Overview
overview
10Static
static
10Venom-Rat-...0.html
windows7-x64
1Venom-Rat-...0.html
windows10-2004-x64
1Venom-Rat-...0.html
windows7-x64
1Venom-Rat-...0.html
windows10-2004-x64
1Venom-Rat-...il.dll
windows7-x64
1Venom-Rat-...il.dll
windows10-2004-x64
1Venom-Rat-...at.dll
windows7-x64
1Venom-Rat-...at.dll
windows10-2004-x64
1Venom-Rat-...me.dll
windows7-x64
1Venom-Rat-...me.dll
windows10-2004-x64
1Venom-Rat-...ed.exe
windows7-x64
8Venom-Rat-...ed.exe
windows10-2004-x64
8Majid Z Hacker.exe
windows7-x64
8Majid Z Hacker.exe
windows10-2004-x64
8Majid Z Hacker.exe
windows7-x64
10Majid Z Hacker.exe
windows10-2004-x64
10Windows Program.exe
windows7-x64
7Windows Program.exe
windows10-2004-x64
7script.vbs
windows7-x64
10script.vbs
windows10-2004-x64
10windows registry.exe
windows7-x64
10windows registry.exe
windows10-2004-x64
10firewall.exe
windows7-x64
8firewall.exe
windows10-2004-x64
Venom Cracked.exe
windows7-x64
1Venom Cracked.exe
windows10-2004-x64
1Venom-Rat-...er.exe
windows7-x64
1Venom-Rat-...er.exe
windows10-2004-x64
1Venom-Rat-...ed.exe
windows7-x64
10Venom-Rat-...ed.exe
windows10-2004-x64
10Majid Z Ha...te.exe
windows7-x64
10Majid Z Ha...te.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 12:30
Behavioral task
behavioral1
Sample
Venom-Rat-Cracked--main/Clients/Morpheus@DESKTOP-ALON1A1_367DDFD/Logs/10-31-2020.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Venom-Rat-Cracked--main/Clients/Morpheus@DESKTOP-ALON1A1_367DDFD/Logs/10-31-2020.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Venom-Rat-Cracked--main/Clients/Sam@DESKTOP-1HP3JNB_440CF1F/Logs/05-17-2020.html
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Venom-Rat-Cracked--main/Clients/Sam@DESKTOP-1HP3JNB_440CF1F/Logs/05-17-2020.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Venom-Rat-Cracked--main/Mono.Cecil.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Venom-Rat-Cracked--main/Mono.Cecil.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
Venom-Rat-Cracked--main/Mono.Nat.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Venom-Rat-Cracked--main/Mono.Nat.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Venom-Rat-Cracked--main/VelyseTheme.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
Venom-Rat-Cracked--main/VelyseTheme.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Venom-Rat-Cracked--main/Venom Activated Cracked.exe
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
Venom-Rat-Cracked--main/Venom Activated Cracked.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Majid Z Hacker.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
Majid Z Hacker.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Majid Z Hacker.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
Majid Z Hacker.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Windows Program.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Windows Program.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
script.vbs
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
script.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
windows registry.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
windows registry.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
firewall.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
firewall.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
Venom Cracked.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Venom Cracked.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
Venom-Rat-Cracked--main/Venom Binder.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Venom-Rat-Cracked--main/Venom Binder.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Venom-Rat-Cracked--main/Venom Software RAT Activated Cracked.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Venom-Rat-Cracked--main/Venom Software RAT Activated Cracked.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
Majid Z Hacker Website.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
