Analysis
-
max time kernel
26s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2024 18:17
General
-
Target
SynapseX Launcher.exe
-
Size
21.4MB
-
MD5
289d4e7dde655f722a03384b5baa0519
-
SHA1
cf543b250337f9d2a081c0443cb6833de0c51faa
-
SHA256
e415185bfb73ffbb19998b75dbf869adac06bdabbf699d6c5a75d3d3b424d3aa
-
SHA512
f648d61c174af6be241608e84aa4fb5eedeed93906d281dd727e47d5bb14d89243cae43634788bfa4a83f40253f9a05fee2ec6df1d6ec5230710497fe352e587
-
SSDEEP
393216:8MU5jgLxdyJhoonb3pR1obI/fL2Vmd6mI/m3pmVBkqQCwYhBJH6JmxWvUA7dcG:8JczyJ+UjpR1h/fyVmdiKm3hZNBoF8AG
Malware Config
Signatures
-
Loads dropped DLL 52 IoCs
pid Process 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 ipinfo.io 29 ipinfo.io -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum SynapseX Launcher.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 SynapseX Launcher.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 3732 SynapseX Launcher.exe 684 Process not Found 684 Process not Found 5072 powershell.exe 5072 powershell.exe 2148 powershell.exe 2148 powershell.exe 3948 powershell.exe 3948 powershell.exe 1680 powershell.exe 1680 powershell.exe 3760 powershell.exe 3760 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3732 SynapseX Launcher.exe Token: SeIncreaseQuotaPrivilege 4572 wmic.exe Token: SeSecurityPrivilege 4572 wmic.exe Token: SeTakeOwnershipPrivilege 4572 wmic.exe Token: SeLoadDriverPrivilege 4572 wmic.exe Token: SeSystemProfilePrivilege 4572 wmic.exe Token: SeSystemtimePrivilege 4572 wmic.exe Token: SeProfSingleProcessPrivilege 4572 wmic.exe Token: SeIncBasePriorityPrivilege 4572 wmic.exe Token: SeCreatePagefilePrivilege 4572 wmic.exe Token: SeBackupPrivilege 4572 wmic.exe Token: SeRestorePrivilege 4572 wmic.exe Token: SeShutdownPrivilege 4572 wmic.exe Token: SeDebugPrivilege 4572 wmic.exe Token: SeSystemEnvironmentPrivilege 4572 wmic.exe Token: SeRemoteShutdownPrivilege 4572 wmic.exe Token: SeUndockPrivilege 4572 wmic.exe Token: SeManageVolumePrivilege 4572 wmic.exe Token: 33 4572 wmic.exe Token: 34 4572 wmic.exe Token: 35 4572 wmic.exe Token: 36 4572 wmic.exe Token: SeIncreaseQuotaPrivilege 4572 wmic.exe Token: SeSecurityPrivilege 4572 wmic.exe Token: SeTakeOwnershipPrivilege 4572 wmic.exe Token: SeLoadDriverPrivilege 4572 wmic.exe Token: SeSystemProfilePrivilege 4572 wmic.exe Token: SeSystemtimePrivilege 4572 wmic.exe Token: SeProfSingleProcessPrivilege 4572 wmic.exe Token: SeIncBasePriorityPrivilege 4572 wmic.exe Token: SeCreatePagefilePrivilege 4572 wmic.exe Token: SeBackupPrivilege 4572 wmic.exe Token: SeRestorePrivilege 4572 wmic.exe Token: SeShutdownPrivilege 4572 wmic.exe Token: SeDebugPrivilege 4572 wmic.exe Token: SeSystemEnvironmentPrivilege 4572 wmic.exe Token: SeRemoteShutdownPrivilege 4572 wmic.exe Token: SeUndockPrivilege 4572 wmic.exe Token: SeManageVolumePrivilege 4572 wmic.exe Token: 33 4572 wmic.exe Token: 34 4572 wmic.exe Token: 35 4572 wmic.exe Token: 36 4572 wmic.exe Token: SeDebugPrivilege 684 Process not Found Token: SeDebugPrivilege 5072 powershell.exe Token: SeIncreaseQuotaPrivilege 1900 Conhost.exe Token: SeSecurityPrivilege 1900 Conhost.exe Token: SeTakeOwnershipPrivilege 1900 Conhost.exe Token: SeLoadDriverPrivilege 1900 Conhost.exe Token: SeSystemProfilePrivilege 1900 Conhost.exe Token: SeSystemtimePrivilege 1900 Conhost.exe Token: SeProfSingleProcessPrivilege 1900 Conhost.exe Token: SeIncBasePriorityPrivilege 1900 Conhost.exe Token: SeCreatePagefilePrivilege 1900 Conhost.exe Token: SeBackupPrivilege 1900 Conhost.exe Token: SeRestorePrivilege 1900 Conhost.exe