Overview
overview
10Static
static
3anhezkzllnds.exe
windows10-1703-x64
anhezkzllnds.exe
windows10-2004-x64
bghfldfyngmg.exe
windows10-1703-x64
bghfldfyngmg.exe
windows10-2004-x64
jldfefkrpayl.exe
windows10-1703-x64
jldfefkrpayl.exe
windows10-2004-x64
molbfgsxjpwv.exe
windows10-1703-x64
molbfgsxjpwv.exe
windows10-2004-x64
msxsbkvjyoho.exe
windows10-1703-x64
msxsbkvjyoho.exe
windows10-2004-x64
oboekjkdross.exe
windows10-1703-x64
oboekjkdross.exe
windows10-2004-x64
puugtqapzxao.exe
windows10-1703-x64
puugtqapzxao.exe
windows10-2004-x64
pyaxlaetvdvq.exe
windows10-1703-x64
pyaxlaetvdvq.exe
windows10-2004-x64
qywfpvbxbvih.exe
windows10-1703-x64
qywfpvbxbvih.exe
windows10-2004-x64
ylyxcgqrxdhu.exe
windows10-1703-x64
ylyxcgqrxdhu.exe
windows10-2004-x64
Analysis
-
max time kernel
754s -
max time network
766s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2024 15:26
Static task
static1
Behavioral task
behavioral1
Sample
anhezkzllnds.exe
Resource
win10-20240214-en
Behavioral task
behavioral2
Sample
anhezkzllnds.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
bghfldfyngmg.exe
Resource
win10-20240214-en
Behavioral task
behavioral4
Sample
bghfldfyngmg.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
jldfefkrpayl.exe
Resource
win10-20240214-en
Behavioral task
behavioral6
Sample
jldfefkrpayl.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
molbfgsxjpwv.exe
Resource
win10-20240214-en
Behavioral task
behavioral8
Sample
molbfgsxjpwv.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
msxsbkvjyoho.exe
Resource
win10-20240214-en
Behavioral task
behavioral10
Sample
msxsbkvjyoho.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
oboekjkdross.exe
Resource
win10-20240214-en
Behavioral task
behavioral12
Sample
oboekjkdross.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
puugtqapzxao.exe
Resource
win10-20240214-en
Behavioral task
behavioral14
Sample
puugtqapzxao.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
pyaxlaetvdvq.exe
Resource
win10-20240214-en
Behavioral task
behavioral16
Sample
pyaxlaetvdvq.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
qywfpvbxbvih.exe
Resource
win10-20240214-en
Behavioral task
behavioral18
Sample
qywfpvbxbvih.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
ylyxcgqrxdhu.exe
Resource
win10-20240214-en
Behavioral task
behavioral20
Sample
ylyxcgqrxdhu.exe
Resource
win10v2004-20231215-en
Errors
General
-
Target
oboekjkdross.exe
-
Size
799KB
-
MD5
4220d4a32781415bf36e0e159fd38ce1
-
SHA1
832933a30b0833e805f02af041cd787f3169f7d9
-
SHA256
e6b63cd513768974b5415cd8d65e2344f2064f5eed7002c9b58c52b92435c124
-
SHA512
a18e173b375586a1c38cdeac9e4d4d57d07c484fd0a94d853ae5b63e20a3abfbd281fc8f1c89f8c1ea548cd43bde7c6bc3b08a095f7d5c8dd06f46d2640942ed
-
SSDEEP
12288:VZCDjstPVle8oyXeViFmvVsr9puiCNfM3q9RNIwo:V0DjOuYFwV4aN03qD
Malware Config
Extracted
njrat
0.7d
Lammer
8.tcp.ngrok.io:19346
bca7344ec33c4f045ea133b6b48694e2
-
reg_key
bca7344ec33c4f045ea133b6b48694e2
-
splitter
|'|'|
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral12/memory/2800-524-0x0000000000B40000-0x0000000000B4A000-memory.dmp disable_win_def -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
oboekjkdross.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Users\\Admin\\Documents\\Sub\\xdwdClient.exe" oboekjkdross.exe -
Processes:
