Analysis
-
max time kernel
113s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 10:04
Static task
static1
Behavioral task
behavioral1
Sample
58a2e22abb254d8ffaba3a5b17ef1660_NEIKI.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
58a2e22abb254d8ffaba3a5b17ef1660_NEIKI.exe
Resource
win10v2004-20240226-en
General
-
Target
58a2e22abb254d8ffaba3a5b17ef1660_NEIKI.exe
-
Size
2.6MB
-
MD5
58a2e22abb254d8ffaba3a5b17ef1660
-
SHA1
c4fb57a8daba728f0fa88685c066a4dc9e9bb2a3
-
SHA256
b05d276fdeae8adc2a867cbd4bcf6b772db50ccd81a4acd0903fbd73e4bdf943
-
SHA512
e55d4174247f3ec1d164b2158ee9ae5e9d732d47ad1a6694e2441c3e5b827a001681953f33a5977d124a79c806d4911ee0514d3a7f02a0a41273e9932dd7e074
-
SSDEEP
24576:ObCj2sObHtqQ4QEfCr7w7yvuqqNq8FroaSaPXRackmrM4Biq7MhLv9GImmVfq4eS:ObCjPKNqQEfsw43qtmVfq4v
Malware Config
Extracted
Protocol: smtp- Host:
smtp.mail.me.com - Port:
587 - Username:
[email protected] - Password:
RICHARD205lord
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1728 jhdfkldfhndfkjdfnbfklfnf.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2732-13-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/2732-14-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/2732-15-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/2732-22-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/736-25-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/736-27-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/736-29-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/736-26-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts cvtres.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jhdfkldfhndfkjdfnbfklfnf = "C:\\ProgramData\\jhdfkldfhndfkjdfnbfklfnf.exe" 58a2e22abb254d8ffaba3a5b17ef1660_NEIKI.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jhdfkldfhndfkjdfnbfklfnf = "C:\\ProgramData\\jhdfkldfhndfkjdfnbfklfnf.exe" jhdfkldfhndfkjdfnbfklfnf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 43 icanhazip.com 45 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023267-3.dat autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1728 set thread context of 3292 1728 jhdfkldfhndfkjdfnbfklfnf.exe 99 PID 3292 set thread context of 2732 3292 RegAsm.exe 104 PID 3292 set thread context of 736 3292 RegAsm.exe 106 PID 3292 set thread context of 1540 3292 RegAsm.exe 108 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 23 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1684 schtasks.exe 4572 schtasks.exe 3860 schtasks.exe 220 schtasks.exe 3544 schtasks.exe 4148 schtasks.exe 1288 schtasks.exe 2804 schtasks.exe 2708 schtasks.exe 4780 schtasks.exe 4512 schtasks.exe 3104 schtasks.exe 3336 schtasks.exe 1648 schtasks.exe 3500 schtasks.exe 2448 schtasks.exe 4736 schtasks.exe 4304 schtasks.exe 4544 schtasks.exe 1724 schtasks.exe 3188 schtasks.exe 1428 schtasks.exe 1696 schtasks.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\58a2e22abb254d8ffaba3a5b17ef1660_NEIKI.exe:Zone.Identifier:$DATA 58a2e22abb254d8ffaba3a5b17ef1660_NEIKI.exe File created C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe:Zone.Identifier:$DATA jhdfkldfhndfkjdfnbfklfnf.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 5020 58a2e22abb254d8ffaba3a5b17ef1660_NEIKI.exe 5020 58a2e22abb254d8ffaba3a5b17ef1660_NEIKI.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 3292 RegAsm.exe 3292 RegAsm.exe 3292 RegAsm.exe 3292 RegAsm.exe 3292 RegAsm.exe 3292 RegAsm.exe 3292 RegAsm.exe 3292 RegAsm.exe 3292 RegAsm.exe 3292 RegAsm.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe 1728 jhdfkldfhndfkjdfnbfklfnf.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3292 RegAsm.exe Token: SeDebugPrivilege 2732 cvtres.exe Token: SeDebugPrivilege 736 cvtres.exe Token: SeDebugPrivilege 1540 cvtres.