Analysis
-
max time kernel
600s -
max time network
602s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-03-2024 00:56
Static task
static1
Behavioral task
behavioral1
Sample
x326.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
x326.exe
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
x326.exe
Resource
win10v2004-20231215-en
General
-
Target
x326.exe
-
Size
455KB
-
MD5
c8d9593196962fa5d706a207c16674cd
-
SHA1
686a8e674e6615d5cd91f7b2cba0c755054b3f69
-
SHA256
a50078c294c3980c23fc8da34f3fd1dc8ca042e07e0f7f67696d7035ec84700d
-
SHA512
5ddae80780c6091bfe0ab5e29bc63732c08ce34f677fc341366dcecf6db9e1bd2e0ed24cfe57eface0d19c6f46010f47eb2d74888b91a503dae00651c4a756bf
-
SSDEEP
12288:XcTpGLwWpFGIWFfDtaY4S0LEy7w0iymL/:XOpEwiFYxsEyHiyK
Malware Config
Extracted
xworm
5.1
104.194.9.116:7000
bUezpCDHVjUVS3W9
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot6330888131:AAE5ycZdHuNqV5SVYhHeCfRENn6GuCjwXjs/sendMessage?chat_id=1046049845
Extracted
eternity
47vk9PbPuHnEnazCn4tLpwPCWRLSMhpX9PD8WqpjchhTXisimD6j8EvRFDbPQHKUmHVq3vAM3DLytXLg8CqcdRXRFdPe92Q
-
payload_urls
https://raw.githubusercontent.com/VolVeRFM/SilentMiner-VolVeR/main/VolVeRBuilder/Resources/xmrig.exe
Signatures
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/2992-8-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2992-10-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2992-13-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2992-15-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2992-17-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Modifies security service 2 TTPs 3 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP\Collection svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MpsSvc\Parameters\PortKeywords\DHCP svchost.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP\Collection = 22020100 svchost.exe -
Creates new service(s) 1 TTPs
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\AHIMMUFK\ImagePath = "C:\\ProgramData\\xlffyhztkvzk\\pkiwizgebqxq.exe" services.exe -
Stops running service(s) 3 TTPs
-
Executes dropped EXE 15 IoCs
pid Process 1592 bljkwt.exe 2320 xspvep.exe 2568 CasPol.exe 1576 CasPol.exe 1004 xevhmv.exe 1316 fwxkur.exe 616 CasPol.exe 928 pkiwizgebqxq.exe 1576 CasPol.exe 936 CasPol.exe 1344 CasPol.exe 1436 CasPol.exe 2472 CasPol.exe 1632 CasPol.exe 1620 CasPol.exe -
Loads dropped DLL 26 IoCs
pid Process 2992 jsc.exe 2992 jsc.exe 1116 WerFault.exe 1116 WerFault.exe 1116 WerFault.exe 1116 WerFault.exe 1116 WerFault.exe 2756 WerFault.exe 2756 WerFault.exe 2756 WerFault.exe 2756 WerFault.exe 2756 WerFault.exe 2016 cmd.exe 2992 jsc.exe 2028 WerFault.exe 2028 WerFault.exe 2028 WerFault.exe 2028 WerFault.exe 2028 WerFault.exe 2992 jsc.exe 1256 WerFault.exe 1256 WerFault.exe 1256 WerFault.exe 1256 WerFault.exe 1256 WerFault.exe 472 services.exe -
Uses the VBS compiler for execution 1 TTPs
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe ilasm.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1540 set thread context of 2992 1540 x326.exe 28 PID 1592 set thread context of 1340 1592 bljkwt.exe 36 PID 1004 set thread context of 2168 1004 xevhmv.exe 58 PID 1316 set thread context of 2160 1316 fwxkur.exe 61 PID 2160 set thread context of 2756 2160 ilasm.exe 86 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\wusa.lock wusa.exe -