oboekjkdross.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection oboekjkdross.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" oboekjkdross.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" oboekjkdross.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" oboekjkdross.exe -
Processes:
oboekjkdross.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\consentpromptbehavioradmin = "0" oboekjkdross.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" oboekjkdross.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\promptonsecuredesktop = "0" oboekjkdross.exe -
Modifies AppInit DLL entries 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 1164 netsh.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
RegAsm.exeoboekjkdross.execgwpw1ma.n2m.exeTrojan.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation oboekjkdross.exe Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation cgwpw1ma.n2m.exe Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation Trojan.exe -
Drops startup file 2 IoCs
Processes:
Trojan.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bca7344ec33c4f045ea133b6b48694e2.exe Trojan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bca7344ec33c4f045ea133b6b48694e2.exe Trojan.exe -
Executes dropped EXE 3 IoCs
Processes:
Trojan.execgwpw1ma.n2m.exeTrojan.exepid process 4792 Trojan.exe 4376 cgwpw1ma.n2m.exe 1364 Trojan.exe -
Loads dropped DLL 25 IoCs
Processes:
WmiApSrv.exepowershell.exepowershell.exemsedge.exemsedge.exemsedge.exeCompPkgSrv.exeCompPkgSrv.exemsedge.exeshutdown.exeLogonUI.exepid process 1360 1156 3564 1852 3396 WmiApSrv.exe 4156 4636 powershell.exe 3024 4932 2440 1372 powershell.exe 3348 5008 3252 2524 msedge.exe 2852 msedge.exe 3232 msedge.exe 3720 2848 CompPkgSrv.exe 4788 CompPkgSrv.exe 2068 msedge.exe 3312 2340 shutdown.exe 744 LogonUI.exe 3012 -
Processes:
oboekjkdross.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" oboekjkdross.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
oboekjkdross.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SDLKFJHDLKHDkh = "C:\\Users\\Admin\\Documents\\Sub\\xdwdWatchDog.exe" oboekjkdross.exe -
Processes:
oboekjkdross.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua oboekjkdross.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" oboekjkdross.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
Processes:
flow ioc 162 8.tcp.ngrok.io 168 0.tcp.eu.ngrok.io 22 0.tcp.eu.ngrok.io 60 0.tcp.eu.ngrok.io 86 0.tcp.eu.ngrok.io 90 8.tcp.ngrok.io -
Suspicious use of SetThreadContext 1 IoCs
Processes:
oboekjkdross.exedescription pid process target process PID 2800 set thread context of 2724 2800 oboekjkdross.exe RegAsm.exe -
Drops file in Windows directory 1 IoCs
Processes:
oboekjkdross.exedescription ioc process File created C:\Windows\xdwd.dll oboekjkdross.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "218" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
Processes:
oboekjkdross.exeWmiApSrv.exepowershell.exepowershell.exemsedge.exemsedge.exemsedge.exeCompPkgSrv.exeCompPkgSrv.exeidentity_helper.exemsedge.exeshutdown.exeLogonUI.exepid process 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 2800 oboekjkdross.exe 3396 WmiApSrv.exe 3396 WmiApSrv.exe 4636 powershell.exe 4636 powershell.exe 4636 powershell.exe 4636 powershell.exe 1372 powershell.exe 1372 powershell.exe 1372 powershell.exe 1372 powershell.exe 2524 msedge.exe 2524 msedge.exe 2852 msedge.exe 2852 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 2852 msedge.exe 2852 msedge.exe 2848 CompPkgSrv.exe 4788 CompPkgSrv.exe 2504 identity_helper.exe 2504 identity_helper.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2340 shutdown.exe 2340 shutdown.exe 744 LogonUI.exe 744 LogonUI.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
