Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 14:36
Behavioral task
behavioral1
Sample
e01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84.exe
Resource
win10v2004-20240508-en
General
-
Target
e01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84.exe
-
Size
5.2MB
-
MD5
4b33f2982aa4df81f65b713a7e398b3c
-
SHA1
630b0be15443733a06412b072441ec00075e2f83
-
SHA256
e01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84
-
SHA512
7efceddfe0d85ea082650d47e3897dd35b3117154fa20b391f2db8626bcb2a3ba04bb0ae3e7efff9fb5585c4c95262f0669c7aa72ff322a8138cb35d8d841205
-
SSDEEP
98304:Oh9o1ezhQcSZcOb+sX1ZvbeG4Z0FGRABTgtse6vzovknQp:Oh9hhQcERCsXDjfZkJMQp
Malware Config
Extracted
njrat
Platinum
HacKed
127.0.0.1:8848
SecurityHealthService.exe
-
reg_key
SecurityHealthService.exe
-
splitter
|Ghost|
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
main.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation main.exe -
Drops startup file 3 IoCs
Processes:
SecurityHealthService.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecurityHealthService.exe SecurityHealthService.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecurityHealthService.exe SecurityHealthService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecurityHealthService.url SecurityHealthService.exe -
Executes dropped EXE 3 IoCs
Processes:
main.exeSecurityHealthService.exeSecurityHealthService.exepid process 1480 main.exe 4352 SecurityHealthService.exe 2968 SecurityHealthService.exe -
Loads dropped DLL 4 IoCs
Processes:
e01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84.exepid process 3376 e01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84.exe 3376 e01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84.exe 3376 e01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84.exe 3376 e01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
SecurityHealthService.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthService.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\SecurityHealthService.exe\" .." SecurityHealthService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SecurityHealthService.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\SecurityHealthService.exe\" .." SecurityHealthService.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 48 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1956 schtasks.exe 4944 schtasks.exe 5008 schtasks.exe 5036 schtasks.exe 3692 schtasks.exe 4324 schtasks.exe 3488 schtasks.exe 2856 schtasks.exe 1408 schtasks.exe 5096 schtasks.exe 4280 schtasks.exe 3392 schtasks.exe 2984 schtasks.exe 1500 schtasks.exe 3312 schtasks.exe 1696 schtasks.exe 4628 schtasks.exe 3096 schtasks.exe 2288 schtasks.exe 4420 schtasks.exe 512 schtasks.exe 3940 schtasks.exe 2172 schtasks.exe 2020 schtasks.exe 3540 schtasks.exe 4332 schtasks.exe 4516 schtasks.exe 860 schtasks.exe 4392 schtasks.exe 1864 schtasks.exe 2464 schtasks.exe 4792 schtasks.exe 3764 schtasks.exe 4532 schtasks.exe 856 schtasks.exe 4288 schtasks.exe 2480 schtasks.exe 832 schtasks.exe 3172 schtasks.exe 1664 schtasks.exe 3584 schtasks.exe 4216 schtasks.exe 1904 schtasks.exe 3196 schtasks.exe 2176 schtasks.exe 4492 schtasks.exe 748 schtasks.exe 2076 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
SecurityHealthService.exedescription pid process Token: SeDebugPrivilege 4352 SecurityHealthService.exe Token: 33 4352 SecurityHealthService.exe Token: SeIncBasePriorityPrivilege 4352 SecurityHealthService.exe Token: 33 4352 SecurityHealthService.exe Token: SeIncBasePriorityPrivilege 4352 SecurityHealthService.exe Token: 33 4352 SecurityHealthService.exe Token: SeIncBasePriorityPrivilege 4352 SecurityHealthService.exe Token: 33 4352 SecurityHealthService.exe Token: SeIncBasePriorityPrivilege 4352 SecurityHealthService.exe Token: 33 4352 SecurityHealthService.exe Token: SeIncBasePriorityPrivilege 