Majid Z Hacker Website.exe
Resource
win10v2004-20240508-en
General
-
Target
Majid Z Hacker Website.exe
-
Size
127KB
-
MD5
b4d0b69f3c391acca7128a66abd480f7
-
SHA1
8ccac1861f4c544c51a5c7d4a0fb32796ab30488
-
SHA256
349b87c3ebd55cab9daa375c468b62be416063af859a16bed78cf4bd06fb5c07
-
SHA512
9578df157aafc7740e12952d1abba08fa9e032fc73073e1787fffb7e24ce6963d98d7bdd4539297be0123626efdfccb63c7dea411d82ceef7bf6197ff2806ff1
-
SSDEEP
3072:iqRaMrUwmuvDWLcg0CmHmFXfy57jQtMrpGIXFb177dWVqu:inx1FWmxf87UIXpl7dWVR
Malware Config
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral32/files/0x000700000002341e-24.dat disable_win_def -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection WScript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" WScript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" WScript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" WScript.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 752 netsh.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Majid Z Hacker Website.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation windows.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation microsoft corporation.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows.exe windows.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows.exe windows.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e23fc64d012fb66b44b10cd7ea0e2414.exe microsoft corporation.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e23fc64d012fb66b44b10cd7ea0e2414.exe microsoft corporation.exe -
Executes dropped EXE 4 IoCs
pid Process 3860 microsoft corporation.exe 3760 windows.exe 3640 windows.exe 3240 microsoft corporation.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windows.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Updates\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Updates\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e23fc64d012fb66b44b10cd7ea0e2414 = "\"C:\\ProgramData\\microsoft corporation.exe\" .." microsoft corporation.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\e23fc64d012fb66b44b10cd7ea0e2414 = "\"C:\\ProgramData\\microsoft corporation.exe\" .." microsoft corporation.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windows.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Users\\Admin\\AppData\\Local\\Temp\\windows.exe" windows.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf windows.exe File opened for modification C:\autorun.inf windows.exe File created F:\autorun.inf windows.exe File opened for modification F:\autorun.inf windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings Majid Z Hacker Website.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 4028 powershell.exe 4028 powershell.exe 2368 powershell.exe 2368 powershell.exe 1080 powershell.exe 1080 powershell.exe 3684 powershell.exe 3684 powershell.exe 4508 powershell.exe 4508 powershell.exe 5104 powershell.exe 5104 powershell.exe 2736 powershell.exe 2736 powershell.exe 4620 powershell.exe 4620 powershell.exe 3272 powershell.exe 3272 powershell.exe 4228 powershell.exe 4228 powershell.exe 4028 powershell.exe 4028 powershell.exe 1080 powershell.exe 5104 powershell.exe 4508 powershell.exe 5112 powershell.exe 5112 powershell.exe 3684 powershell.exe 2368 powershell.exe 4228 powershell.exe 5112 powershell.exe 4620 powershell.exe 3272 powershell.exe 3860 microsoft corporation.exe 3860 microsoft corporation.exe 2736 powershell.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