oboekjkdross.exepowershell.exepowershell.exeTrojan.exeshutdown.exedescription pid process Token: SeDebugPrivilege 2800 oboekjkdross.exe Token: SeDebugPrivilege 4636 powershell.exe Token: SeDebugPrivilege 1372 powershell.exe Token: SeDebugPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: 33 1364 Trojan.exe Token: SeIncBasePriorityPrivilege 1364 Trojan.exe Token: SeShutdownPrivilege 2340 shutdown.exe Token: SeRemoteShutdownPrivilege 2340 shutdown.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 744 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
oboekjkdross.exeRegAsm.execmd.exepowershell.execgwpw1ma.n2m.exeTrojan.execmd.exemsedge.exedescription pid process target process PID 2800 wrote to memory of 4636 2800 oboekjkdross.exe powershell.exe PID 2800 wrote to memory of 4636 2800 oboekjkdross.exe powershell.exe PID 2800 wrote to memory of 2724 2800 oboekjkdross.exe RegAsm.exe PID 2800 wrote to memory of 2724 2800 oboekjkdross.exe RegAsm.exe PID 2800 wrote to memory of 2724 2800 oboekjkdross.exe RegAsm.exe PID 2800 wrote to memory of 2724 2800 oboekjkdross.exe RegAsm.exe PID 2800 wrote to memory of 2724 2800 oboekjkdross.exe RegAsm.exe PID 2800 wrote to memory of 2724 2800 oboekjkdross.exe RegAsm.exe PID 2800 wrote to memory of 2724 2800 oboekjkdross.exe RegAsm.exe PID 2800 wrote to memory of 2724 2800 oboekjkdross.exe RegAsm.exe PID 2724 wrote to memory of 4792 2724 RegAsm.exe Trojan.exe PID 2724 wrote to memory of 4792 2724 RegAsm.exe Trojan.exe PID 2724 wrote to memory of 4792 2724 RegAsm.exe Trojan.exe PID 2800 wrote to memory of 2968 2800 oboekjkdross.exe cmd.exe PID 2800 wrote to memory of 2968 2800 oboekjkdross.exe cmd.exe PID 2968 wrote to memory of 1372 2968 cmd.exe powershell.exe PID 2968 wrote to memory of 1372 2968 cmd.exe powershell.exe PID 1372 wrote to memory of 4376 1372 powershell.exe cgwpw1ma.n2m.exe PID 1372 wrote to memory of 4376 1372 powershell.exe cgwpw1ma.n2m.exe PID 1372 wrote to memory of 4376 1372 powershell.exe cgwpw1ma.n2m.exe PID 4376 wrote to memory of 1364 4376 cgwpw1ma.n2m.exe Trojan.exe PID 4376 wrote to memory of 1364 4376 cgwpw1ma.n2m.exe Trojan.exe PID 4376 wrote to memory of 1364 4376 cgwpw1ma.n2m.exe Trojan.exe PID 1364 wrote to memory of 1164 1364 Trojan.exe netsh.exe PID 1364 wrote to memory of 1164 1364 Trojan.exe netsh.exe PID 1364 wrote to memory of 1164 1364 Trojan.exe netsh.exe PID 1364 wrote to memory of 2620 1364 Trojan.exe cmd.exe PID 1364 wrote to memory of 2620 1364 Trojan.exe cmd.exe PID 1364 wrote to memory of 2620 1364 Trojan.exe cmd.exe PID 2620 wrote to memory of 2852 2620 cmd.exe msedge.exe PID 2620 wrote to memory of 2852 2620 cmd.exe msedge.exe PID 2852 wrote to memory of 2524 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 2524 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe PID 2852 wrote to memory of 3776 2852 msedge.exe msedge.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