4352 SecurityHealthService.exe Token: 33 4352 SecurityHealthService.exe Token: SeIncBasePriorityPrivilege 4352 SecurityHealthService.exe Token: 33 4352 SecurityHealthService.exe Token: SeIncBasePriorityPrivilege 4352 SecurityHealthService.exe Token: 33 4352 SecurityHealthService.exe Token: SeIncBasePriorityPrivilege 4352 SecurityHealthService.exe Token: 33 4352 SecurityHealthService.exe Token: SeIncBasePriorityPrivilege 4352 SecurityHealthService.exe Token: 33 4352 SecurityHealthService.exe Token: SeIncBasePriorityPrivilege 4352 SecurityHealthService.exe Token: 33 4352 SecurityHealthService.exe Token: SeIncBasePriorityPrivilege 4352 SecurityHealthService.exe Token: 33 4352 SecurityHealthService.exe Token: SeIncBasePriorityPrivilege 4352 SecurityHealthService.exe Token: 33 4352 SecurityHealthService.exe Token: SeIncBasePriorityPrivilege 4352 SecurityHealthService.exe Token: 33 4352 SecurityHealthService.exe Token: SeIncBasePriorityPrivilege 4352 SecurityHealthService.exe Token: 33 4352 SecurityHealthService.exe Token: SeIncBasePriorityPrivilege 4352 SecurityHealthService.exe Token: 33 4352 SecurityHealthService.exe Token: SeIncBasePriorityPrivilege 4352 SecurityHealthService.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84.exee01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84.execmd.exemain.exeSecurityHealthService.exedescription pid process target process PID 1512 wrote to memory of 3376 1512 e01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84.exe e01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84.exe PID 1512 wrote to memory of 3376 1512 e01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84.exe e01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84.exe PID 3376 wrote to memory of 2264 3376 e01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84.exe cmd.exe PID 3376 wrote to memory of 2264 3376 e01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84.exe cmd.exe PID 2264 wrote to memory of 1480 2264 cmd.exe main.exe PID 2264 wrote to memory of 1480 2264 cmd.exe main.exe PID 2264 wrote to memory of 1480 2264 cmd.exe main.exe PID 1480 wrote to memory of 4352 1480 main.exe SecurityHealthService.exe PID 1480 wrote to memory of 4352 1480 main.exe SecurityHealthService.exe PID 1480 wrote to memory of 4352 1480 main.exe SecurityHealthService.exe PID 4352 wrote to memory of 4840 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4840 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4840 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 3692 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 3692 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 3692 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4228 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4228 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4228 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4324 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4324 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4324 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4020 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4020 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4020 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 2464 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 2464 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 2464 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 868 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 868 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 868 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 1696 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 1696 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 1696 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4112 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4112 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4112 