Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2024, 01:04
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20240412-en
General
-
Target
XClient.exe
-
Size
65KB
-
MD5
f89900bee0847f4f1e23b1bfda0e7f24
-
SHA1
24dd536801cff4b3b92276a52a9280069290149a
-
SHA256
82f0fb933a96858aabe6b741c889611583a0a11132ee6ecd70909fc0aa6cf534
-
SHA512
bba995bfb14d6d79b8f4feb0934888d2e5d39d7c945cce2046e842a0c0240cc14a9998c3d18093c29ca36c840f580058518df341e0dca3f5452fdc7fcacdcc3a
-
SSDEEP
1536:/JPMoSzJ4aZfY0by1DLub8ldJJIrlXOF3+v/:BZcJm0WxSb8elXOhW/
Malware Config
Extracted
xworm
127.0.0.1:33920
original-taught.gl.at.ply.gg:33920
-
Install_directory
%AppData%
-
install_file
FreePornHubPremium.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/4576-0-0x0000000000AB0000-0x0000000000AC6000-memory.dmp family_xworm behavioral2/files/0x000800000002340e-15.dat family_xworm -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation XClient.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation rsmbpe.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation rsmbpe.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FreePornHubPremium.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FreePornHubPremium.lnk XClient.exe -
Executes dropped EXE 10 IoCs
pid Process 2468 rsmbpe.exe 3216 FreePornHubPremium.exe 4632 rsmbpe.exe 3248 rsmbpe.exe 8 rsmbpe.exe 1064 rsmbpe.exe 4596 rsmbpe.exe 3960 rsmbpe.exe 5676 FreePornHubPremium.exe 5032 FreePornHubPremium.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FreePornHubPremium = "C:\\Users\\Admin\\AppData\\Roaming\\FreePornHubPremium.exe" XClient.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rsmbpe.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4084 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000_Classes\Local Settings calc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4576 XClient.exe 4632 rsmbpe.exe 4632 rsmbpe.exe 3248 rsmbpe.exe 3248 rsmbpe.exe 4632 rsmbpe.exe 4632 rsmbpe.exe 1064 rsmbpe.exe 1064 rsmbpe.exe 8 rsmbpe.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4576 XClient.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4576 XClient.exe Token: SeDebugPrivilege 4576 XClient.exe Token: SeDebugPrivilege 3216 FreePornHubPremium.exe Token: SeDebugPrivilege 5676 FreePornHubPremium.exe Token: SeDebugPrivilege 5032 FreePornHubPremium.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4576 XClient.exe 5844 mspaint.exe 5844 mspaint.exe 5844 mspaint.exe 5844 mspaint.exe 408 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4576 wrote to memory of 4084 4576 XClient.exe 90 PID 4576 wrote to memory of 4084 4576 XClient.exe 90 PID 4576 wrote to memory of 2468 4576 XClient.exe 99 PID 4576 wrote to memory of 2468 4576 XClient.exe 99 PID 4576 wrote to memory of 2468 4576 XClient.exe 99 PID 2468 wrote to memory of 4632 2468 rsmbpe.exe 104 PID 2468 wrote to memory of 4632 2468 rsmbpe.exe 104 PID 2468 wrote to memory of 4632 2468 rsmbpe.exe 104 PID 2468 wrote to memory of 3248 2468 rsmbpe.exe 105 PID 2468 wrote to memory of 3248 2468 rsmbpe.exe 105 PID 2468 wrote to memory of 3248 2468 rsmbpe.exe 105 PID 2468 wrote to memory of 8 2468 rsmbpe.exe 106 PID 2468 wrote to memory of 8 2468 rsmbpe.exe 106 PID 2468 wrote to memory of 8 2468 rsmbpe.exe 106 PID 2468 wrote to memory of 1064 2468 rsmbpe.exe 107 PID 2468 wrote to memory of 1064 2468 rsmbpe.exe 107 PID 2468 wrote to memory of 1064 2468 rsmbpe.exe 107 PID 2468 wrote to memory of 4596 2468 rsmbpe.exe 108 PID 2468 wrote to memory of 4596 2468 rsmbpe.exe 108 PID 2468 wrote to memory of 4596 2468 rsmbpe.exe 108 PID 2468 wrote to memory of 3960 2468 rsmbpe.exe 109 PID 2468 wrote to memory of 3960 2468 rsmbpe.exe 109 PID 2468 wrote to memory of 3960 2468 rsmbpe.exe 109 PID 3960 wrote to memory of 3504 3960 rsmbpe.exe 111 PID 3960 wrote to memory of 3504 3960 rsmbpe.exe 111 PID 3960 wrote to memory of 3504 3960 rsmbpe.exe 111 PID 3960 wrote to memory of 4036 3960 rsmbpe.exe 118 PID 3960 wrote to memory of 4036 3960 rsmbpe.exe 118 PID 4036 wrote to memory of 2900 4036 msedge.exe 119 PID 4036 wrote to memory of 2900 4036 msedge.exe 119 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 PID 4036 wrote to memory of 4024 4036 msedge.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "FreePornHubPremium" /tr "C:\Users\Admin\AppData\Roaming\FreePornHubPremium.exe"2⤵