oboekjkdross.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\consentpromptbehavioradmin = "0" oboekjkdross.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" oboekjkdross.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\promptonsecuredesktop = "0" oboekjkdross.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\oboekjkdross.exe"C:\Users\Admin\AppData\Local\Temp\oboekjkdross.exe"1⤵
- Modifies WinLogon for persistence
- Modifies Windows Defender Real-time Protection settings
- UAC bypass
- Checks computer location settings
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"3⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\cgwpw1ma.n2m.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\cgwpw1ma.n2m.exe"'3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\cgwpw1ma.n2m.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\cgwpw1ma.n2m.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"5⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Trojan.exe" "Trojan.exe" ENABLE6⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC462.tmp.bat" "6⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.redtube.com/7⤵
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffaec9746f8,0x7ffaec974708,0x7ffaec9747188⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,18178432436181541559,1654850588186403299,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1972 /prefetch:28⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1952,18178432436181541559,1654850588186403299,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:38⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1952,18178432436181541559,1654850588186403299,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:88⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,18178432436181541559,1654850588186403299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:18⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,18178432436181541559,1654850588186403299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:18⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,18178432436181541559,1654850588186403299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:18⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,18178432436181541559,1654850588186403299,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:18⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,18178432436181541559,1654850588186403299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:18⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1952,18178432436181541559,1654850588186403299,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:88⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1952,18178432436181541559,1654850588186403299,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:88⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,18178432436181541559,1654850588186403299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2208 /prefetch:18⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,18178432436181541559,1654850588186403299,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3872 /prefetch:18⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,18178432436181541559,1654850588186403299,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5748 /prefetch:28⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,18178432436181541559,1654850588186403299,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:18⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,18178432436181541559,1654850588186403299,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:18⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c Shutdown /s /f /t 002⤵