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 5096 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 5096 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 5096 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 944 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 944 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 944 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4516 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4516 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4516 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 3180 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 3180 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 3180 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 3196 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 3196 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 3196 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4400 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4400 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4400 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4288 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4288 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4288 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 2352 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 2352 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 2352 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4628 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4628 4352 SecurityHealthService.exe schtasks.exe PID 4352 wrote to memory of 4628 4352 SecurityHealthService.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84.exe"C:\Users\Admin\AppData\Local\Temp\e01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84.exe"C:\Users\Admin\AppData\Local\Temp\e01df4c5286089fb07206d0c3b7c245b5321a88fb9e19e413ca431608a0e7e84.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\\main.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\main.exeC:\\main.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe"C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe"5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "SecurityHealthService" /f6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SecurityHealthService" /tr C:\Users\Admin\AppData\Roaming\SecurityHealthService.exe6⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SecurityHealthService.exeC:\Users\Admin\AppData\Roaming\SecurityHealthService.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI15122\VCRUNTIME140.dllFilesize
93KB
MD54a365ffdbde27954e768358f4a4ce82e
SHA1a1b31102eee1d2a4ed1290da2038b7b9f6a104a3
SHA2566a0850419432735a98e56857d5cfce97e9d58a947a9863ca6afadd1c7bcab27c
SHA51254e4b6287c4d5a165509047262873085f50953af63ca0dcb7649c22aba5b439ab117a7e0d6e7f0a3e51a23e28a255ffd1ca1ddce4b2ea7f87bca1c9b0dbe2722
-
C:\Users\Admin\AppData\Local\Temp\_MEI15122\_bz2.pydFilesize
84KB
MD5e91b4f8e1592da26bacaceb542a220a8
SHA15459d4c2147fa6db75211c3ec6166b869738bd38
SHA25620895fa331712701ebfdbb9ab87e394309e910f1d782929fd65b59ed76d9c90f
SHA512cb797fa758c65358e5b0fef739181f6b39e0629758a6f8d5c4bd7dc6422001769a19df0c746724fb2567a58708b18bbd098327bfbdf3378426049b113eb848e9
-
C:\Users\Admin\AppData\Local\Temp\_MEI15122\_decimal.pydFilesize
264KB
MD565287fd87a64bc756867a1afddec9e29
SHA1cda1db353f81df7a4a818add8f87bca9ac840455
SHA256df19c2e6ec3145166fa8d206c11db78bc1979a027105c4f21d40410b5082ba34
SHA5123e3f19cf965b260ffc68e45d5101234e8a957411c076a0d487d307dcfa714a9801cb501224fe7621937aebdf90275f655c8a70dd6675bcfb5374404fda53236f
-
C:\Users\Admin\AppData\Local\Temp\_MEI15122\_hashlib.pydFilesize
64KB
MD57c69cb3cb3182a97e3e9a30d2241ebed
SHA11b8754ff57a14c32bcadc330d4880382c7fffc93
SHA25612a84bacb071b1948a9f751ac8d0653ba71a8f6b217a69fe062608e532065c20
