Analysis
-
max time kernel
109s -
max time network
147s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-05-2024 04:55
Behavioral task
behavioral1
Sample
Krampus/Krampus/B1OdUv8CBH.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Krampus/Krampus/B1OdUv8CBH.exe
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
Krampus/Krampus/DefenderControl/Defender_Settings.vbs
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Krampus/Krampus/DefenderControl/Defender_Settings.vbs
Resource
win11-20240508-en
Behavioral task
behavioral5
Sample
Krampus/Krampus/DefenderControl/dControl.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
Krampus/Krampus/DefenderControl/dControl.exe
Resource
win11-20240508-en
General
-
Target
Krampus/Krampus/B1OdUv8CBH.exe
-
Size
18.8MB
-
MD5
c5df5afb4679cbea28de24ff9ed306a2
-
SHA1
fe968a913c1377f0e85cc4c95afa3129a2f9ae22
-
SHA256
a12756e652171e06da8133a7abe625316b3d352fc82ed8cf199f349b7de0c478
-
SHA512
a4ddb32c744da55829823feb140c2c48612d442459ec76daf7ec0459327e8422222a380c53802c15b298cf122f1f86fe2891b2bf04732ef764d62fb182cd7e70
-
SSDEEP
196608:EXi2sOT7HnJ+7CBgHcyCkaIH2kkoyhr5QXNDe6JaCPU8rblcRHrdcKZ5CRO2HACB:ci07we4+TB6zxJcRBdCrHxwwR
Malware Config
Extracted
xworm
-
Install_directory
%ProgramData%
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/a1kmrNub
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000100000002a9de-6.dat family_xworm behavioral2/memory/3748-13-0x0000000000F20000-0x0000000000F38000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4876 powershell.exe 3584 powershell.exe 3112 powershell.exe 3948 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk clientlol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk clientlol.exe -
Executes dropped EXE 4 IoCs
pid Process 3748 clientlol.exe 1928 KrampUI.exe 4768 svchost 2160 svchost -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\ProgramData\\svchost" clientlol.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 5 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1644 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3748 clientlol.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3112 powershell.exe 3112 powershell.exe 2076 msedgewebview2.exe 2076 msedgewebview2.exe 3948 powershell.exe 3948 powershell.exe 4876 powershell.exe 4876 powershell.exe 3584 powershell.exe 3584 powershell.exe 3748 clientlol.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 1984 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3748 clientlol.exe Token: SeDebugPrivilege 3112 powershell.exe Token: SeDebugPrivilege 3948 powershell.exe Token: SeDebugPrivilege 4876 powershell.exe Token: SeDebugPrivilege 3584 powershell.exe Token: SeDebugPrivilege 3748 clientlol.exe Token: SeDebugPrivilege 4768 svchost Token: SeDebugPrivilege 2160 svchost -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1928 KrampUI.exe 1928 KrampUI.exe 1984 msedgewebview2.exe 1984 msedgewebview2.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1928 KrampUI.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3748 clientlol.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4952 wrote to memory of 3748 4952 B1OdUv8CBH.exe 81 PID 4952 wrote to memory of 3748 4952 B1OdUv8CBH.exe 81 PID 4952 wrote to memory of 1928 4952 B1OdUv8CBH.exe 82 PID 4952 wrote to memory of 1928 4952 B1OdUv8CBH.exe 82 PID 1928 wrote to memory of 1984 1928 KrampUI.exe 83 PID 1928 wrote to memory of 1984 1928 KrampUI.exe 83 PID 1984 wrote to memory of 1028 1984 msedgewebview2.exe 84 PID 1984 wrote to memory of 1028 1984 msedgewebview2.exe 84 PID 3748 wrote to memory of 3112 3748 clientlol.exe 86 PID 3748 wrote to memory of 3112 3748 clientlol.exe 86 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 3340 1984 msedgewebview2.exe 88 PID 1984 wrote to memory of 2076 1984 msedgewebview2.exe 89 PID 1984 wrote to memory of 2076 1984 msedgewebview2.exe 89 PID 1984 wrote to memory of 2916 1984 msedgewebview2.exe 90 PID 1984 wrote to memory of 2916 1984 msedgewebview2.exe 90 PID 1984 wrote to memory of 2916 1984 msedgewebview2.exe 90 PID 1984 wrote to memory of 2916 1984 msedgewebview2.exe 90 PID 1984 wrote to memory of 2916 1984 msedgewebview2.exe 90 PID 1984 wrote to memory of 2916 1984 msedgewebview2.exe 90 PID 1984 wrote to memory of 2916 1984 msedgewebview2.exe 90 PID 1984 wrote to memory of 2916 1984 msedgewebview2.exe 90 PID 1984 wrote to memory of 2916 1984 msedgewebview2.exe 90 PID 1984 wrote to memory of 2916 1984 msedgewebview2.exe 90 PID 1984 wrote to memory of 2916 1984 msedgewebview2.exe 90 PID 1984 wrote to memory of 2916 1984 msedgewebview2.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Krampus\Krampus\B1OdUv8CBH.exe"C:\Users\Admin\AppData\Local\Temp\Krampus\Krampus\B1OdUv8CBH.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\ProgramData\clientlol.exe"C:\ProgramData\clientlol.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\clientlol.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'clientlol.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3584