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3292 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5020 wrote to memory of 1728 5020 58a2e22abb254d8ffaba3a5b17ef1660_NEIKI.exe 97 PID 5020 wrote to memory of 1728 5020 58a2e22abb254d8ffaba3a5b17ef1660_NEIKI.exe 97 PID 5020 wrote to memory of 1728 5020 58a2e22abb254d8ffaba3a5b17ef1660_NEIKI.exe 97 PID 1728 wrote to memory of 3292 1728 jhdfkldfhndfkjdfnbfklfnf.exe 99 PID 1728 wrote to memory of 3292 1728 jhdfkldfhndfkjdfnbfklfnf.exe 99 PID 1728 wrote to memory of 3292 1728 jhdfkldfhndfkjdfnbfklfnf.exe 99 PID 1728 wrote to memory of 3292 1728 jhdfkldfhndfkjdfnbfklfnf.exe 99 PID 1728 wrote to memory of 3292 1728 jhdfkldfhndfkjdfnbfklfnf.exe 99 PID 1728 wrote to memory of 4572 1728 jhdfkldfhndfkjdfnbfklfnf.exe 100 PID 1728 wrote to memory of 4572 1728 jhdfkldfhndfkjdfnbfklfnf.exe 100 PID 1728 wrote to memory of 4572 1728 jhdfkldfhndfkjdfnbfklfnf.exe 100 PID 1728 wrote to memory of 2708 1728 jhdfkldfhndfkjdfnbfklfnf.exe 102 PID 1728 wrote to memory of 2708 1728 jhdfkldfhndfkjdfnbfklfnf.exe 102 PID 1728 wrote to memory of 2708 1728 jhdfkldfhndfkjdfnbfklfnf.exe 102 PID 3292 wrote to memory of 2732 3292 RegAsm.exe 104 PID 3292 wrote to memory of 2732 3292 RegAsm.exe 104 PID 3292 wrote to memory of 2732 3292 RegAsm.exe 104 PID 3292 wrote to memory of 2732 3292 RegAsm.exe 104 PID 3292 wrote to memory of 2732 3292 RegAsm.exe 104 PID 3292 wrote to memory of 2732 3292 RegAsm.exe 104 PID 3292 wrote to memory of 2732 3292 RegAsm.exe 104 PID 3292 wrote to memory of 736 3292 RegAsm.exe 106 PID 3292 wrote to memory of 736 3292 RegAsm.exe 106 PID 3292 wrote to memory of 736 3292 RegAsm.exe 106 PID 3292 wrote to memory of 736 3292 RegAsm.exe 106 PID 3292 wrote to memory of 736 3292 RegAsm.exe 106 PID 3292 wrote to memory of 736 3292 RegAsm.exe 106 PID 3292 wrote to memory of 736 3292 RegAsm.exe 106 PID 3292 wrote to memory of 1540 3292 RegAsm.exe 108 PID 3292 wrote to memory of 1540 3292 RegAsm.exe 108 PID 3292 wrote to memory of 1540 3292 RegAsm.exe 108 PID 3292 wrote to memory of 1540 3292 RegAsm.exe 108 PID 3292 wrote to memory of 1540 3292 RegAsm.exe 108 PID 3292 wrote to memory of 1540 3292 RegAsm.exe 108 PID 1728 wrote to memory of 4780 1728 jhdfkldfhndfkjdfnbfklfnf.exe 110 PID 1728 wrote to memory of 4780 1728 jhdfkldfhndfkjdfnbfklfnf.exe 110 PID 1728 wrote to memory of 4780 1728 jhdfkldfhndfkjdfnbfklfnf.exe 110 PID 1728 wrote to memory of 4512 1728 jhdfkldfhndfkjdfnbfklfnf.exe 113 PID 1728 wrote to memory of 4512 1728 jhdfkldfhndfkjdfnbfklfnf.exe 113 PID 1728 wrote to memory of 4512 1728 jhdfkldfhndfkjdfnbfklfnf.exe 113 PID 1728 wrote to memory of 3860 1728 jhdfkldfhndfkjdfnbfklfnf.exe 115 PID 1728 wrote to memory of 3860 1728 jhdfkldfhndfkjdfnbfklfnf.exe 115 PID 1728 wrote to memory of 3860 1728 jhdfkldfhndfkjdfnbfklfnf.exe 115 PID 1728 wrote to memory of 4544 1728 jhdfkldfhndfkjdfnbfklfnf.exe 117 PID 1728 wrote to memory of 4544 1728 jhdfkldfhndfkjdfnbfklfnf.exe 117 PID 1728 wrote to memory of 4544 1728 jhdfkldfhndfkjdfnbfklfnf.exe 117 PID 1728 wrote to memory of 220 1728 jhdfkldfhndfkjdfnbfklfnf.exe 119 PID 1728 wrote to memory of 220 1728 jhdfkldfhndfkjdfnbfklfnf.exe 119 PID 1728 wrote to memory of 220 1728 jhdfkldfhndfkjdfnbfklfnf.exe 119 PID 1728 wrote to memory of 3544 1728 jhdfkldfhndfkjdfnbfklfnf.exe 121 PID 1728 wrote to memory of 3544 1728 jhdfkldfhndfkjdfnbfklfnf.exe 121 PID 1728 wrote to memory of 3544 1728 jhdfkldfhndfkjdfnbfklfnf.exe 121 PID 1728 wrote to memory of 4148 1728 jhdfkldfhndfkjdfnbfklfnf.exe 123 PID 1728 wrote to memory of 4148 1728 jhdfkldfhndfkjdfnbfklfnf.exe 123 PID 1728 wrote to memory of 4148 1728 jhdfkldfhndfkjdfnbfklfnf.exe 123 PID 1728 wrote to memory of 3500 1728 jhdfkldfhndfkjdfnbfklfnf.exe 125 PID 1728 wrote to memory of 3500 1728 jhdfkldfhndfkjdfnbfklfnf.exe 125 PID 1728 wrote to memory of 3500 1728 jhdfkldfhndfkjdfnbfklfnf.exe 125 PID 1728 wrote to memory of 1288 1728 jhdfkldfhndfkjdfnbfklfnf.exe 127 PID 1728 wrote to memory of 1288 1728 jhdfkldfhndfkjdfnbfklfnf.exe 127 PID 1728 wrote to memory of 1288 1728 jhdfkldfhndfkjdfnbfklfnf.exe 127 PID 1728 wrote to memory of 3104 1728 jhdfkldfhndfkjdfnbfklfnf.exe 129 PID 1728 wrote to memory of 3104 1728 jhdfkldfhndfkjdfnbfklfnf.exe 129 PID 1728 wrote to memory of 3104 1728 jhdfkldfhndfkjdfnbfklfnf.