- Creates scheduled task(s)
PID:4084
-
-
C:\Users\Admin\AppData\Local\Temp\rsmbpe.exe"C:\Users\Admin\AppData\Local\Temp\rsmbpe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\rsmbpe.exe"C:\Users\Admin\AppData\Local\Temp\rsmbpe.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\rsmbpe.exe"C:\Users\Admin\AppData\Local\Temp\rsmbpe.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3248
-
-
C:\Users\Admin\AppData\Local\Temp\rsmbpe.exe"C:\Users\Admin\AppData\Local\Temp\rsmbpe.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:8
-
-
C:\Users\Admin\AppData\Local\Temp\rsmbpe.exe"C:\Users\Admin\AppData\Local\Temp\rsmbpe.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\rsmbpe.exe"C:\Users\Admin\AppData\Local\Temp\rsmbpe.exe" /watchdog3⤵
- Executes dropped EXE
PID:4596
-
-
C:\Users\Admin\AppData\Local\Temp\rsmbpe.exe"C:\Users\Admin\AppData\Local\Temp\rsmbpe.exe" /main3⤵
- Checks computer location settings
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt4⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=facebook+hacking+tool+free+download+no+virus+working+20164⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffca96046f8,0x7ffca9604708,0x7ffca96047185⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,366461165811060024,12104819591719976604,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:25⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1944,366461165811060024,12104819591719976604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:35⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1944,366461165811060024,12104819591719976604,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:85⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,366461165811060024,12104819591719976604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:15⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,366461165811060024,12104819591719976604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:15⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,366461165811060024,12104819591719976604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2708 /prefetch:15⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,366461165811060024,12104819591719976604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:15⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,366461165811060024,12104819591719976604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:85⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,366461165811060024,12104819591719976604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:85⤵PID:5128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,366461165811060024,12104819591719976604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:15⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,366461165811060024,12104819591719976604,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:15⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,366461165811060024,12104819591719976604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1976 /prefetch:15⤵PID:5416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,366461165811060024,12104819591719976604,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2616 /prefetch:15⤵PID:5424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,366461165811060024,12104819591719976604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4472 /prefetch:15⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,366461165811060024,12104819591719976604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:15⤵PID:5836
-
-
-