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost"3⤵
- Creates scheduled task(s)
PID:1644
-
-
-
C:\ProgramData\KrampUI.exe"C:\ProgramData\KrampUI.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=KrampUI.exe --webview-exe-version=1.2.1 --user-data-dir="C:\Users\Admin\AppData\Local\KrampUI\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --lang=en-US --mojo-named-platform-channel-pipe=1928.1844.143956724259021539833⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\KrampUI\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\KrampUI\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\KrampUI\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0xe8,0x1a8,0x7ffe21813cb8,0x7ffe21813cc8,0x7ffe21813cd84⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1756,17776653058565873785,13890487470199850164,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\KrampUI\EBWebView" --webview-exe-name=KrampUI.exe --webview-exe-version=1.2.1 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1792 /prefetch:24⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1756,17776653058565873785,13890487470199850164,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\KrampUI\EBWebView" --webview-exe-name=KrampUI.exe --webview-exe-version=1.2.1 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=1888 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2076
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1756,17776653058565873785,13890487470199850164,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\KrampUI\EBWebView" --webview-exe-name=KrampUI.exe --webview-exe-version=1.2.1 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2344 /prefetch:84⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1756,17776653058565873785,13890487470199850164,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\KrampUI\EBWebView" --webview-exe-name=KrampUI.exe --webview-exe-version=1.2.1 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2952 /prefetch:14⤵PID:1484
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4176
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2852
-
C:\ProgramData\svchostC:\ProgramData\svchost1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
C:\ProgramData\svchostC:\ProgramData\svchost1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17.3MB
MD5ec02c6962ff0994f0dbc06133cb32f28
SHA11084bbf4c67fea18b2dd0232ad196f97ea17438c
SHA2569663260edf06c3b9116a649af4c9fffa22f1bb3811f3e73e0f8fd6e3ba997565
SHA5128d00d5f21209bb7ffa24ee7717db4e9294c720a62d50ee416ab6e6e6520afde1d9cacc3c364c2c4d81d3eb565efba29f9e815d384774ba0de0671496952418f6
-
Filesize
1.5MB
MD5da4f713eda91ee257714127d761852a3
SHA15901870facef99c9c850b141e8f8339721e932e4
SHA2569d27a2b70745480a42b83777ea3aa0399c63a55c6d9b699d67f1e95f7605ebe1
SHA5129964eca29700aefa97febdbca4e829a64ec6fd050d49c720f04963fab831b528319c9b3b054f36093ef9dc7236a681fba02f1f988ec19194f124d7a75abcddf7
-
Filesize
2KB
MD53d70c8acb6330e028be6716077dc7418
SHA1f2386ec23260fde3fab9a91b701690e36ea7883b
SHA256fd5c6f5156fc30a56467902d5afba32b5102095a2b0b09da7187b76a10ebe3af
SHA512048dae201a85239610d8aa0303289ea3e1aa280688df2f772462d1713bc4224779c92696155dcd1628ca425832f22b43d0e4a5df76b7f6f68d2cf44f09859e2a
-
Filesize
152B
MD506660b044643b3e323eb87c9d52cfefd
SHA1771ce64a12fc955ac54f5f91f49ac2a2b0cacf73
SHA256c73e2335e1f5280603637a464faccbaaec44e9c943d16031c6b27cf07f5f7e64
SHA5120694bc0f3f3c2605458b3319314dd4341d562e864cdabf239d4f4d6147b7656bf736633c163bcd7623941a7d328f921f04ea04d5f1cc86a08e8b717b25ebed75
-
Filesize
152B
MD5d9b2e131bd22acc5f6915165aaafd79b
SHA18acfe3e5fdacc5195fa1dcdfd412f379559f964a
SHA25643532685e90b22a35b3b7f10acacbdd3a2c453e21119b86c425b08060fa17cfa
SHA5122acfb8015fd719a23be24bd0fbf0b2b74f4815d8f3d172316a530ce4d10aa433321cca935531ebad810c47f9aa4853237309641574a641ba948e1f88e13acb59
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
654B
MD52cbbb74b7da1f720b48ed31085cbd5b8
SHA179caa9a3ea8abe1b9c4326c3633da64a5f724964
SHA256e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3
SHA512ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9
-
Filesize
944B
MD505b3cd21c1ec02f04caba773186ee8d0
SHA139e790bfe10abf55b74dfb3603df8fcf6b5e6edb
SHA256911efc5cf9cbeb697543eb3242f5297e1be46dd6603a390140a9ff031ed9e1e8
SHA512e751008b032394817beb46937fd93a73be97254c2be94dd42f22fb1306d2715c653ece16fa96eab1a3e73811936768cea6b37888437086fc6f3e3e793a2515eb
-
Filesize
944B
MD58cb7f4b4ab204cacd1af6b29c2a2042c
SHA1244540c38e33eac05826d54282a0bfa60340d6a1
SHA2564994013dabe4f131d401879278eee147add6349124ea6452358dca7e2344c7a6
SHA5127651cb6863a425840db610253151e271d3e8da26a8c633ce484247266fa226792ecb84b9578df3ab17fef84a5dfcad417b63a7df59c9650a907e08d59b91dd6e
-
Filesize
944B
MD51189a72e42e2321edf1ed3a8d5568687
SHA1a2142fc754d6830de107d9d46f398483156f16a6
SHA256009aee0a5f2d25ed79160e75cde58722def11663334ed20283e3afca32f971ea
SHA512b1eb9b7aa7a57d0acec93b8152229b1f274a8d1b8f19133513486587f39b0636a9df89ddc6c2013e001d831f2b23cd0bb0fc084131824ea8e1dff134cd6d4f29
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82