SHA51296dbabbc6b98d473cbe06dcd296f6c6004c485e57ac5ba10560a377393875192b22df8a7103fe4a22795b8d81b8b0ae14ce7646262f87cb609b9e2590a93169e
-
C:\Users\Admin\AppData\Local\Temp\_MEI15122\_lzma.pydFilesize
159KB
MD5493c33ddf375b394b648c4283b326481
SHA159c87ee582ba550f064429cb26ad79622c594f08
SHA2566384ded31408788d35a89dc3f7705ea2928f6bbdeb8b627f0d1b2d7b1ea13e16
SHA512a4a83f04c7fc321796ce6a932d572dca1ad6ecefd31002320aeaa2453701ed49ef9f0d9ba91c969737565a6512b94fbb0311aee53d355345a03e98f43e6f98b2
-
C:\Users\Admin\AppData\Local\Temp\_MEI15122\_socket.pydFilesize
78KB
MD5fd1cfe0f0023c5780247f11d8d2802c9
SHA15b29a3b4c6edb6fa176077e1f1432e3b0178f2bc
SHA256258a5f0b4d362b2fed80b24eeabcb3cdd1602e32ff79d87225da6d15106b17a6
SHA512b304a2e56829a557ec401c6fdda78d6d05b7495a610c1ed793d6b25fc5af891cb2a1581addb27ab5e2a6cb0be24d9678f67b97828015161bc875df9b7b5055ae
-
C:\Users\Admin\AppData\Local\Temp\_MEI15122\base_library.zipFilesize
826KB
MD52abe470164e060916c6842da1263e5ad
SHA1197163bfb26ce54420fa6eba03cf0fa0a5622934
SHA256151a4c8ea261130b5ae94653e5470ac6fe4663de269c187b2b38d6fccadc1baa
SHA51201e2c58b24f7d3d7b31df97c6dbe8aee0c0f61f457c78d62830fa954c17dffb74b4e5389ef389926b5ba78f96deb08ad4cd61c9ecea256bf35e0a99cd2366d65
-
C:\Users\Admin\AppData\Local\Temp\_MEI15122\libcrypto-1_1.dllFilesize
3.2MB
MD589511df61678befa2f62f5025c8c8448
SHA1df3961f833b4964f70fcf1c002d9fd7309f53ef8
SHA256296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf
SHA5129af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668
-
C:\Users\Admin\AppData\Local\Temp\_MEI15122\main.zipFilesize
65KB
MD5e87566acf4ca1c9983971705a6c60906
SHA1895740f5e3a9e70f720092946fc1e883466a26bc
SHA25652507bc59bce399e5db789241fcc171a2ca5c868a8c2c985d3e02364af1a4990
SHA5120bcd79fcdfc1490f8f5078bc12bd6c11ff7d66c875c95523a64fd8df63deb94f83046247ff2823f25eac7b70920180cac50a90130bc03470249595dbf97284d4
-
C:\Users\Admin\AppData\Local\Temp\_MEI15122\python39.dllFilesize
4.3MB
MD55cd203d356a77646856341a0c9135fc6
SHA1a1f4ac5cc2f5ecb075b3d0129e620784814a48f7
SHA256a56afcf5f3a72769c77c3bc43c9b84197180a8b3380b6258073223bfd72ed47a
SHA512390008d57fa711d7c88b77937bf16fdb230e7c1e7182faea6d7c206e9f65ced6f2e835f9da9befb941e80624abe45875602e0e7ad485d9a009d2450a2a0e0f1f
-
C:\Users\Admin\AppData\Local\Temp\_MEI15122\select.pydFilesize
28KB
MD50e3cf5d792a3f543be8bbc186b97a27a
SHA150f4c70fce31504c6b746a2c8d9754a16ebc8d5e
SHA256c7ffae6dc927cf10ac5da08614912bb3ad8fc52aa0ef9bc376d831e72dd74460
SHA512224b42e05b4dbdf7275ee7c5d3eb190024fc55e22e38bd189c1685efee2a3dd527c6dfcb2feeec525b8d6dc35aded1eac2423ed62bb2599bb6a9ea34e842c340
-
C:\Users\Admin\AppData\Local\Temp\_MEI15122\unicodedata.pydFilesize
1.1MB
MD57af51031368619638cca688a7275db14
SHA164e2cc5ac5afe8a65af690047dc03858157e964c
SHA2567f02a99a23cc3ff63ecb10ba6006e2da7bf685530bad43882ebf90d042b9eeb6
SHA512fbde24501288ff9b06fc96faff5e7a1849765df239e816774c04a4a6ef54a0c641adf4325bfb116952082d3234baef12288174ad8c18b62407109f29aa5ab326
-
C:\main.exeFilesize
65KB
MD5fef0fb51e5e35ca9244420c7675bb346
SHA1ed4284dc3642bf59f8301b68b48fbb03ad5387f3
SHA25621f539d71ad30ea865ccf0ee4dfdf6322b4895ce2cf8af67f120c2dfc84af33b
SHA51266ec13dedfad899f29a5676ae6cb06d5eb357a8b31806154d91764069f748f1f4f5eb479211029bc72f0ee7b1dc3628ba5a8bb0a7e376d37bd4d94c18fb0f043
-
memory/1480-32-0x0000000075312000-0x0000000075313000-memory.dmpFilesize
4KB
-
memory/1480-33-0x0000000075310000-0x00000000758C1000-memory.dmpFilesize
5.7MB
-
memory/1480-34-0x0000000075310000-0x00000000758C1000-memory.dmpFilesize
5.7MB
-
memory/1480-44-0x0000000075310000-0x00000000758C1000-memory.dmpFilesize
5.7MB
-
memory/4352-45-0x0000000075310000-0x00000000758C1000-memory.dmpFilesize
5.7MB
-
memory/4352-46-0x0000000075310000-0x00000000758C1000-memory.dmpFilesize
5.7MB
-
memory/4352-50-0x0000000075310000-0x00000000758C1000-memory.dmpFilesize
5.7MB
-
memory/4352-51-0x0000000075310000-0x00000000758C1000-memory.dmpFilesize
5.7MB