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\58a2e22abb254d8ffaba3a5b17ef1660_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\58a2e22abb254d8ffaba3a5b17ef1660_NEIKI.exe"1⤵
- Adds Run key to start application
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exeC:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe03⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmpB503.tmp"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmpB87E.tmp"4⤵
- Accesses Microsoft Outlook accounts
- Suspicious use of AdjustPrivilegeToken
PID:736
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmpB8DD.tmp"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:4572
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2708
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:4780
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:4512
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3860
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:4544
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:220
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3544
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:4148
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3500
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1288
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3104
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2448
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1724
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2804
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1684
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:4736
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:4304
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3188
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3336
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1428
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1696
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1648
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3732 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:2952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5b0ffb52bc0536e450df6451bd5219003
SHA10ca7dad6748b59f3295b91f10408680672fa8c49
SHA25639acdec7274b6cccb37b1b8720c81533448fa97d717d33adac326e0006e20295
SHA51215a62529a311c5f84c55b71c64767e5c7edd083abba8e4c1768a7eadc1ca973654d1a10c332b2f184043d43b36fba2285450fe8902e15c0815a2d055503863a5
-
Filesize
1KB
MD5b0cc2e6f2d8036c9b5fef218736fa9c9
SHA164fd3017625979c95ba09d7cbea201010a82f73f
SHA256997aceeb78143e057d4ea0ed699db3cc1c723f699b4532663b7b85c83baa5c50
SHA512a1fe80b2971c4d1141a594f27eaea61500bf701cd1b8fbdb5ac2204a63c8ef862344f8c30f65ce769f0acf2b0718ed33a02744dd1a152c4a62a5318333d29b9b
-
Filesize
400B
MD5de4e5ff058882957cf8a3b5f839a031f
SHA10b3d8279120fb5fa27efbd9eee89695aa040fc24
SHA256ef54f46b9f1e342fc12e035ae94f57c61ea4e8be4e116f0a1c6f86310f400f49
SHA512a6b0d557e9eec4e56630e5ba64495df318f4fd959fffbdcbf77831185b067906917c9117a0ecd6ac817c7860d5d831cce15820d715657d81e2d817d9fab9fb72
-
Filesize
391B
MD53525ea58bba48993ea0d01b65ea71381
SHA11b917678fdd969e5ee5916e5899e7c75a979cf4d
SHA256681bcee53cf679ac674e700136f9229b9184fe60ed6410dbd7a33d462ed13ae2
SHA5125aad8dca43ec85882daf50c469bd04dcf0b62affc8bc605b3e289496a2679d4d548fea8bb0aea7080bbfbcdcab9d275fc6797b9c95b64f9f97ecf79583a83986