description pid Process Token: SeDebugPrivilege 1080 powershell.exe Token: SeDebugPrivilege 4028 powershell.exe Token: SeDebugPrivilege 2368 powershell.exe Token: SeDebugPrivilege 3684 powershell.exe Token: SeDebugPrivilege 5104 powershell.exe Token: SeDebugPrivilege 4508 powershell.exe Token: SeDebugPrivilege 4228 powershell.exe Token: SeDebugPrivilege 2736 powershell.exe Token: SeDebugPrivilege 4620 powershell.exe Token: SeDebugPrivilege 3272 powershell.exe Token: SeDebugPrivilege 5112 powershell.exe Token: SeDebugPrivilege 3860 microsoft corporation.exe Token: SeDebugPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe Token: 33 3240 microsoft corporation.exe Token: SeIncBasePriorityPrivilege 3240 microsoft corporation.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3760 windows.exe 3640 windows.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3760 windows.exe 3640 windows.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1616 wrote to memory of 3860 1616 Majid Z Hacker Website.exe 83 PID 1616 wrote to memory of 3860 1616 Majid Z Hacker Website.exe 83 PID 1616 wrote to memory of 3860 1616 Majid Z Hacker Website.exe 83 PID 1616 wrote to memory of 3760 1616 Majid Z Hacker Website.exe 84 PID 1616 wrote to memory of 3760 1616 Majid Z Hacker Website.exe 84 PID 1616 wrote to memory of 436 1616 Majid Z Hacker Website.exe 85 PID 1616 wrote to memory of 436 1616 Majid Z Hacker Website.exe 85 PID 1616 wrote to memory of 436 1616 Majid Z Hacker Website.exe 85 PID 436 wrote to memory of 1572 436 WScript.exe 86 PID 436 wrote to memory of 1572 436 WScript.exe 86 PID 436 wrote to memory of 1572 436 WScript.exe 86 PID 1572 wrote to memory of 1080 1572 WScript.exe 87 PID 1572 wrote to memory of 1080 1572 WScript.exe 87 PID 1572 wrote to memory of 1080 1572 WScript.exe 87 PID 1572 wrote to memory of 4028 1572 WScript.exe 89 PID 1572 wrote to memory of 4028 1572 WScript.exe 89 PID 1572 wrote to memory of 4028 1572 WScript.exe 89 PID 1572 wrote to memory of 2368 1572 WScript.exe 91 PID 1572 wrote to memory of 2368 1572 WScript.exe 91 PID 1572 wrote to memory of 2368 1572 WScript.exe 91 PID 1572 wrote to memory of 3684 1572 WScript.exe 93 PID 1572 wrote to memory of 3684 1572 WScript.exe 93 PID 1572 wrote to memory of 3684 1572 WScript.exe 93 PID 1572 wrote to memory of 5104 1572 WScript.exe 95 PID 1572 wrote to memory of 5104 1572 WScript.exe 95 PID 1572 wrote to memory of 5104 1572 WScript.exe 95 PID 1572 wrote to memory of 2736 1572 WScript.exe 97 PID 1572 wrote to memory of 2736 1572 WScript.exe 97 PID 1572 wrote to memory of 2736 1572 WScript.exe 97 PID 1572 wrote to memory of 4228 1572 WScript.exe 99 PID 1572 wrote to memory of 4228 1572 WScript.exe 99 PID 1572 wrote to memory of 4228 1572 WScript.exe 99 PID 1572 wrote to memory of 4508 1572 WScript.exe 101 PID 1572 wrote to memory of 4508 1572 WScript.exe 101 PID 1572 wrote to memory of 4508 1572 WScript.exe 101 PID 1572 wrote to memory of 4620 1572 WScript.exe 103 PID 1572 wrote to memory of 4620 1572 WScript.exe 103 PID 1572 wrote to memory of 4620 1572 WScript.exe 103 PID 1572 wrote to memory of 3272 1572 WScript.exe 104 PID 1572 wrote to memory of 3272 1572 WScript.exe 104 PID 1572 wrote to memory of 3272 1572 WScript.exe 104 PID 1572 wrote to memory of 5112 1572 WScript.exe 106 PID 1572 wrote to memory of 5112 1572 WScript.exe 106 PID 1572 wrote to memory of 5112 1572 WScript.exe 106 PID 3760 wrote to memory of 3640 3760 windows.exe 109 PID 3760 wrote to memory of 3640 3760 windows.exe 109 PID 3860 wrote to memory of 3240 3860 microsoft corporation.exe 110 PID 3860 wrote to memory of 3240 3860 microsoft corporation.exe 110 PID 3860 wrote to memory of 3240 3860 microsoft corporation.exe 110 PID 3240 wrote to memory of 752 3240 microsoft corporation.exe 118 PID 3240 wrote to memory of 752 3240 microsoft corporation.exe 118 PID 3240 wrote to memory of 752 3240 microsoft corporation.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker Website.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker Website.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\microsoft corporation.exe"C:\Users\Admin\AppData\Local\Temp\microsoft corporation.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\ProgramData\microsoft corporation.exe"C:\ProgramData\microsoft corporation.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\ProgramData\microsoft corporation.exe" "microsoft corporation.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:752