Token: SeShutdownPrivilege 1900 Conhost.exe Token: SeDebugPrivilege 1900 Conhost.exe Token: SeSystemEnvironmentPrivilege 1900 Conhost.exe Token: SeRemoteShutdownPrivilege 1900 Conhost.exe Token: SeUndockPrivilege 1900 Conhost.exe Token: SeManageVolumePrivilege 1900 Conhost.exe Token: 33 1900 Conhost.exe Token: 34 1900 Conhost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4356 wrote to memory of 3732 4356 SynapseX Launcher.exe 84 PID 4356 wrote to memory of 3732 4356 SynapseX Launcher.exe 84 PID 3732 wrote to memory of 2384 3732 SynapseX Launcher.exe 85 PID 3732 wrote to memory of 2384 3732 SynapseX Launcher.exe 85 PID 3732 wrote to memory of 4572 3732 SynapseX Launcher.exe 88 PID 3732 wrote to memory of 4572 3732 SynapseX Launcher.exe 88 PID 3732 wrote to memory of 684 3732 SynapseX Launcher.exe 92 PID 3732 wrote to memory of 684 3732 SynapseX Launcher.exe 92 PID 3732 wrote to memory of 5072 3732 SynapseX Launcher.exe 94 PID 3732 wrote to memory of 5072 3732 SynapseX Launcher.exe 94 PID 3732 wrote to memory of 556 3732 SynapseX Launcher.exe 97 PID 3732 wrote to memory of 556 3732 SynapseX Launcher.exe 97 PID 3732 wrote to memory of 1900 3732 SynapseX Launcher.exe 215 PID 3732 wrote to memory of 1900 3732 SynapseX Launcher.exe 215 PID 556 wrote to memory of 4612 556 cmd.exe 208 PID 556 wrote to memory of 4612 556 cmd.exe 208 PID 3732 wrote to memory of 688 3732 SynapseX Launcher.exe 100 PID 3732 wrote to memory of 688 3732 SynapseX Launcher.exe 100 PID 688 wrote to memory of 1800 688 cmd.exe 101 PID 688 wrote to memory of 1800 688 cmd.exe 101 PID 3732 wrote to memory of 2148 3732 SynapseX Launcher.exe 103 PID 3732 wrote to memory of 2148 3732 SynapseX Launcher.exe 103 PID 3732 wrote to memory of 3948 3732 SynapseX Launcher.exe 105 PID 3732 wrote to memory of 3948 3732 SynapseX Launcher.exe 105 PID 3732 wrote to memory of 1948 3732 SynapseX Launcher.exe 107 PID 3732 wrote to memory of 1948 3732 SynapseX Launcher.exe 107 PID 3732 wrote to memory of 1680 3732 SynapseX Launcher.exe 110 PID 3732 wrote to memory of 1680 3732 SynapseX Launcher.exe 110 PID 3732 wrote to memory of 3760 3732 SynapseX Launcher.exe 112 PID 3732 wrote to memory of 3760 3732 SynapseX Launcher.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\SynapseX Launcher.exe"C:\Users\Admin\AppData\Local\Temp\SynapseX Launcher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\SynapseX Launcher.exe"C:\Users\Admin\AppData\Local\Temp\SynapseX Launcher.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵PID:2384
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:1900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2> nul3⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc4⤵PID:4612
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2> nul3⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName4⤵PID:1800
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:1948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3760
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:3176
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:3396
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵PID:1648
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:2164
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:1820
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵PID:1900
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:4120
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:3108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵PID:3788
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:1536