Launches sc.exe 9 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1436 sc.exe 920 sc.exe 2004 sc.exe 1796 sc.exe 3016 sc.exe 2348 sc.exe 1004 sc.exe 1948 sc.exe 3012 sc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2524 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1924 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1540 x326.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 1004 xevhmv.exe 2160 ilasm.exe 2648 powershell.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeDebugPrivilege 1540 x326.exe Token: SeDebugPrivilege 2992 jsc.exe Token: SeDebugPrivilege 1004 xevhmv.exe Token: SeDebugPrivilege 2648 powershell.exe Token: SeShutdownPrivilege 2976 powercfg.exe Token: SeShutdownPrivilege 2728 powercfg.exe Token: SeShutdownPrivilege 2996 powercfg.exe Token: SeShutdownPrivilege 2720 powercfg.exe Token: SeDebugPrivilege 2756 dialer.exe Token: SeShutdownPrivilege 1244 Explorer.EXE Token: SeShutdownPrivilege 1244 Explorer.EXE Token: SeShutdownPrivilege 1244 Explorer.EXE Token: SeShutdownPrivilege 1244 Explorer.EXE Token: SeShutdownPrivilege 1244 Explorer.EXE Token: SeShutdownPrivilege 1244 Explorer.EXE Token: SeAuditPrivilege 844 svchost.exe Token: SeShutdownPrivilege 1244 Explorer.EXE Token: SeShutdownPrivilege 1244 Explorer.EXE Token: SeShutdownPrivilege 1244 Explorer.EXE Token: SeShutdownPrivilege 1244 Explorer.EXE Token: SeShutdownPrivilege 1244 Explorer.EXE Token: SeShutdownPrivilege 1244 Explorer.EXE Token: SeShutdownPrivilege 1244 Explorer.EXE Token: SeShutdownPrivilege 1244 Explorer.EXE Token: SeShutdownPrivilege 1244 Explorer.EXE Token: SeShutdownPrivilege 1244 Explorer.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2476 conhost.exe 1668 conhost.exe 2436 conhost.exe 1568 conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2992 1540 x326.exe 28 PID 1540 wrote to memory of 2992 1540 x326.exe 28 PID 1540 wrote to memory of 2992 1540 x326.exe 28 PID 1540 wrote to memory of 2992 1540 x326.exe 28 PID 1540 wrote to memory of 2992 1540 x326.exe 28 PID 1540 wrote to memory of 2992 1540 x326.exe 28 PID 1540 wrote to memory of 2992 1540 x326.exe 28 PID 1540 wrote to memory of 2992 1540 x326.exe 28 PID 1540 wrote to memory of 2992 1540 x326.exe 28 PID 1540 wrote to memory of 2768 1540 x326.exe 29 PID 1540 wrote to memory of 2768 1540 x326.exe 29 PID 1540 wrote to memory of 2768 1540 x326.exe 29 PID 2992 wrote to memory of 1592 2992 jsc.exe 33 PID 2992 wrote to memory of 1592 2992 jsc.exe 33 PID 2992 wrote to memory of 1592 2992 jsc.exe 33 PID 2992 wrote to memory of 1592 2992 jsc.exe 33 PID 2992 wrote to memory of 2320 2992 jsc.exe 34 PID 2992 wrote to memory of 2320 2992 jsc.exe 34 PID 2992 wrote to memory of 2320 2992 jsc.exe 34 PID 2992 wrote to memory of 2320 2992 jsc.exe 34 PID 2320 wrote to memory of 2044 2320 xspvep.exe 35 PID 2320 wrote to memory of 2044 2320 xspvep.exe 35 PID 2320 wrote to memory of 2044 2320 xspvep.exe 35 PID 1592 wrote to memory of 1340 1592 bljkwt.exe 36 PID 1592 wrote to memory of 1340 1592 bljkwt.exe 36 PID 1592 wrote to memory of 1340 1592 bljkwt.exe 36 PID 1592 wrote to memory of 1340 1592 bljkwt.exe 36 PID 1592 wrote to memory of 1340 1592 bljkwt.exe 36 PID 1592 wrote to memory of 1340 1592 bljkwt.exe 36 PID 2320 wrote to memory of 2044 2320 xspvep.exe 35 PID 1592 wrote to memory of 1340 1592 bljkwt.exe 36 PID 2320 wrote to memory of 2044 2320 xspvep.exe 35 PID 1592 wrote to memory of 1340 1592 bljkwt.exe 36 PID 2320 wrote to memory of 2044 2320 xspvep.exe 35 PID 1592 wrote to memory of 1340 1592 bljkwt.exe 36 PID 2320 wrote to memory of 2044 2320 xspvep.exe 35 PID 2320 wrote to memory of 2044 2320 xspvep.exe 35 PID 2320 wrote to memory of 2044 2320 xspvep.exe 35 PID 1592 wrote to memory