-
C:\Windows\system32\shutdown.exeShutdown /s /f /t 003⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39b0855 /state1:0x41c64e6d1⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5eb20b5930f48aa090358398afb25b683
SHA14892c8b72aa16c5b3f1b72811bf32b89f2d13392
SHA2562695ab23c2b43aa257f44b6943b6a56b395ea77dc24e5a9bd16acc2578168a35
SHA512d0c6012a0059bc1bb49b2f293e6c07019153e0faf833961f646a85b992b47896092f33fdccc893334c79f452218d1542e339ded3f1b69bd8e343d232e6c3d9e8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
432B
MD53565b347411a502879e3d33f17fef621
SHA107c043c8bd2247cff4b96b7f44805eadea19e8f7
SHA25695a4760713b87377c2980ea4e04c93f6efd398d136feeb9aa983294b958a2b81
SHA512a3ef51aa381c05e9d2823b44970294c2794567abb6c55e2675747518450dee54d7d332139ecba7841e49f421da95fb2d6673f0ec5357e304b83952ef34a39eb2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1KB
MD5dba7f0a31c886b27e9d9b783daf8a23d
SHA1669a29667d0219a24b92f5735dfa6685de3ad9c9
SHA25697479326e0bc7648b4e519146c4bdd5dcf2b9ada2f1b8a47e66b5a6c56261383
SHA5129b26dff32414c72510b4c50a2bd5562b72c797c962383daee93435a7373828263be2b27231b53f9b45d7f895e62466f745cd33d75cc077d56762b7f6b8e6eb38
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD520a6f18a61ba350edb3d49da5dd4d33b
SHA140034003ddf1272814589a87b47fa7a38976b1f3
SHA25670e6811058f01253b0d868203aaaed5844e870ffa98bafbc335fbdb10ebcfce4
SHA512f06dc5f746f199c26f7d4e18f50439c7a9963342d7a485f556ff5a186affe2b2a9d34681088cf0060ee1ec5321bd021ac2969875f20a7eae29fdb0781ea7dd89
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5b79d8c3ccee285853a5a6622ff429bb9
SHA1f7ded00cc0ecbe063fffc379948611e87dbaca20
SHA256c3dd82c730930b031753b11273632eebac0fa4e45e083256baec93491ec46c03
SHA512fa641f434d2f3cd14ad6c8267c636a0fb8cd49a57d724552010cab504b01993b40f392e780e128c5224141344c6be1cd3c585d150658967993452377a1aa8670
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure PreferencesFilesize
24KB
MD52bbbdb35220e81614659f8e50e6b8a44
SHA17729a18e075646fb77eb7319e30d346552a6c9de
SHA25673f853ad74a9ac44bc4edf5a6499d237c940c905d3d62ea617fbb58d5e92a8dd
SHA51259c5c7c0fbe53fa34299395db6e671acfc224dee54c7e1e00b1ce3c8e4dfb308bf2d170dfdbdda9ca32b4ad0281cde7bd6ae08ea87544ea5324bcb94a631f899
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-indexFilesize
168B
MD54f26525ec3d69c38938ac12f7c43b134
SHA13ab6d7692c743da49b3b4572a8e671cb56fcfa82
SHA256e6ffb66259403193954ba2a3e60007a97e380df2e8541fe72f40f96068051c82
SHA51238ccb23d170f19b198b86627c4c5f0394d138e69ed489152add766861d765047fcfbb669d73b73ff55087b25b0f450fe8f2c4b0c3d194e4fb13f2793d2b63a16
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe603935.TMPFilesize
48B
MD5eb8be0bf8b9665c95bbd55677e0af828
SHA162142147bf9cef5265a857c1e96ba5eb8457e3d4
SHA256daf3063252b7e5c842f5c323492d9e5e4e58bf32d96558f72fa3456aec6ca1e8
SHA512c3ff6a6be6eba80401128503b67d9d543d0e9baf5916e58960daa48e2a90334ba64e3685fbd450f4e54f990066010be57ee149297cbe4afa8bdb22137ab90148
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD5194aef65fe441278a3b1b815645882cc
SHA18c1e5349b40e8a1c0a63b3a93aa4f52948b77f51
SHA25688434ad6488b0534d0b51ff94ae91836016721c40ede311cd298b3914994b8f9