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:1116
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵PID:5108
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:4672
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:1648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵PID:4248
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:2268
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:4416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵PID:4268
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:460
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:1364
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵PID:1396
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:568
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:2492
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵PID:1112
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:4760
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:2548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵PID:4000
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:1520
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:4696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵PID:3600
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:3416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:2440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵PID:2012
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:4660
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:2164
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4612
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵PID:4760
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:4936
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:100
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵PID:3780
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:4556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:1876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵PID:3704
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:1032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:1608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵PID:5108
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:1628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:2164
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵PID:2864
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:3604
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:1256
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵PID:4580
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:1540
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵PID:4272
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:3744
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:3764
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵PID:4820
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:3392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵PID:752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵PID:1416
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵PID:4008
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵PID:4828
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious use of AdjustPrivilegeToken
PID:1900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD5446dd1cf97eaba21cf14d03aebc79f27
SHA136e4cc7367e0c7b40f4a8ace272941ea46373799
SHA256a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf
SHA512a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7
-
Filesize
22KB
MD50d0450292a5cf48171411cc8bfbbf0f7
SHA15de70c8bab7003bbd4fdcadb5c0736b9e6d0014c
SHA256cb3ce4f65c9e18be6cbb504d79b594b51f38916e390dad73de4177fe88ce9c37
SHA512ba6bbcc394e07fe09bb3a25e4aae9c4286516317d0b71d090b91aaec87fc10f61a4701aa45bc74cb216fff1e4ad881f62eb94d4ee2a3a9c8f04a954221b81d3a
-
Filesize
23KB
MD50f4d8993f0d2bd829fea19a1074e9ce7
SHA14dfe8107d09e4d725bb887dc146b612b19818abf
SHA2566ca8711c8095bbc475d84f81fc8dfff7cd722ffe98e0c5430631ae067913a11f
SHA5121e6f4bc9c682654bd18e1fc4bd26b1e3757c9f89dc5d0764b2e6c45db079af184875d7d3039161ea93d375e67f33e4fb48dcb63eae0c4ee3f98f1d2f7002b103
-
Filesize
25KB
MD58f385dbacd6c787926ab370c59d8bba2
SHA1953bad3e9121577fab4187311cb473d237f6cba3
SHA256ddf0b165c1c4eff98c4ac11e08c7beadcdd8cc76f495980a21df85ba4368762a
SHA512973b80559f238f6b0a83cd00a2870e909a0d34b3df1e6bb4d47d09395c4503ea8112fb25115232c7658e5de360b258b6612373a96e6a23cde098b60fe5579c1c
-
Filesize
21KB
MD5ade53f8427f55435a110f3b5379bdde1
SHA190bdafccfab8b47450f8226b675e6a85c5b4fcce
SHA25655cf117455aa2059367d89e508f5e2ad459545f38d01e8e7b7b0484897408980
SHA5122856d4c1bbdd8d37c419c5df917a9cc158c79d7f2ee68782c23fb615d719d8fe61aaa1b5f5207f80c31dc381cd6d8c9dabd450dbc0c774ff8e0a95337fda18bd
-
Filesize
22KB
MD5b894480d74efb92a7820f0ec1fc70557
SHA107eaf9f40f4fce9babe04f537ff9a4287ec69176
SHA256cdff737d7239fe4f39d76683d931c970a8550c27c3f7162574f2573aee755952
SHA512498d31f040599fe3e4cfd9f586fc2fee7a056635e9c8fd995b418d6263d21f1708f891c60be09c08ccf01f7915e276aafb7abb84554280d11b25da4bdf3f3a75
-
Filesize
95KB
MD5f34eb034aa4a9735218686590cba2e8b
SHA12bc20acdcb201676b77a66fa7ec6b53fa2644713
SHA2569d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1
SHA512d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af
-
Filesize
60KB
MD53aea41c0a41765d6b0eb3363804d94d0
SHA126f05e3e458d5b90326ea40c6bbf236a3dbd49f0
SHA2562c9f565254e4b2744d52b58f4960d5da1330c7846059b772044e4415804d933e
SHA512a1f5eb597c43a053d28e16b48f365760189eeb129ac3ea1eaa3bb6648332c5f11a4a446d29dcd90e773858fb4b6367568fcd9c778ea1efee5d4972dcdfe4a0e6
-
Filesize
78KB
MD5d61719bf7f3d7cdebdf6c846c32ddaca
SHA1eda22e90e602c260834303bdf7a3c77ab38477d0
SHA25631dd9bfb64b1bee8faf925296028e2af907e6d933a83ddc570ebc82d11c43cfb
SHA512e6c7eab95c18921439f63a30f76313d8380e66bd715afc44a89d386ae4e80c980c2632c170a445bad7446ee5f2c3ee233ccc7333757358340d551e664204e21f
-
Filesize
177KB
MD56f1b90884343f717c5dc14f94ef5acea
SHA1cca1a4dcf7a32bf698e75d58c5f130fb3572e423
SHA2562093e7e4f5359b38f0819bdef8314fda332a1427f22e09afc416e1edd5910fe1
SHA512e2c673b75162d3432bab497bad3f5f15a9571910d25f1dffb655755c74457ac78e5311bd5b38d29a91aec4d3ef883ae5c062b9a3255b5800145eb997863a7d73
-
Filesize
117KB
MD53fc444a146f7d667169dcb4f48760f49
SHA1350a1300abc33aa7ca077daba5a883878a3bca19
SHA256b545db2339ae74c523363b38835e8324799720f744c64e7142ddd48e4b619b68
SHA5121609f792583c6293abddf7f7376ffa0d33a7a895de4d8b2ecebaede74e8850b225b3bf0998b056e40e4ebffb5c97babccf52d3184b2b05072c0dbb5dcb1866f8
-
Filesize
60KB
MD50d75220cf4691af4f97ebcbd9a481c62
SHA1dadc3d5476c83668a715750ed80176dbbb536ec7
SHA2569da79abfed52c7432a25a513f14134f3782c73ec7142e2d90223610eaef54303
SHA512c00bd7a768e2eef7956d05f10330f3669b279866221085f9e9b97c4e553bb44356d041e29fd4337142ccbdf4e200769d69a235c1c5ddeb6fc64d537629eac112
-
Filesize
151KB
MD5afff5db126034438405debadb4b38f08
SHA1fad8b25d9fe1c814ed307cdfddb5cd6fe778d364
SHA25675d450e973cd1ccbd0f9a35ba0d7e6d644125eb311cc432bb424a299d9a52ee0
SHA5123334d2ad9811e3be70b5a9fd84bc725c717a3ac59e2fd87e178cb39ac9172db7f9ec793011c4e613a89773b4f2425be66d44a21145a9051bed35f55a483759cc
-
Filesize