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\System32\mspaint.exe"4⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:5844
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\System32\calc.exe"4⤵
- Modifies registry class
PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=batch+virus+download4⤵PID:2616
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffca96046f8,0x7ffca9604708,0x7ffca96047185⤵PID:3492
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\FreePornHubPremium.exeC:\Users\Admin\AppData\Roaming\FreePornHubPremium.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3216
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4644
-
C:\Users\Admin\AppData\Roaming\FreePornHubPremium.exeC:\Users\Admin\AppData\Roaming\FreePornHubPremium.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:5928
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:408
-
C:\Users\Admin\AppData\Roaming\FreePornHubPremium.exeC:\Users\Admin\AppData\Roaming\FreePornHubPremium.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
152B
MD5cb138796dbfb37877fcae3430bb1e2a7
SHA182bb82178c07530e42eca6caf3178d66527558bc
SHA25650c55ba7baeebe1fa4573118edbca59010d659ea42761148618fb3af8a1c9bdd
SHA512287471cccbe33e08015d6fc35e0bcdca0ec79bebc3a58f6a340b7747b5b2257b33651574bc83ed529aef2ba94be6e68968e59d2a8ef5f733dce9df6404ad7cc5
-
Filesize
152B
MD5a9519bc058003dbea34765176083739e
SHA1ef49b8790219eaddbdacb7fc97d3d05433b8575c
SHA256e034683bc434a09f5d0293cb786e6a3943b902614f9211d42bed47759164d38b
SHA512a1b67ccf313173c560ead25671c64de65e3e2599251926e33ce8399fde682fce5cb20f36ee330fcd8bb8f7a9c00ef432da56c9b02dfd7d3f02865f390c342b53
-
Filesize
198KB
MD5319e0c36436ee0bf24476acbcc83565c
SHA1fb2658d5791fe5b37424119557ab8cee30acdc54
SHA256f6562ea52e056b979d6f52932ae57b7afb04486b10b0ebde22c5b51f502c69d1
SHA512ad902b9a010cf99bdedba405cad0387890a9ff90a9c91f6a3220cdceec1b08ecb97a326aef01b28d8d0aacb5f2a16f02f673e196bdb69fc68b3f636139059902
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5894629052801bf79d6e8bbbaa047aec3
SHA16608c796286089a9f1001e26c6464a838c9ab5da
SHA256b6f646d5799aaf0def6c90cb6fbc02512f28cb2b6bf4ba28f04b85485293546c
SHA512b04c8d2f8269c40274527254068bb945ae43005483fd3279223f7b8a0f7984bb1dbd03eca267af901fb38df3ca2328db22a07b8791c92d3582cb00d6e54376f1
-
Filesize
815B
MD567a36687a0c1c13ca14963795f054f95
SHA1ece32ecc629323cd9b668e290735184e0e153117
SHA2562bf14e3e3a37fb04ca208c31f956c2cfb064ed1c9ffe0f4afe05f7bdd50d6026
SHA5120f783112dec0e68a2333cc6d287a083770d8f09d1bb4b184c6e6b51c4a0cdf55923d0c2a4d2a5d7145dc0dee7d33ecc190d14cc21a77e450f6974085ee92f1db
-
Filesize
6KB
MD5eae042ea0f2bec058ca2733977107d53
SHA1f40f961ec653c7d5047b863db548aa35d0b1f155
SHA2562a13b69143694363a96f524ed568dc42bb2351432b7dc62f3c7ea0cfc1984bed
SHA51296fa8feace3d44f0b78c5f3ca7a094d0c236d2f4ef09466123c32d0a584a7f69a7c9da91cc8d48be57edf552b86648735aab6e81387a40caba3296246414a1cb
-
Filesize
6KB
MD54cdc03cc757b8779ed735bfdbc358726
SHA1ceb394dc75a78011bfe0f75682cb69388abe3841
SHA25630a20ab5968300614269ce4dc2c85afb86c9afb5201c69b27a068dd62c5d3d81
SHA512e5255cca67982e045bafd8a7422e69c03937603d6afd8de711e4bb53826d6bba668491900cb4ff1edb6e519544381e2428f65f84eed72dee4e57f9806bb7200a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a0284fde5a8b7d1fd052d92aedae7b58
SHA15251c5fc0f4856d513c67421d2feebaf9e6c0838
SHA256b7f0736b4b105503f95337c22760d7aee72777248042f9e0ee72893cced8e101
SHA512b08c9f10815ad2678c081687b95b45c35c8d580e41333828c75fd4b34bb292d559eb7f5669307ec8b2b534e2cc1aca4a5eb1f0dca4e06159eec4111570bde80d
-
Filesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
Filesize
65KB
MD5f89900bee0847f4f1e23b1bfda0e7f24
SHA124dd536801cff4b3b92276a52a9280069290149a
SHA25682f0fb933a96858aabe6b741c889611583a0a11132ee6ecd70909fc0aa6cf534
SHA512bba995bfb14d6d79b8f4feb0934888d2e5d39d7c945cce2046e842a0c0240cc14a9998c3d18093c29ca36c840f580058518df341e0dca3f5452fdc7fcacdcc3a
-
Filesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf