Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 08:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dsfght-8798.blogspot.com/?book=1507217889
Resource
win10v2004-20240419-en
General
-
Target
https://dsfght-8798.blogspot.com/?book=1507217889
Malware Config
Signatures
-
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\system32\SRU\SRU.chk svchost.exe File created C:\Windows\system32\NDF\{A01977C7-319F-4D76-B524-ED6889508762}-temp-05012024-0857.etl svchost.exe File opened for modification C:\Windows\system32\WDI\BootPerformanceDiagnostics_SystemData.bin svchost.exe File opened for modification C:\Windows\system32\SRU\SRU.log svchost.exe File opened for modification C:\Windows\system32\SRU\SRUDB.dat svchost.exe File opened for modification C:\Windows\system32\SRU\SRUDB.jfm svchost.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtl64.inf_amd64_8e9c2368fe308df2\netrtl64.PNF svchost.exe File opened for modification C:\Windows\system32\NDF\{A01977C7-319F-4D76-B524-ED6889508762}-temp-05012024-0857.etl svchost.exe File created C:\Windows\system32\wdi\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\{423ccf65-192b-4c0f-8b52-f4b1e195f8db}\snapshot.etl svchost.exe File opened for modification C:\Windows\system32\wdi\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\{423ccf65-192b-4c0f-8b52-f4b1e195f8db}\snapshot.etl svchost.exe File created C:\Windows\system32\wdi\LogFiles\StartupInfo\S-1-5-21-17203666-93769886-2545153620-1000_StartupInfo3.xml svchost.exe File opened for modification C:\Windows\system32\WDI\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\S-1-5-21-17203666-93769886-2545153620-1000_UserData.bin svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Network\Connections\Pbk\_hiddenPbk\rasphone.pbk svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1444 ipconfig.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\RAS AutoDial\Default svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\RAS AutoDial svchost.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 1364 msedge.exe 1364 msedge.exe 3608 identity_helper.exe 3608 identity_helper.exe 5784 sdiagnhost.exe 5784 sdiagnhost.exe 3044 svchost.exe 3044 svchost.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5784 sdiagnhost.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 2464 msdt.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1364 wrote to memory of 1668 1364 msedge.exe 86 PID 1364 wrote to memory of 1668 1364 msedge.exe 86 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 2320 1364 msedge.exe 87 PID 1364 wrote to memory of 4924 1364 msedge.exe 88 PID 1364 wrote to memory of 4924 1364 msedge.exe 88 PID 1364 wrote to memory of 4440 1364 msedge.exe 89 PID 1364 wrote to memory of 4440 1364 msedge.exe 89 PID 1364 wrote to memory of 4440 1364 msedge.exe 89 PID 1364 wrote to memory of 4440 1364 msedge.exe 89 PID 1364 wrote to memory of 4440 1364 msedge.exe 89 PID 1364 wrote to memory of 4440 1364 msedge.exe 89 PID 1364 wrote to memory of 4440 1364 msedge.exe 89 PID 1364 wrote to memory of 4440 1364 msedge.exe 89 PID 1364 wrote to memory of 4440 1364 msedge.exe 89 PID 1364 wrote to memory of 4440 1364 msedge.exe 89 PID 1364 wrote to memory of 4440 1364 msedge.exe 89 PID 1364 wrote to memory of 4440 1364 msedge.exe 89 PID 1364 wrote to memory of 4440 1364 msedge.exe 89 PID 1364 wrote to memory of 4440 1364 msedge.exe 89 PID 1364 wrote to memory of 4440 1364 msedge.exe 89 PID 1364 wrote to memory of 4440 1364 msedge.exe 89 PID 1364 wrote to memory of 4440 1364 msedge.exe 89 PID 1364 wrote to memory of 4440 1364 msedge.exe 89 PID 1364 wrote to memory of 4440 1364 msedge.exe 89 PID 1364 wrote to memory of 4440 1364 msedge.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://dsfght-8798.blogspot.com/?book=15072178891⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8dd846f8,0x7fff8dd84708,0x7fff8dd847182⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9821183012650148150,10383541877738928228,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,9821183012650148150,10383541877738928228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,9821183012650148150,10383541877738928228,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9821183012650148150,10383541877738928228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9821183012650148150,10383541877738928228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9821183012650148150,10383541877738928228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4840 /prefetch:82⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9821183012650148150,10383541877738928228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4840 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9821183012650148150,10383541877738928228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9821183012650148150,10383541877738928228,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9821183012650148150,10383541877738928228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9821183012650148150,10383541877738928228,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9821183012650148150,10383541877738928228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9821183012650148150,10383541877738928228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:840
-
-
C:\Windows\system32\msdt.exe-modal "524640" -skip TRUE -path "C:\Windows\diagnostics\system\networking" -af "C:\Users\Admin\AppData\Local\Temp\NDF9EA1.tmp" -ep "NetworkDiagnosticsWeb"2⤵
- Suspicious use of FindShellTrayWindow
PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9821183012650148150,10383541877738928228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9821183012650148150,10383541877738928228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2472 /prefetch:12⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9821183012650148150,10383541877738928228,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5616 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9821183012650148150,10383541877738928228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2548 /prefetch:12⤵PID:5088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5784 -
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter2⤵PID:5960
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter2⤵PID:116
-
-
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /all2⤵
- Gathers network information
PID:1444
-
-
C:\Windows\system32\ROUTE.EXE"C:\Windows\system32\ROUTE.EXE" print2⤵PID:868
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" /f NetworkConfiguration.ddf2⤵PID:5236
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNoNetwork -p -s DPS1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s WdiServiceHost1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3992 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\winethc.dll",ForceProxyDetectionOnNextRun2⤵PID:5900
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s WdiSystemHost1⤵PID:616
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8170775b-8b05-4392-84e1-321c726b45f3.tmp
Filesize6KB
MD5facff0c9807d48a5f7584476a673eb58
SHA10a4943d232e014a3a9fc0ab43cc0046ab5f71167
SHA2560ff317909d801532a71073ea6417b66a02c74e91683d0927b85b317a4a6e2a51
SHA51261b4a5e224e9e40a6faa9f40265ae9bffd7e5c315b32e8d54b6f6f63a135c89972c34473b3628e53d67879c6a42c399f2412167ee53a0b86e31eadaa459df32e
-
Filesize
6KB
MD54042f309bfe2352b59d11482b3cbd19e
SHA10d4b3f750362fe11d46e2ce9480598ba28edb9fe
SHA2561845aeecb4fb67b0a3e72640372ca80cc1326e8cad83fd82a4aebc7828c83139
SHA512e431a094101a287deef9677670b25efd11595dc8b142ded89f4b9a16e145086d011770056cc755ffc6ae430262b50acd38441523b319b8f2958933638eaee27c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5b3c401b284d30224c72e30e4cb439578
SHA10e6a61e381311b6f72e378ac298b0b48e47bef81
SHA256971f22a2793377f465af077f6bc15e8d8d51680a65093d8cd07ebe7848260006
SHA5120eae77d12dcc7cce56e330682814aef9638a5d3878a6da93c6fed15dc01428e747384a9a709dee310bbb724bbe2194deea0b857e34315faec2c714e21390a9d7
-
Filesize
8KB
MD537f687ecc1b6cf4b420c42219c56d2b2
SHA143504f55e430f4af001d0fd53c8ac56f505737c4
SHA256cb72429e7cafc39ff5fe974f03e65cfb9f0c7105129a7dc2f76dea6fbfd1f8c1
SHA51211727f5c6d9ad3576028611a78f28640f524f2a3eea1d6c1d0871c0c3cbf5b6061a4aa95e8b013681e235b8a655aee3b949b9bcd2ca4533222afca9b1c521eb7
-
Filesize
192KB
MD529859f6c827ee3cc8018d2a4e87e729c
SHA1f55d14fb937bf5112628ad2f61d27227cddce9ed
SHA25693a5d5dd73a47850cc143a53f22ea67df2857596160aca039703b8fd8ae8f900
SHA512f44d6a73a6097d27b01dad848a5f20fc50bc942970119238c328fdcc245a664e3171340d9f89bdf9a1f562720b017b4b36b12b9ddfae2b36f16f57951735d0c7
-
Filesize
3KB
MD58aa19f81129ce07002a51789486147d7
SHA10ff85d677b6582eb3173e51232278629f21c1e27
SHA25698997fd9a93e93dc8335815fb9a7423236408d53b509e6b4b8a668600466ddab
SHA51205fe7eed672f66fafc7e67a0da25833c490614ee4cd27613595dbf6fd2c2b7563f62bcea0edf6cc21f0dfb98c3b9a18ad28b91cc9d12b0b8b6bc13a72d74f047
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5836142c296e74177a5c73eff68953697
SHA14b594e826f6631a32e3514e56019c262e757fb92
SHA2569ea7150a1d5186c99bd05a25987e7bafb006ebc3d1435841d9991e55a4f3bb4d
SHA51208a1a6191464596ac89da262b138ce5e9c96130544233ca36b0f4b3afb2c0f471326b5c2bc9c5be3f1de94ce145e53a84d42a5b7f1566277ba575394f806e238
-
Filesize
231B
MD500848049d4218c485d9e9d7a54aa3b5f
SHA1d1d5f388221417985c365e8acaec127b971c40d0
SHA256ffeafbb8e7163fd7ec9abc029076796c73cd7b4eddaeeda9ba394c547419769e
SHA5123a4874a5289682e2b32108740feea586cb9ccdad9ca08bf30f67c9742370c081ad943ea714f08dbf722f9f98f3b0bb307619a8ba47f96b24301c68b0fd1086d9
-
Filesize
1KB
MD5dc646fd1c73502e14ac9c8f0790b08e1
SHA143b59850b0e710bc43625d8e2e9be8e10abac939
SHA256ac20bf1bdc6539335910da29882f05679b68c542d72c777a3d669428e0ad2a7a
SHA5123bdfc9d8d5b216d8ff5aac54fd239eb42be32f5fd779dd623b2d563c360484bf39c1e3098b3268605ce675b8e6c0d7d353043af8b058e91b9307a2493dbe812e
-
Filesize
4KB
MD55ec97bbe7d869c86de99aa1d43cc9890
SHA122b5e1cf3b398cd6b853841be949e5fdea55496e
SHA2564102923bc8ed07145fc2d83d0c40dac2d4626a3820e4f9d014603202a7e23736
SHA512c75e0537d4252a6d2fe1c915b1ee18d327756342deb2086f09180b53b754eea551602da34aef5f325c641e50458afcff0aa1f0e048843b1311f5a949a9050448