45KB
MD584609daeef4ebd0725098c74a3772cbb
SHA1d4a9487f34ea36d097ecbba53a9410be268944af
SHA256622171218fab2952c569acdbf0489d0098fa0664f61624d1c4f040410731be41
SHA512b80e77d851137181445c8056abecf8b40647d49458897e306409f56084196cbef03d12d64ac2abd351dc6901fb5b3914bb5dbc5d490cfdb1aebb04be41e02eeb
-
Filesize
27KB
MD5c8a1f1dc297b6dd10c5f7bc64f907d38
SHA1be0913621e5ae8b04dd0c440ee3907da9cf6eb72
SHA256827a07b27121200ed9fb2e9efd13ccbf57ca7d32d9d9d1619f1c303fb4d607b7
SHA512e5f07935248f8d57b1f61fe5de2105b1555c354dd8dd98f0cff21b08caba17b66272a093c185ca025edb503690ba81d5fa8b7443805a07338b25063e2f7ea1b1
-
Filesize
74KB
MD5f59ddb8b1eeac111d6a003f60e45b389
SHA1e4e411a10c0ad4896f8b8153b826214ed8fe3caa
SHA2569558dda6a3f6ad0c3091d643e2d3bf5bf20535904f691d2bdb2ce78edf46c2da
SHA512873c6841ebf38b217465f1ead02b46a8823ef1de67d6608701e30faf5024ed00ab3c4cc4aa8c4836552ecdb16c7470fe965cf76f26ee88615746d456ff6a2bcf
-
Filesize
93KB
MD534abb557f431aa8a56837a2a804befeb
SHA1c4ad5e35ef6971991dd39b06d36b8f61ef039061
SHA2566dfb89e5c0b6c5c81ab081d3fdf5f35921466d2ddcede5394d3c4516655b66e0
SHA512e078eaadecbbf57b618d301910b72a2737c65f1bbb3999fe8523396ce3a46eef1a774b94221eb83678e0e8c5e92459f3d45192535a498fd4d981b580c337a850
-
Filesize
153KB
MD580f2475d92ad805439d92cba6e657215
SHA120aa5f43ca83b3ff07e38b00d5fbd0cf3d7dbbab
SHA25641278e309382c79356c1a4daf6dbb5819441d0c6e64981d031cda077bb6f1f79
SHA512618cd6ca973a0b04159a7c83f1f0cda5db126a807982983fea68f343c21e606a3cdb60b95a2b07f4d9379149d844755b9767fea0a64dd1d4451ab894a1f865b5
-
Filesize
606KB
MD5f202aecbf4d1b860877f3722447e422f
SHA1bf93aa4c8e7198b459ddac6711da085c36abfe2d
SHA25631597794272ea5b388dce1f6ede4ac77ba784e89a0c05f7e6de8df8bdbec4738
SHA512fd351bf2b3d904aee550d0d20f2f28464d6ed3b7ed6c77329a3e36c3419104a92768f6246a01cc8adddde3a747133ae378e8222bc24801a59fd1655bb793c5d9
-
Filesize
1.8MB
MD5ee7337b4336f3cf4c0570a0f000c4022
SHA11cac080f6442d2162cfeabdc78ab5ebc0f56d118
SHA256aae248593525421942b0ec1c41e0ce4175d7e7ca6e67f6e4ca4077354813b929
SHA5128e04821c61dd53502b4582b40a31bef2cc3b2f4500cd30f1d5d61211cb87923c227ee0cfd833d4b179ab58314c23008c15f1bf852c63acff1b3bf837ad401d63
-
Filesize
2.0MB
MD5250eb51b68dc280dd243e99ee4b86290
SHA1aebffb03a1f96cc2acd1d2f41dc9b45b578ad528
SHA25603cd091f98a00f5061ff0df76f2f0d1d7c350425c9c21a450ab90f616f29feb1
SHA512ef54e57c3bb79754a608d639b9445b431f547a09baae950db6cc90ee8f41b8e11d917004b63e28fec080140b9e9edfc199fc6bb813a7e39931a3b56aef10e51f
-
Filesize
2.1MB
MD5498c7d8364e2b5a61881005a1d4f2d4f
SHA1ba77d7b07e9d38f63eddbd124ab44178c40d5018
SHA256bb1860f1a1ac190c3065af276d82a3f01cdcb0331ed2c01c3c42f8aa8a911687
SHA51213e0ef5243a73b2bef269dacd9acde61e0b89bcf27b8e6ccad3cc81894c53862b7abc56295a3209c1b858430d6f5fe0513b9e3109cacdb3a89485c1c4576b152
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
682KB
MD5de72697933d7673279fb85fd48d1a4dd
SHA1085fd4c6fb6d89ffcc9b2741947b74f0766fc383
SHA256ed1c8769f5096afd000fc730a37b11177fcf90890345071ab7fbceac684d571f
SHA5120fd4678c65da181d7c27b19056d5ab0e5dd0e9714e9606e524cdad9e46ec4d0b35fe22d594282309f718b30e065f6896674d3edce6b3b0c8eb637a3680715c2c
-
Filesize
11KB
MD5ff4fb4f07ff2ba9f0c492e2500955104
SHA1dcbaac2d8d603fc3e3a660915a22454d99fa8507
SHA2568ce0bdb073dfcd995248b306b59788a7c8d9b3cd30a4ea9fccc75843856ba3e9
SHA5121706146350a049583ec4cff6ea26c27d5471039b3ad22c753179629f0846077e94da702010b85b866a5b98703a98b533be70152527597b00d6430d269b353e5b
-
Filesize
73KB
MD5b8fad66e60f153e7528c6e0ef2720e15
SHA19bc6e10ba4a13f7ceb2f9f4e676d4f71faf65305
SHA256b85192b2e44c549df219c78c32f49d68def91e61c2285f42232f11edbada6058
SHA512834d6ac3742bf7582f3bb3018d3848b3e7065e25312f6dc584b9e1e3b211e7aab59bcb8af3107f0d3eb6f840e08d40ff82a2af3a471fcd1333509819024d95e6
-
Filesize
191KB
MD54cb923b0d757fe2aceebf378949a50e7
SHA1688bbbae6253f0941d52faa92dedd4af6f1dfc3b
SHA256e41cff213307b232e745d9065d057bcf36508f3a7150c877359800f2c5f97cfc
SHA5129e88542d07bd91202fcf13b7d8c3a2bbd3d78e60985b45f4fa76c6cd2a2abdee2a0487990bea0713f2ad2a762f120411c3fbbfaa71ef040774512da8f6328047
-
Filesize
61KB
MD5704d647d6921dbd71d27692c5a92a5fa
SHA16f0552ce789dc512f183b565d9f6bf6bf86c229d
SHA256a1c5c6e4873aa53d75b35c512c1cbadf39315deeec21a3ada72b324551f1f769
SHA5126b340d64c808388fe95e6d632027715fb5bd801f013debaaa97e5ecb27a6f6ace49bf23648517dd10734daff8f4f44969cff2276010bf7502e79417736a44ec4
-
Filesize
3.0MB
MD5d5824a1793014889f4e8460d5711d0cf
SHA13f89202148392403e96f04449a665c9352981cdb
SHA2565dbc38b8433bb8a96fa3cddda1bc2cf262ac2f6684bc0356953635c7ef735558
SHA512582967639da83965f4d7c83c705be7a8bdbac5c8915f68f3db6a4319f53815f4163d604b4649a88c35698c043466cff4758204ef0febc44329250af008fc7836
-
Filesize
736KB
MD51bc0bcc7310a2211af589aa54c47a450
SHA1dac227a6655735796cac6296d9fdeaab7ef4a86b
SHA256267dbb2557787cee941f72894f4103b4c05d3705cff5db66474ec7ef6f4e3906
SHA512ea3f69fbb9633de1d1000e880d289631eda9f5bf0bb37eb8243f2c7c707d7613289fb1325320f524cf9e230e664b4f96fe6b4f4677455277f2fae7731a840043
-
Filesize
116KB
MD518a389577d3886fbdabd5ff9c2c975a6
SHA15a5b95cf402dcf42b3f1d7769faf1eb56add28a9
SHA2563867e1a36c8b4c361af5afc77065e082ea216b30d8cd96e91ab062d365f3b76a
SHA51211f64ddbb2781b7167ea6c809728e1a5cd99c84e6996e90545c9262d7661d5f150bdcb7f0dd874875e091308bace13fbb0c6938ffff0c9d11ce0fbc4af486972
-
Filesize
143KB
MD5bd1ee0e25a364323faa252eee25081b5
SHA17dea28e7588142d395f6b8d61c8b46104ff9f090
SHA25655969e688ad11361b22a5cfee339645f243c3505d2963f0917ac05c91c2d6814
SHA512d9456b7b45151614c6587cee54d17261a849e7950049c78f2948d93a9c7446b682e553e2d8d094c91926dd9cbaa2499b1687a9128aec38b969e95e43657c7a54
-
Filesize
26KB
MD5994a6348f53ceea82b540e2a35ca1312
SHA18d764190ed81fd29b554122c8d3ae6bf857e6e29
SHA256149427a8d58373351955ee01a1d35b5ab7e4c6ac1a312daa9ba8c72b7e5ac8a4
SHA512b3dfb4672f439fa43e29e5b1ababca74f6d53ea4bad39dfe91f59382e23dbb2a3aea2add544892e3fcd83e3c5357ee7f09fe8ab828571876f68d76f1b1fcee2f
-
Filesize
1.4MB
MD54ca15508e6fa67f85b70e6096f44ccc9
SHA18d2ad53c9dc0e91a8f5ab0622f559254d12525d9
SHA2564b3f88de7acfcac304d1d96f936d0123ad4250654e48bd412f12a7bd8ec7ebb3
SHA512581aa0b698045c55778e7c773c7c326fcafa39aa9a248f91d061c49096a00b3a202d3746c5a8d33100b9bc57910299db6858b7ef9337ae628d3041f59e9b4df6
-
Filesize
1.1MB
MD5c01a5ce36dd1c822749d8ade8a5e68ca
SHA1a021d11e1eb7a63078cbc3d3e3360d6f7e120976
SHA2560f27f26d1faa4f76d4b9d79ad572a3d4f3bbe8020e2208d2f3b9046e815b578a
SHA5123d4e70a946f69633072a913fe86bada436d0c28aca322203aa5ec9d0d7ae111129516d7adb3fdeef6b1d30b50c86c1de2c23a1bc9fba388474b9d9131c1e5d38
-
Filesize
136KB
MD5fc7b3937aa735000ef549519425ce2c9
SHA1e51a78b7795446a10ed10bdcab0d924a6073278d
SHA256a6949ead059c6248969da1007ea7807dcf69a4148c51ea3bc99c15ee0bc4d308
SHA5128840ff267bf216a0be8e1cae0daac3ff01411f9afc18b1f73ba71be8ba70a873a7e198fd7d5df98f7ca8eee9a94eab196f138a7f9f37d35c51118f81860afb7d
-
Filesize
125KB
MD56e997339ca0ae75a256369b9a5455e4d
SHA1ec6de3e28e57fe0a1517401319974a07ac8990d3
SHA2564e9ccdcc354238c1d62394b34825e5338ef27e3487e8ed96ebd6add8368b6e46
SHA5125441edcff5950c25baa8f63e188e8c298278198797931f49e1e25b155c8b5f462e54f1488ea7358939eebf8fc4b37ed5fcb518b04502989dd8a66d30d06ecbec
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82