SHA512e85a54f9cbeee0334f85a4b3a28f2bc2f7ee0a9eb214d2ef8442153cb9d01bff86ba610ae9041a3c385158dd8268c9ace18ea8f601541da86828e6173cc59aa3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
10KB
MD5250839cc75da35cc5f6a6de1deb6d431
SHA11d51c6541c4565fe94cb131947d934d2eceb3e58
SHA25614a443963f3e49614049bfdb6c7d1a580bf89543a5cbbc0a67b229deaaed5f8f
SHA5121c492ff21f35df42e7d047594a3fbaf4c2df5cfad841eb8e3d3a865d95a18a1d6bad5a989610a6798a42151aa7f821187c67d00097f8fa0500cdfa3564391ddc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
C:\Users\Admin\AppData\Local\Temp\Trojan.exeFilesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zy1nmpzo.mw1.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\tmpC462.tmp.batFilesize
37B
MD5f5726d253fe5d4ecc9568bd9999883ca
SHA18fec12574c36283782076dd020fe67bbd6c49b8b
SHA2561ede0c20a3dc0fd37285a36f19be95d0770f162e199e3514713301ecc8d05687
SHA5122bc5d23a1eac45030c181f585c1a44b74386779d1e6e9448e190210d4eae4f98273923b7e055985d06c17e629429098fa78fa11a365d40fc93406cf6a13c9ee6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\cgwpw1ma.n2m.exeFilesize
23KB
MD52c16e91ad2c6bdd99a1c2d419fbb0ec3
SHA1f9b7ff51da9f9010fe3c9ab9cdcbc0febdb137da
SHA2565b7d0d117902bffd1821b5d5cf7b0ace5061c0913f546e7bebd3e6a62c65e6ed
SHA512ecd2ff0e6fa203daac5e51e814fa8c46b049857c15f90edfa6e9da8903bed72d9cdd4e98bc471e104cd2ee6b79dc780f361bf85aa7a8e2351a1e5099c73974cc
-
C:\Users\Admin\Documents\Sub\xdwdClient.exeFilesize
799KB
MD54220d4a32781415bf36e0e159fd38ce1
SHA1832933a30b0833e805f02af041cd787f3169f7d9
SHA256e6b63cd513768974b5415cd8d65e2344f2064f5eed7002c9b58c52b92435c124
SHA512a18e173b375586a1c38cdeac9e4d4d57d07c484fd0a94d853ae5b63e20a3abfbd281fc8f1c89f8c1ea548cd43bde7c6bc3b08a095f7d5c8dd06f46d2640942ed
-
C:\Windows\xdwd.dllFilesize
136KB
MD516e5a492c9c6ae34c59683be9c51fa31
SHA197031b41f5c56f371c28ae0d62a2df7d585adaba
SHA25635c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66
SHA51220fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6
-
\??\pipe\LOCAL\crashpad_2852_KLBFHGEXVUUBEQFYMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/744-6383-0x00007FFB01C90000-0x00007FFB01E85000-memory.dmpFilesize
2.0MB
-
memory/1364-4125-0x0000000074610000-0x0000000074BC1000-memory.dmpFilesize
5.7MB
-
memory/1364-4226-0x0000000001130000-0x0000000001140000-memory.dmpFilesize
64KB
-
memory/1364-4312-0x0000000074610000-0x0000000074BC1000-memory.dmpFilesize
5.7MB
-
memory/1364-4119-0x0000000001130000-0x0000000001140000-memory.dmpFilesize
64KB
-
memory/1364-4424-0x0000000001130000-0x0000000001140000-memory.dmpFilesize
64KB
-
memory/1364-4311-0x0000000001130000-0x0000000001140000-memory.dmpFilesize
64KB
-
memory/1364-6417-0x0000000074610000-0x0000000074BC1000-memory.dmpFilesize
5.7MB
-
memory/1364-4124-0x0000000074610000-0x0000000074BC1000-memory.dmpFilesize
5.7MB
-
memory/1372-4033-0x00007FFAE3BE0000-0x00007FFAE46A1000-memory.dmpFilesize
10.8MB
-
memory/1372-4023-0x000002274A0A0000-0x000002274A0B0000-memory.dmpFilesize
64KB
-
memory/1372-4038-0x00007FFAE3BE0000-0x00007FFAE46A1000-memory.dmpFilesize
10.8MB
-
memory/1372-4039-0x00007FFB01C90000-0x00007FFB01E85000-memory.dmpFilesize
2.0MB
-
memory/1372-4020-0x00007FFB01C90000-0x00007FFB01E85000-memory.dmpFilesize
2.0MB
-
memory/1372-4021-0x00007FFB01C90000-0x00007FFB01E85000-memory.dmpFilesize
2.0MB
-
memory/1372-4022-0x000002274A0A0000-0x000002274A0B0000-memory.dmpFilesize
64KB
-
memory/2340-6382-0x00007FFB01C90000-0x00007FFB01E85000-memory.dmpFilesize
2.0MB
-