-
Filesize
978B
MD5e32595d36dafeb600c9a1b7474a0a956
SHA17a53b6a5ef03561c246fdc5cab6ac92fd87f0a19
SHA256cadcb70764815399a28b98743b314d37fee2b865afdd13e71d78579a0728c851
SHA5122684b4105be2cb479c347466920271c0dc3eb722cecdcfcfcdfc23d75a8b3ffcddb4e34b27ea7980c8491ceb0f3decb1054272b21a5cddcccc30739f86c859fc
-
Filesize
283B
MD58b23d5c4ddaa5bb29681e63e9afb1887
SHA18ea1653eb3c7ef9abf8ef54ad03327065102e495
SHA2567ce5c917bd6905c333cbeb0ed078971e72dd308da88e1222467255af1cedcfe5
SHA512dd119eaf62299c6c4018d3f9b669653b9b566fadffb689f84c2f2711c679fd486d79987e8e67e09e8155fcbda16902b2788900dcd78569d0234893e5151bb16b
-
Filesize
11KB
MD5d213491a2d74b38a9535d616b9161217
SHA1bde94742d1e769638e2de84dfb099f797adcc217
SHA2564662c3c94e0340a243c2a39ca8a88fd9f65c74fb197644a11d4ffcae6b191211
SHA5125fd8b91b27935711495934e5d7ca14f9dd72bc40a38072595879ef334a47f99e0608087ddc62668c6f783938d9f22a3688c5cdef3a9ad6c3575f3cfa5a3b0104
-
Filesize
25KB
MD5d0cfc204ca3968b891f7ce0dccfb2eda
SHA156dad1716554d8dc573d0ea391f808e7857b2206
SHA256e3940266b4368c04333db89804246cb89bf2073626f22b8de72bea27c522282a
SHA5124d2225b599ad8af8ba8516f12cfddca5ec0ce69c5c80b133a6a323e9aaf5e0312efbcfa54d2e4462a5095f9a7c42b9d5b39f3204e0be72c3b1992cf33b22087c
-
Filesize
10KB
MD59b222d8ec4b20860f10ebf303035b984
SHA1b30eea35c2516afcab2c49ef6531af94efaf7e1a
SHA256a32e13da40ac4b9e1dac7dd28bc1d25e2f2136b61ff93be943018b20796f15bc
SHA5128331337ccb6e3137b01aeec03e6921fd3b9e56c44fa1b17545ae5c7bfcdd39fcd8a90192884b3a82f56659009e24b63ce7f500e8766fd01e8d4e60a52de0fe67
-
Filesize
567B
MD5a660422059d953c6d681b53a6977100e
SHA10c95dd05514d062354c0eecc9ae8d437123305bb
SHA256d19677234127c38a52aec23686775a8eb3f4e3a406f4a11804d97602d6c31813
SHA51226f8cf9ac95ff649ecc2ed349bc6c7c3a04b188594d5c3289af8f2768ab59672bc95ffefcc83ed3ffa44edd0afeb16a4c2490e633a89fce7965843674d94b523
-
Filesize
53KB
MD5c912faa190464ce7dec867464c35a8dc
SHA1d1c6482dad37720db6bdc594c4757914d1b1dd70
SHA2563891846307aa9e83bca66b13198455af72af45bf721a2fbd41840d47e2a91201
SHA5125c34352d36459fd8fcda5b459a2e48601a033af31d802a90ed82c443a5a346b9480880d30c64db7ad0e4a8c35b98c98f69eceedad72f2a70d9c6cca74dce826a
-
Filesize
2KB
MD50c75ae5e75c3e181d13768909c8240ba
SHA1288403fc4bedaacebccf4f74d3073f082ef70eb9
SHA256de5c231c645d3ae1e13694284997721509f5de64ee5c96c966cdfda9e294db3f
SHA5128fc944515f41a837c61a6c4e5181ca273607a89e48fbf86cf8eb8db837aed095aa04fc3043029c3b5cb3710d59abfd86f086ac198200f634bfb1a5dd0823406b
-
Filesize
5KB
MD5380768979618b7097b0476179ec494ed
SHA1af2a03a17c546e4eeb896b230e4f2a52720545ab
SHA2560637af30fc3b3544b1f516f6196a8f821ffbfa5d36d65a8798aeeadbf2e8a7c2
SHA512b9ef59e9bfdbd49052a4e754ead8cd54b77e79cc428e7aee2b80055ff5f0b038584af519bd2d66258cf3c01f8cc71384f6959ee32111eac4399c47e1c2352302
-
Filesize
478KB
MD5580dc3658fa3fe42c41c99c52a9ce6b0
SHA13c4be12c6e3679a6c2267f88363bbd0e6e00cac5
SHA2565b7aa413e4a64679c550c77e6599a1c940ee947cbdf77d310e142a07a237aad2
SHA51268c52cd7b762b8f5d2f546092ed9c4316924fa04bd3ab748ab99541a8b4e7d9aec70acf5c9594d1457ad3a2f207d0c189ec58421d4352ddbc7eae453324d13f2
-
Filesize
17KB
MD544c4385447d4fa46b407fc47c8a467d0
SHA141e4e0e83b74943f5c41648f263b832419c05256
SHA2568be175e8fbdae0dade54830fece6c6980d1345dbeb4a06c07f7efdb1152743f4
SHA512191cd534e85323a4cd9649a1fc372312ed4a600f6252dffc4435793650f9dd40d0c0e615ba5eb9aa437a58af334146aac7c0ba08e0a1bf24ec4837a40f966005