of 1116 1592 bljkwt.exe 37 PID 1592 wrote to memory of 1116 1592 bljkwt.exe 37 PID 1592 wrote to memory of 1116 1592 bljkwt.exe 37 PID 2320 wrote to memory of 3052 2320 xspvep.exe 38 PID 2320 wrote to memory of 3052 2320 xspvep.exe 38 PID 2320 wrote to memory of 3052 2320 xspvep.exe 38 PID 2320 wrote to memory of 3052 2320 xspvep.exe 38 PID 2320 wrote to memory of 3052 2320 xspvep.exe 38 PID 2320 wrote to memory of 3052 2320 xspvep.exe 38 PID 2320 wrote to memory of 3052 2320 xspvep.exe 38 PID 2320 wrote to memory of 3052 2320 xspvep.exe 38 PID 2320 wrote to memory of 3052 2320 xspvep.exe 38 PID 1340 wrote to memory of 2016 1340 CasPol.exe 39 PID 1340 wrote to memory of 2016 1340 CasPol.exe 39 PID 1340 wrote to memory of 2016 1340 CasPol.exe 39 PID 1340 wrote to memory of 2016 1340 CasPol.exe 39 PID 2016 wrote to memory of 2796 2016 cmd.exe 41 PID 2016 wrote to memory of 2796 2016 cmd.exe 41 PID 2016 wrote to memory of 2796 2016 cmd.exe 41 PID 2016 wrote to memory of 2796 2016 cmd.exe 41 PID 2016 wrote to memory of 1924 2016 cmd.exe 42 PID 2016 wrote to memory of 1924 2016 cmd.exe 42 PID 2016 wrote to memory of 1924 2016 cmd.exe 42 PID 2016 wrote to memory of 1924 2016 cmd.exe 42 PID 2320 wrote to memory of 2292 2320 xspvep.exe 43 PID 2320 wrote to memory of 2292 2320 xspvep.exe 43
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:424
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
- Sets service image path in registry
- Loads dropped DLL
PID:472 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:600
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding3⤵PID:1228
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:684
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
- Modifies security service
PID:760
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:816
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1196
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Suspicious use of AdjustPrivilegeToken
PID:844 -
C:\Windows\system32\taskeng.exetaskeng.exe {546E9A06-A1DD-4086-B906-E88912C5EB74} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]3⤵PID:380
-
C:\Users\Admin\AppData\Local\ServiceHub\CasPol.exeC:\Users\Admin\AppData\Local\ServiceHub\CasPol.exe4⤵
- Executes dropped EXE
PID:1576
-
-
C:\Users\Admin\AppData\Local\ServiceHub\CasPol.exeC:\Users\Admin\AppData\Local\ServiceHub\CasPol.exe4⤵
- Executes dropped EXE
PID:616
-
-
C:\Users\Admin\AppData\Local\ServiceHub\CasPol.exeC:\Users\Admin\AppData\Local\ServiceHub\CasPol.exe4⤵
- Executes dropped EXE
PID:1576
-
-
C:\Users\Admin\AppData\Local\ServiceHub\CasPol.exeC:\Users\Admin\AppData\Local\ServiceHub\CasPol.exe4⤵
- Executes dropped EXE
PID:936
-
-
C:\Users\Admin\AppData\Local\ServiceHub\CasPol.exeC:\Users\Admin\AppData\Local\ServiceHub\CasPol.exe4⤵
- Executes dropped EXE
PID:1344
-
-
C:\Users\Admin\AppData\Local\ServiceHub\CasPol.exeC:\Users\Admin\AppData\Local\ServiceHub\CasPol.exe4⤵
- Executes dropped EXE
PID:1436
-
-
C:\Users\Admin\AppData\Local\ServiceHub\CasPol.exeC:\Users\Admin\AppData\Local\ServiceHub\CasPol.exe4⤵
- Executes dropped EXE
PID:2472
-
-
C:\Users\Admin\AppData\Local\ServiceHub\CasPol.exeC:\Users\Admin\AppData\Local\ServiceHub\CasPol.exe4⤵
- Executes dropped EXE
PID:1632
-
-
C:\Users\Admin\AppData\Local\ServiceHub\CasPol.exeC:\Users\Admin\AppData\Local\ServiceHub\CasPol.exe4⤵
- Executes dropped EXE
PID:1620
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:996
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:344
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:1028