memory/2724-3546-0x00000000740E0000-0x0000000074890000-memory.dmpFilesize
7.7MB
-
memory/2724-3645-0x00000000740E0000-0x0000000074890000-memory.dmpFilesize
7.7MB
-
memory/2724-3562-0x0000000005660000-0x0000000005C04000-memory.dmpFilesize
5.6MB
-
memory/2724-3558-0x0000000004FB0000-0x000000000504C000-memory.dmpFilesize
624KB
-
memory/2724-3545-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2800-3544-0x000000001C6A0000-0x000000001C6AC000-memory.dmpFilesize
48KB
-
memory/2800-0-0x0000000000150000-0x000000000021E000-memory.dmpFilesize
824KB
-
memory/2800-6378-0x000000001AFB0000-0x000000001AFB8000-memory.dmpFilesize
32KB
-
memory/2800-525-0x000000001C680000-0x000000001C69E000-memory.dmpFilesize
120KB
-
memory/2800-524-0x0000000000B40000-0x0000000000B4A000-memory.dmpFilesize
40KB
-
memory/2800-523-0x000000001CCC0000-0x000000001CD36000-memory.dmpFilesize
472KB
-
memory/2800-213-0x0000000000B30000-0x0000000000B40000-memory.dmpFilesize
64KB
-
memory/2800-6407-0x00007FFAE3BE0000-0x00007FFAE46A1000-memory.dmpFilesize
10.8MB
-
memory/2800-66-0x00007FFAE3BE0000-0x00007FFAE46A1000-memory.dmpFilesize
10.8MB
-
memory/2800-18-0x0000000000B30000-0x0000000000B40000-memory.dmpFilesize
64KB
-
memory/2800-1-0x00007FFAE3BE0000-0x00007FFAE46A1000-memory.dmpFilesize
10.8MB
-
memory/2848-4539-0x00007FFB01C90000-0x00007FFB01E85000-memory.dmpFilesize
2.0MB
-
memory/2848-4538-0x00007FFB01C90000-0x00007FFB01E85000-memory.dmpFilesize
2.0MB
-
memory/2848-4555-0x00007FFB01C90000-0x00007FFB01E85000-memory.dmpFilesize
2.0MB
-
memory/3396-69-0x00007FFB01C90000-0x00007FFB01E85000-memory.dmpFilesize
2.0MB
-
memory/3396-71-0x00007FFB01C80000-0x00007FFB01C81000-memory.dmpFilesize
4KB
-
memory/3396-70-0x00007FFB01C90000-0x00007FFB01E85000-memory.dmpFilesize
2.0MB
-
memory/3396-92-0x00007FFB01C90000-0x00007FFB01E85000-memory.dmpFilesize
2.0MB
-
memory/4376-4120-0x0000000074610000-0x0000000074BC1000-memory.dmpFilesize
5.7MB
-
memory/4376-4056-0x00000000016B0000-0x00000000016C0000-memory.dmpFilesize
64KB
-
memory/4376-4055-0x0000000074610000-0x0000000074BC1000-memory.dmpFilesize
5.7MB
-
memory/4376-4054-0x0000000074610000-0x0000000074BC1000-memory.dmpFilesize
5.7MB
-
memory/4636-603-0x00007FFAE3BE0000-0x00007FFAE46A1000-memory.dmpFilesize
10.8MB
-
memory/4636-596-0x00007FFAE3BE0000-0x00007FFAE46A1000-memory.dmpFilesize
10.8MB
-
memory/4636-584-0x00007FFB01C90000-0x00007FFB01E85000-memory.dmpFilesize
2.0MB
-
memory/4636-602-0x00007FFB01C90000-0x00007FFB01E85000-memory.dmpFilesize
2.0MB
-
memory/4636-599-0x0000017CF6AC0000-0x0000017CF6AD0000-memory.dmpFilesize
64KB
-
memory/4636-598-0x0000017CF6AC0000-0x0000017CF6AD0000-memory.dmpFilesize
64KB
-
memory/4636-597-0x0000017CF6AC0000-0x0000017CF6AD0000-memory.dmpFilesize
64KB
-
memory/4636-585-0x00007FFB01C90000-0x00007FFB01E85000-memory.dmpFilesize
2.0MB
-
memory/4636-595-0x0000017CF6B40000-0x0000017CF6B62000-memory.dmpFilesize
136KB
-
memory/4788-4558-0x00007FFB01C90000-0x00007FFB01E85000-memory.dmpFilesize
2.0MB
-
memory/4788-4557-0x00007FFB01C90000-0x00007FFB01E85000-memory.dmpFilesize
2.0MB
-
memory/4788-4556-0x00007FFB01C90000-0x00007FFB01E85000-memory.dmpFilesize
2.0MB
-
memory/4792-3647-0x0000000000E80000-0x0000000000E92000-memory.dmpFilesize
72KB
-
memory/4792-3648-0x00000000744C0000-0x0000000074C70000-memory.dmpFilesize
7.7MB
-
memory/4792-3650-0x00000000744C0000-0x0000000074C70000-memory.dmpFilesize
7.7MB