Malware Analysis Report

2024-10-10 10:03

Sample ID 240512-kzss2acc59
Target New Project 1.exe
SHA256 0f10ed177734b40d0ca45eed258f8c3ca585323e32db8f3cab7387b61de0e679
Tags
umbral xworm execution persistence rat spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0f10ed177734b40d0ca45eed258f8c3ca585323e32db8f3cab7387b61de0e679

Threat Level: Known bad

The file New Project 1.exe was found to be: Known bad.

Malicious Activity Summary

umbral xworm execution persistence rat spyware stealer trojan

Umbral

Xworm

Detect Umbral payload

Detect Xworm Payload

Drops file in Drivers directory

Command and Scripting Interpreter: PowerShell

Executes dropped EXE

Checks computer location settings

Drops startup file

Reads user/profile data of web browsers

Loads dropped DLL

Looks up external IP address via web service

Adds Run key to start application

Legitimate hosting services abused for malware hosting/C2

Enumerates physical storage devices

Unsigned PE

Views/modifies file attributes

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Modifies registry class

Detects videocard installed

Suspicious use of SetWindowsHookEx

Runs ping.exe

Uses Task Scheduler COM API

Creates scheduled task(s)

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-12 09:02

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-12 09:02

Reported

2024-05-12 09:05

Platform

win7-20240508-en

Max time kernel

146s

Max time network

145s

Command Line

"C:\Users\Admin\AppData\Local\Temp\New Project 1.exe"

Signatures

Detect Umbral payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Umbral

stealer umbral

Xworm

trojan rat xworm

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\System32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\2.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk C:\Users\Admin\AppData\Local\Temp\1.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk C:\Users\Admin\AppData\Local\Temp\1.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2.exe N/A
N/A N/A C:\Users\Admin\svchost.exe N/A
N/A N/A C:\Users\Admin\svchost.exe N/A
N/A N/A C:\Users\Admin\svchost.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\New Project 1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New Project 1.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\1.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A
N/A ip-api.com N/A N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\System32\schtasks.exe N/A

Detects videocard installed

Description Indicator Process Target
N/A N/A C:\Windows\System32\Wbem\wmic.exe N/A

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\system32\PING.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2420 wrote to memory of 2992 N/A C:\Users\Admin\AppData\Local\Temp\New Project 1.exe C:\Users\Admin\AppData\Local\Temp\1.exe
PID 2420 wrote to memory of 2992 N/A C:\Users\Admin\AppData\Local\Temp\New Project 1.exe C:\Users\Admin\AppData\Local\Temp\1.exe
PID 2420 wrote to memory of 2992 N/A C:\Users\Admin\AppData\Local\Temp\New Project 1.exe C:\Users\Admin\AppData\Local\Temp\1.exe
PID 2420 wrote to memory of 2992 N/A C:\Users\Admin\AppData\Local\Temp\New Project 1.exe C:\Users\Admin\AppData\Local\Temp\1.exe
PID 2420 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\New Project 1.exe C:\Users\Admin\AppData\Local\Temp\2.exe
PID 2420 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\New Project 1.exe C:\Users\Admin\AppData\Local\Temp\2.exe
PID 2420 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\New Project 1.exe C:\Users\Admin\AppData\Local\Temp\2.exe
PID 2420 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\New Project 1.exe C:\Users\Admin\AppData\Local\Temp\2.exe
PID 1908 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 1908 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 1908 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 1908 wrote to memory of 3052 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\system32\attrib.exe
PID 1908 wrote to memory of 3052 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\system32\attrib.exe
PID 1908 wrote to memory of 3052 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\system32\attrib.exe
PID 1908 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2156 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2156 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2156 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1840 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1840 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1840 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1320 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 1908 wrote to memory of 1320 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 1908 wrote to memory of 1320 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 1908 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 1908 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 1908 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 2992 wrote to memory of 1952 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 1952 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 1952 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 264 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 1908 wrote to memory of 264 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 1908 wrote to memory of 264 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 1908 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 3040 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 3040 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 3040 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 612 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 1908 wrote to memory of 612 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 1908 wrote to memory of 612 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 2992 wrote to memory of 1784 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 1784 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 1784 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1220 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\system32\cmd.exe
PID 1908 wrote to memory of 1220 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\system32\cmd.exe
PID 1908 wrote to memory of 1220 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\system32\cmd.exe
PID 1220 wrote to memory of 348 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\PING.EXE
PID 1220 wrote to memory of 348 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\PING.EXE
PID 1220 wrote to memory of 348 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\PING.EXE
PID 2992 wrote to memory of 2236 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 2236 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 2236 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 800 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\schtasks.exe
PID 2992 wrote to memory of 800 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\schtasks.exe
PID 2992 wrote to memory of 800 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\schtasks.exe
PID 1532 wrote to memory of 2372 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\svchost.exe
PID 1532 wrote to memory of 2372 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\svchost.exe