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1056
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1132
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:3040
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:2912
-
-
C:\ProgramData\xlffyhztkvzk\pkiwizgebqxq.exeC:\ProgramData\xlffyhztkvzk\pkiwizgebqxq.exe2⤵
- Executes dropped EXE
PID:928
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:480
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:488
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\x326.exe"C:\Users\Admin\AppData\Local\Temp\x326.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\bljkwt.exe"C:\Users\Admin\AppData\Local\Temp\bljkwt.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "CasPol" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\CasPol.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\CasPol.exe"6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:2796
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.17⤵
- Runs ping.exe
PID:1924
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "CasPol" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\CasPol.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
PID:2524
-
-
C:\Users\Admin\AppData\Local\ServiceHub\CasPol.exe"C:\Users\Admin\AppData\Local\ServiceHub\CasPol.exe"7⤵
- Executes dropped EXE
PID:2568
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1592 -s 21045⤵
- Loads dropped DLL
PID:1116
-
-
-
C:\Users\Admin\AppData\Local\Temp\xspvep.exe"C:\Users\Admin\AppData\Local\Temp\xspvep.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"5⤵PID:2044
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"5⤵PID:3052
-
-
C:\Program Files\Windows Mail\wab.exe"C:\Program Files\Windows Mail\wab.exe"5⤵PID:2292
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"5⤵PID:2200
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"5⤵PID:2072
-
-
C:\Program Files\Windows Media Player\wmplayer.exe"C:\Program Files\Windows Media Player\wmplayer.exe"5⤵PID:1612
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"5⤵PID:2548
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2972
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"5⤵PID:1188
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2320 -s 21605⤵
- Loads dropped DLL
PID:2756
-
-
-
C:\Users\Admin\AppData\Local\Temp\xevhmv.exe"C:\Users\Admin\AppData\Local\Temp\xevhmv.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1004 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"5⤵PID:2168
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1004 -s 7405⤵
- Loads dropped DLL
PID:2028
-
-
-
C:\Users\Admin\AppData\Local\Temp\fwxkur.exe"C:\Users\Admin\AppData\Local\Temp\fwxkur.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1316 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"5⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2160 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force6⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart6⤵PID:2916
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart7⤵
- Drops file in Windows directory
PID:2016
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc6⤵
- Launches sc.exe
PID:3016
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc6⤵
- Launches sc.exe
PID:1948
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv6⤵
- Launches sc.exe
PID:2348
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits6⤵
- Launches sc.exe
PID:3012
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc6⤵
- Launches sc.exe
