c4d7852
SHA25604e77ba535043392102974c9e5c2b7bd0c4e1ff3196b22dc94de7f90d6a8f979
SHA51211c3842c62358f86e20fb7460ee305f0169156a3797f4558c7160955e9b489f2dd49a28bb4e7d49c17dd041ac88e9b8c17826507edc8902bc2ae4f8db2409d9f
-
C:\Windows\SysWOW64\interface\csrsc.exeFilesize
643KB
MD53d8791d281ae6a73bb52fcec92badb90
SHA13492649ce3410c39a0634a12f4afe51fc2cc0464
SHA2560e59feb575e3c40de1da9964c7403d425ebd39ed607105cd4446bf6c5c6215d0
SHA5124a63507d648de7abb487bda3416d9df0b6052768cfb3d30af3db63c56747e34ed5dbe768985ef1966bf48ee8b80527f802aa6dc7cd1527ab2ad711d3f97abcfb
-
memory/308-135-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/308-145-0x0000000010480000-0x00000000104F0000-memory.dmpFilesize
448KB
-
memory/308-158-0x0000000010560000-0x00000000105D0000-memory.dmpFilesize
448KB
-
memory/308-153-0x00000000104F0000-0x0000000010560000-memory.dmpFilesize
448KB
-
memory/308-138-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/308-140-0x0000000010410000-0x0000000010480000-memory.dmpFilesize
448KB
-
memory/308-163-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/308-136-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/308-133-0x0000000000000000-mapping.dmp
-
memory/308-134-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/636-162-0x0000000010560000-0x00000000105D0000-memory.dmpFilesize
448KB
-
memory/636-161-0x0000000010560000-0x00000000105D0000-memory.dmpFilesize
448KB
-
memory/636-164-0x0000000010560000-0x00000000105D0000-memory.dmpFilesize
448KB
-
memory/636-157-0x0000000000000000-mapping.dmp
-
memory/3248-137-0x00000000753C0000-0x0000000075971000-memory.dmpFilesize
5.7MB
-
memory/3248-132-0x00000000753C0000-0x0000000075971000-memory.dmpFilesize
5.7MB
-
memory/4700-151-0x0000000010480000-0x00000000104F0000-memory.dmpFilesize
448KB
-
memory/4700-148-0x0000000010480000-0x00000000104F0000-memory.dmpFilesize
448KB
-
memory/4700-144-0x0000000000000000-mapping.dmp