Uses Task Scheduler COM API

persistence

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\New Project 1.exe

"C:\Users\Admin\AppData\Local\Temp\New Project 1.exe"

C:\Users\Admin\AppData\Local\Temp\1.exe

"C:\Users\Admin\AppData\Local\Temp\1.exe"

C:\Users\Admin\AppData\Local\Temp\2.exe

"C:\Users\Admin\AppData\Local\Temp\2.exe"

C:\Windows\System32\Wbem\wmic.exe

"wmic.exe" csproduct get uuid

C:\Windows\system32\attrib.exe

"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\2.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\2.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY

C:\Windows\System32\Wbem\wmic.exe

"wmic.exe" os get Caption

C:\Windows\System32\Wbem\wmic.exe

"wmic.exe" computersystem get totalphysicalmemory

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1.exe'

C:\Windows\System32\Wbem\wmic.exe

"wmic.exe" csproduct get uuid

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '1.exe'

C:\Windows\System32\Wbem\wmic.exe

"wmic" path win32_VideoController get name

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\svchost.exe'

C:\Windows\system32\cmd.exe

"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\2.exe" && pause

C:\Windows\system32\PING.EXE

ping localhost

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\svchost.exe"

C:\Windows\system32\taskeng.exe

taskeng.exe {42A1CF54-F50E-4763-86C3-DED886D03A0E} S-1-5-21-3691908287-3775019229-3534252667-1000:UOTHCPHQ\Admin:Interactive:[1]

C:\Users\Admin\svchost.exe

C:\Users\Admin\svchost.exe

C:\Users\Admin\svchost.exe

C:\Users\Admin\svchost.exe

C:\Users\Admin\svchost.exe

C:\Users\Admin\svchost.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 gstatic.com udp
GB 216.58.201.99:443 gstatic.com tcp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 discord.com udp
US 162.159.137.232:443 discord.com tcp
US 8.8.8.8:53 reference-elliott.gl.at.ply.gg udp
US 147.185.221.19:37420 reference-elliott.gl.at.ply.gg tcp
US 147.185.221.19:37420 reference-elliott.gl.at.ply.gg tcp

Files

memory/2420-0-0x0000000000400000-0x000000000047C000-memory.dmp

\Users\Admin\AppData\Local\Temp\1.exe

MD5 4e4ffd6981f1d7df1e06e02c7a52e86a
SHA1 970d227a122a826f587fb49c694a422ec6aff1e0
SHA256 353010e5cbdfb234aadfcb40b517b51b24bbac81b64d794d5d8f8b1cd0cd6031
SHA512 1f75401fe015416453119bb92ea46c71412f342fe4bf1170bc2655a1c4f1fb4344bdff64df8dfd54f8203b30445225a70f12790432d3b59693e96de2fa5750ec

\Users\Admin\AppData\Local\Temp\2.exe

MD5 8068d967a754039c953d677ed75caa65
SHA1 c6ca62d0e3f84f4018546cdf40b14ac80b06af95
SHA256 b2811334ba1ec945f7f2f1b1976e72dd634a4cf8b5679ceb4c90816d5b646b11
SHA512 8f8f9b0c50f3178daa1df6ce16755c7a0de24872a344fe6b93d1a9b11cfad2faa1ed5ad58c6ac9904b889188d8efaba2d51e4240e7a813fffe6878ec8970954c

memory/1908-14-0x00000000012E0000-0x0000000001320000-memory.dmp

memory/2992-15-0x0000000000A60000-0x0000000000A7C000-memory.dmp

memory/2628-20-0x000000001B630000-0x000000001B912000-memory.dmp

memory/2628-21-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

\??\PIPE\srvsvc

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 62fb0e721b9ff58d34784ab0019e8b4b
SHA1 a0efb88e7f5764d75cdff3d3f756c0bfb61d3b58
SHA256 a87888523816544ac10715af3b5cab94c7a1404cbdbeee19b81e710ab79a2be3
SHA512 df0da5e77fc9c431e4af9d1467e71339a6e6188c98453a4fef508a6482d60b6053c228bef4d70169e7256263491cda5662e03226b409a9308d4b148596e36a61