PID:1004
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 06⤵
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 06⤵
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 06⤵
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 06⤵
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "AHIMMUFK"6⤵
- Launches sc.exe
PID:1436
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "AHIMMUFK" binpath= "C:\ProgramData\xlffyhztkvzk\pkiwizgebqxq.exe" start= "auto"6⤵
- Launches sc.exe
PID:920
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog6⤵
- Launches sc.exe
PID:1796
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "AHIMMUFK"6⤵
- Launches sc.exe
PID:2004
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1316 -s 21085⤵
- Loads dropped DLL
PID:1256
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1540 -s 7403⤵PID:2768
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-822821197-126515376014743294151828064972698698783-19375681721900033583-1521057996"1⤵PID:1216
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-337420148-15515295831860204795-13041376271498582628-141056857-614649984-1762853620"1⤵PID:2212
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-4851565692052093501-54377860327851219615045818981934939912-3116432471287789602"1⤵PID:2192
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-27710559019527452401822914344178143799-421115174171587990910728578922030507634"1⤵PID:1096
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-27712587936328024-16186781241801369011524119554-1609384859-1745600739666003536"1⤵PID:2016
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-7881049241661751869-130274240506230994-351131453-13126643771801605045-1627618221"1⤵
- Suspicious use of SetWindowsHookEx
PID:2476
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1276869317-1064039909-1557986930803203633-9718801621508503310-458469213-1075689610"1⤵PID:2128
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1275269230-854050244864293281396433783-1489854177-21061488681648748651159383373"1⤵
- Suspicious use of SetWindowsHookEx
PID:1668
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "603524969100750626-869202976-116987522712132758631600084935-8438165851132294241"1⤵
- Suspicious use of SetWindowsHookEx
PID:2436
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-8646071561547889210-4507696471426581781-1352893324-708153086-10235581992096836965"1⤵PID:2500
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-9666914271677237469936817292-1413101980-150678743-7236436121062644698-848672274"1⤵PID:2748
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-2041716459-2067271629-33118639318791697601010651067202456918840037741795434639"1⤵
- Suspicious use of SetWindowsHookEx
PID:1568
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD57a92143cafb451f70ff9046a7c0cb50d
SHA17a96ebc991c0251f44b2d7a1172c001085a76a98
SHA25689b20fad42700ae3b0b5b93aeb48eb180d286ba71de6f11bc77318bf35f9283a
SHA512acd7760d8e1103e988e9e276a6b3b72b7922d328c1322ccf2b1e00342503bf069965ae886fc7c0b338f7ff17fc7aadea8abb9e526fcbf42899f0b878e5a83b3c
-
Filesize
2.2MB
MD509445928ff039b1ef83022c8016a08b6
SHA19ccab9619a428b24fcb65f4cc1c8c57823bfba46
SHA256408434c24b4f3e5ff2d9d1e7c0a9a97bd01a95e99e8006e73fa4a5a06d3c2556
SHA512a54c08db931ad7cfcaaf5bc07dfe7ee6d9bb85211868b9bb24601832b2429bacc60b95014bc754b0ca87bab72b98afb0ce1185781916fa8a261053b452b14afd
-
Filesize
2.0MB
MD538affd9860c5a332aad73d0606633ff9
SHA111946f09b8b1be77b9785909c2d954b1d03f3a99
SHA25666213b187bec75ba01012dbbbd006a33712a9117d3a7f29ff8a294e8858f636e
SHA51201a89d2119acb69c7bc244fa3b2e74634d94794326c0bb9ca1388d7d570cbdbe050855c3b9ae677c5f90544a81e0be7b514bc1531434dc25f7757e955df36fe1
-
Filesize
756KB
MD5d76027fe4cfd48c7f8999c796e50e731
SHA15026422e84bf445e2d141529e2b808187a30d9f6
SHA256148da274864c690a7c01119e025bdc0ab94fa9c110c30afb42e51b1c990a2799
SHA5122e2c4a5319a61555913648702ddcfb8b40d548dcfda1a536a2e85f9cb85d25d9a463743dc866f86b4de99fd10f9c402def424b9e8a203189518f45e924b89d2d
-
Filesize
357KB
MD522cc6af3acef2bf1e29ac2df1e0f58b7
SHA10b0e62ca5f640bdeaa52dae358e01a479b26b9cc
SHA256011d1a45aa5f223cb1346ee82c4ef197cee76d35d28fcb68d0fc2e9b45d93f8a
SHA512cade8e4f8e793115f4b9944250ee12625725525d8e985b4d5ee23f32c4604de101234933c35eb08339326a6f976c9f0c60b3ea2839ba7ce9e519d5ed6cff72b1
-
Filesize
105KB
MD5ac93f60717f1fee8c678e624f54852ee
SHA1d9c9828396d19a7f2920af68a4692409f16beaa9
SHA2561fa79bf14d80519f7965a44dcc1f69ec1d24e83eea2927b474c3545e65062f24
SHA5129ff7dfe9c8bc2ae775a97227990f332d8b799fbb4235eea7c73756a5359841d355805d1b624b40fe8f7e864c997a604d3c10ad1fa1182deb5842ab77aad9b1b7
-
Filesize
393KB
MD53f3a51617811e9581aba50376599efa6
SHA19b26aa73f43a4db9b216b90d1aa3e2e4d602fde8
SHA2565f3403e13e316d9320d46233e9f62b183623c46ec80c6c55139efdd72c5ada37
SHA5129ad5cfb29281dd462b726c7ee239926f83050181fe4f6c3e9057e51df65ae7f850cecbf1cb453287720314275335df36bb8d5299d09a1f73329a5b9292db3ee3
-
Filesize
3.1MB
MD586e00d529b3b454a84b942ac916211e3
SHA1021c733e5448436b384bf0d3a0ba81f4d0d93f9a
SHA25630e01b261cb5d7524a303cdbe9d177fc05d74279642e4a87b46ee70045e68d53
SHA5129a08379b35a3bf1699b925c6dbfc6e85123f1155e567929eaff3683e5e9f196a16775e3a2f6a7585f7c0f0f201ef4be009cda5cf94b160742642145837c3de1e
-
Filesize
256KB
MD5471eacda4ff27ce88d25fe987fba84a9
SHA1b0fa682c7e94bc1f4a592c1f98ca35c495922401
SHA256b3b203290ac31715c1334b25897b59d0222a89e7aaf3661e91d51e68580e5de6
SHA512d46455b842c353080addf580450605ecfb948a5050820c0d33703f304163601e99325a4cc67ff97602d3b3a853c6426a47a09114c274c298f1450bedd9b9f4a7
-
Filesize
1.1MB
MD5df69554d3b3258247f52423b47fcb6ec
SHA1bdaf4776979e0ae0d466f22792910ad89df69214
SHA256ce73bea82812140e45f060573ff1e1b849b890ce661ff3c396be42de9cb0d5ab
SHA512bc23f26904794abe815cdcadb40ff18af9ca3a3e1cbe60bf5a05f400468b43357b789694925a91860e0acf6e227bae39308f697afd28cb45ac772db344ace70e
-
Filesize
712KB
MD5e30d0f00bbaf39b3da44bf56710a94ae
SHA1a116215495414cc68f2b2386f92287d76ccc2eff
SHA2566bafc0d186e4feb092bcd1c9295c33520096fd4a307a401860da91878fac211d
SHA512e7409cfb705a5cf0a1c191d4c9324ff4b51524177f0074cd1f3d412e6c06fc72525e2fe8d58a13b8907431eb5be30db058256d1b46261bcb829553703e7a7e94
-
Filesize
718KB
MD52a3880d17c8194dc0bc72dacbdff5275
SHA17c8c8ec2fa502d5e11dff8d578d2d8d5dcaae448
SHA256836f6ad3d4c7a7aff5a7bd226b8a67f95dac6427946f602f92f48eed90829f1e
SHA512cacd1044f7b8bd170956b454005e7e271da1afeac1ec732d7ea79c81080608ef139f41d94759796777bc888d1025e5edc8d52daaa94648b6add791682c0cda41
-
Filesize
627KB
MD5f9e3455145abca004b0777b11a0eb984
SHA1f7bed61bb742fffe35abdbb247d19e92beda2300
SHA256d5639016c0a5728c804ac7d861f741c97fa845fbbb82489a2eb9ade576a47673
SHA512a932f23e17bcd249a0ee89d67620cf232783cad38a20a972a48688d5be30a29c7dccd83b02d08d9f0d6b46450e10c0009309b4a5ff4f7961028a45b9ba65121c
-
Filesize
758KB
MD5b38e39c45f355de3671e2c946b10c604
SHA15a9e6e11936b4690957e715e4d0db7542c016239
SHA256dfa10556a3d439cf0f8e6f54b9b4328c9aa2137c72c0f4fb58a09125b58c08cf
SHA512191efb8f52031cd650727552fbf35574d8b6b9794944323b5cf4af22ecbc33c1dd6ad22ed0fe0bdeb194f804b1322a76370270039aa42d2df8648e41e332ae8b