memory/2392-28-0x000000001B6A0000-0x000000001B982000-memory.dmp

memory/2392-29-0x0000000001E60000-0x0000000001E68000-memory.dmp

memory/1952-58-0x0000000002960000-0x0000000002968000-memory.dmp

memory/3040-69-0x00000000028E0000-0x00000000028E8000-memory.dmp

memory/2372-91-0x0000000000F00000-0x0000000000F1C000-memory.dmp

memory/2992-92-0x000000001A7B0000-0x000000001A7BC000-memory.dmp

memory/1112-95-0x0000000000240000-0x000000000025C000-memory.dmp

memory/1972-97-0x00000000008F0000-0x000000000090C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-12 09:02

Reported

2024-05-12 09:05

Platform

win10v2004-20240426-en

Max time kernel

5s

Max time network

79s

Command Line

"C:\Users\Admin\AppData\Local\Temp\New Project 1.exe"

Signatures

Detect Umbral payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Umbral

stealer umbral

Xworm

trojan rat xworm

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\System32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\2.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\New Project 1.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\1.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2.exe N/A

Reads user/profile data of web browsers

spyware stealer

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A
N/A ip-api.com N/A N/A

Enumerates physical storage devices

Detects videocard installed

Description Indicator Process Target
N/A N/A C:\Windows\System32\Wbem\wmic.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Users\Admin\AppData\Local\Temp\New Project 1.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4992 wrote to memory of 1876 N/A C:\Users\Admin\AppData\Local\Temp\New Project 1.exe C:\Users\Admin\AppData\Local\Temp\1.exe
PID 4992 wrote to memory of 1876 N/A C:\Users\Admin\AppData\Local\Temp\New Project 1.exe C:\Users\Admin\AppData\Local\Temp\1.exe
PID 4992 wrote to memory of 3208 N/A C:\Users\Admin\AppData\Local\Temp\New Project 1.exe C:\Users\Admin\AppData\Local\Temp\2.exe
PID 4992 wrote to memory of 3208 N/A C:\Users\Admin\AppData\Local\Temp\New Project 1.exe C:\Users\Admin\AppData\Local\Temp\2.exe
PID 3208 wrote to memory of 404 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3208 wrote to memory of 404 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3208 wrote to memory of 2564 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\SYSTEM32\attrib.exe
PID 3208 wrote to memory of 2564 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\SYSTEM32\attrib.exe
PID 3208 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3208 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3208 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3208 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3208 wrote to memory of 3392 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3208 wrote to memory of 3392 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3208 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3208 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3208 wrote to memory of 4916 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3208 wrote to memory of 4916 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3208 wrote to memory of 1904 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3208 wrote to memory of 1904 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 1876 wrote to memory of 4276 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1876 wrote to memory of 4276 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3208 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3208 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3208 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3208 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1876 wrote to memory of 4364 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1876 wrote to memory of 4364 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3208 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3208 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 1876 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1876 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\New Project 1.exe

"C:\Users\Admin\AppData\Local\Temp\New Project 1.exe"

C:\Users\Admin\AppData\Local\Temp\1.exe

"C:\Users\Admin\AppData\Local\Temp\1.exe"

C:\Users\Admin\AppData\Local\Temp\2.exe

"C:\Users\Admin\AppData\Local\Temp\2.exe"

C:\Windows\System32\Wbem\wmic.exe

"wmic.exe" csproduct get uuid

C:\Windows\SYSTEM32\attrib.exe

"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\2.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\2.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY

C:\Windows\System32\Wbem\wmic.exe

"wmic.exe" os get Caption

C:\Windows\System32\Wbem\wmic.exe

"wmic.exe" computersystem get totalphysicalmemory

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1.exe'

C:\Windows\System32\Wbem\wmic.exe

"wmic.exe" csproduct get uuid

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '1.exe'

C:\Windows\System32\Wbem\wmic.exe

"wmic" path win32_VideoController get name

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\svchost.exe'

Network

Country Destination Domain Proto
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 gstatic.com udp
GB 216.58.201.99:443 gstatic.com tcp
US 8.8.8.8:53 91.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 99.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 discord.com udp
US 162.159.128.233:443 discord.com tcp

Files

memory/4992-0-0x0000000000400000-0x000000000047C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1.exe

MD5 4e4ffd6981f1d7df1e06e02c7a52e86a
SHA1 970d227a122a826f587fb49c694a422ec6aff1e0
SHA256 353010e5cbdfb234aadfcb40b517b51b24bbac81b64d794d5d8f8b1cd0cd6031
SHA512 1f75401fe015416453119bb92ea46c71412f342fe4bf1170bc2655a1c4f1fb4344bdff64df8dfd54f8203b30445225a70f12790432d3b59693e96de2fa5750ec

memory/1876-109-0x00007FFC21CE3000-0x00007FFC21CE5000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\2.exe

MD5 8068d967a754039c953d677ed75caa65
SHA1 c6ca62d0e3f84f4018546cdf40b14ac80b06af95
SHA256 b2811334ba1ec945f7f2f1b1976e72dd634a4cf8b5679ceb4c90816d5b646b11
SHA512 8f8f9b0c50f3178daa1df6ce16755c7a0de24872a344fe6b93d1a9b11cfad2faa1ed5ad58c6ac9904b889188d8efaba2d51e4240e7a813fffe6878ec8970954c

memory/1876-110-0x00000000005D0000-0x00000000005EC000-memory.dmp

memory/3208-122-0x000001EFF3C90000-0x000001EFF3CD0000-memory.dmp

memory/3208-123-0x00007FFC21CE0000-0x00007FFC227A1000-memory.dmp

memory/2736-124-0x000001677F660000-0x000001677F682000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ekb42gk3.icr.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

MD5 d85ba6ff808d9e5444a4b369f5bc2730
SHA1 31aa9d96590fff6981b315e0b391b575e4c0804a
SHA256 84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA512 8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 77d622bb1a5b250869a3238b9bc1402b
SHA1 d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256 f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512 d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

memory/3208-150-0x000001EFF6490000-0x000001EFF6506000-memory.dmp

memory/3208-151-0x000001EFF6160000-0x000001EFF61B0000-memory.dmp

memory/3208-152-0x000001EFF5910000-0x000001EFF592E000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 c9b6705519e1eef08f86c4ba5f4286f3
SHA1 6c6b179e452ecee2673a1d4fe128f1c06f70577f
SHA256 0f9cad44a79126871580e19b01dc3f880c5173b1faaf8b9018d5d1f829714705
SHA512 6d8f85a7a8b0b124530f36a157cd0441b5c1eacdc35e274af9fbf0569d03d1d5e468651a5b2425f0215c282ecfa7b1ffeaeeaf18612822f00bd14306d30640c7

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 88be3bc8a7f90e3953298c0fdbec4d72
SHA1 f4969784ad421cc80ef45608727aacd0f6bf2e4b
SHA256 533c8470b41084e40c5660569ebbdb7496520d449629a235e8053e84025f348a
SHA512 4fce64e2dacddbc03314048fef1ce356ee2647c14733da121c23c65507eeb8d721d6b690ad5463319b364dc4fa95904ad6ab096907f32918e3406ef438a6ef7c

memory/3208-188-0x000001EFF5950000-0x000001EFF595A000-memory.dmp

memory/3208-189-0x000001EFF61B0000-0x000001EFF61C2000-memory.dmp

memory/1876-192-0x00007FFC21CE0000-0x00007FFC227A1000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 45ad40f012b09e141955482368549640
SHA1 3f9cd15875c1e397c3b2b5592805577ae88a96cb
SHA256 ea3b59172f1a33677f9cb3843fb4d6093b806d3a7cf2f3c6d4692f5421f656ce
SHA512 3de08f8affca1c1450088f560776cf3d65146cadac43c06eb922c7b3cea436e519966cf38458303ffeb1a58c53f8952cffda6c34216fda7594e014b516e83b33

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 852f019aa3823e1c90335ba698f31412
SHA1 a94ebb8e47316a5fec092ab897ec34299a82d200
SHA256 b4bed2ce3d5b6577836eb2b0a766c008243a1db942e341717fb4bc18e84fc2f0
SHA512 ca94865644cb570f60cf35a08ad5de6a3af4503bc40845237219c31e910f89cc93b280d997514583d86e6cf45eb2b8749bfe2e41bbaef67471e0b64b579e5ab3

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 a2c8179aaa149c0b9791b73ce44c04d1
SHA1 703361b0d43ec7f669304e7c0ffbbfdeb1e484ff
SHA256 c1d30342a40a2b6e7553da30ceb85754d33820f6fbb3bbbed1ceb30d6390de4a
SHA512 2e201dd457d055baad86f68c15bcc7beb48d6dc2ffc10db7f304eb93f697e7b45991cbde857d25da2c9c60c23f3e13df8b5ed5809c1753737a23096e296cc9e3