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\windows.exe"C:\Users\Admin\AppData\Local\Temp\windows.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Roaming\Adobe\Updates\windows.exe"C:\Users\Admin\AppData\Roaming\Adobe\Updates\windows.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops autorun.inf file
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3640
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\script.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\SysWOW64\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\script.vbs" /elevate3⤵
- Modifies Windows Defender Real-time Protection settings
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $true4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBehaviorMonitoring $true4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5104
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 24⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 04⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 64⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 64⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3272
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 64⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
860B
MD5c2dda6a07b935260fea374312f09cc1e
SHA1a0af418e7dc2b37f7b7712f1f866b6a8fb425f0a
SHA256e514619232e5f2a698f3e9bccdcff8b511ec262c562dc42926d00860bee769b4
SHA5127268d562f3c33ea05cd772e5c05d3819d7c6c42bf5bc33649c8c70d5a9fd3f9110aea4c8c8ebf7383525a480fc0fc4f92a65746ef267329e3806480410b05100
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD55905cb0e406e0e34449a81bcdc9731d1
SHA1578b42f61f8b1bca40cacd8dc25a1f62648ae4ac
SHA2568ec71e1dbf609709ab530ec6778ce1c47b6814a7ee081db81969ed68fb3ea7a9
SHA512f220af1635cfefb61742c2ecdec22debb87b494d2d6f9f720f7cf0f3cf29919bc336f838e41b963f69ae85361a49960370550ff968a81d72224fa4428c242cec
-
Filesize
18KB
MD54522f098f6db1933f417365e18363e39
SHA1eeb2c0c4227c3505c88f28961feebc75e74bda27
SHA256ced1a391ec68da29459dd4e9dc62b3534a37ec3c235e0753c4139fccd9a2751f
SHA5125497f7feba87fc4a05df5bc7c9fc604fab12f2731c9e6da2461f0d49134f64da6b607c8791b17c112aa84fc8cb85fdc49856217568c382af000075920bc31826
-
Filesize
18KB
MD58848bcccbfd0c7a301ce895f25d09838
SHA1b8045cf49df7f6aea86fd5a6e7bc57bca722706f
SHA25681df5c3e36a7cd874ae9a09f31de01a748cc6d9897e0375471d75f992bf91987
SHA512f179e7291d2aad739a7e4d665aaec508252229a6d08490ef3c5be672721ad0c8187f399ea9f804ffd37a4b3e42d3a052e9da3ff439d368a46f0fcf1f5372420f
-
Filesize
18KB
MD573dd75799de2b342a1df2dfc6a54319b
SHA1d8b2bbf143aa4e783cac26f0733e958bd0ee22a6
SHA256360748c5136395ae45195c8c1b756bf56aa09a928c12870c41d06e52d2ddfde3
SHA5128ec1d0858624a5bf6db6aee06ad1acdd850333990414497c4c88483090b67a35d9d53afd693ec1dd1966adaa09638f93f5a7a8faa5516ef1b44ffdd0975c1298
-
Filesize
18KB
MD5a123815f5b1ac24f83a6429a0877b435
SHA14d2ea47ee5022e7d5861688ad4e0791807f46db2
SHA256af7d1785013f2778adf581b2f6e4f17a9cdfee6b3242ef2c2e1b71cceaedda60
SHA512bb590cbd632eb8ef7ee83b2388bb6721c5f79088c6e03e6cb45553ba3bed38823623ef9df99da3e0b50fd1e60192173a9c34b9507b052f6dc98ca697b2e89f00
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
45B
MD5c65dda57254957c2ad83b548c55b42a5
SHA1d88daf5dd37726325a30a3078c254128f5579f85
SHA256adae127291a1d4f70e9ff1258044a01d95176fd9bb2c303ab94f3e62db429a44
SHA512d74c977dd16046f024a6b012322dcfd0380fcc58a5db5e96d350852723bc1404d49a67d6185210711a24b9aeb94974212f4e056590e0742937821a459ba628b6
-
Filesize
33KB
MD523fb3146d1455b890afdbd9511b48351
SHA19e0118366167c76de2d88fb354606d5e58677eb7
SHA25658c8e3599d16762dfc51decf16c3d014cd8c8dd1aab59a0acff5372c5182bda7
SHA51292a816b16f854cb19a28a9bd186223dd3f7961800b6486b32be1f270b26a0240c0f68ebe0f6c555b72f0e3388f3aa1a061fad50c0b09aaec1af9de1185fc8cf4
-
Filesize
1KB
MD577a4da4863ffcaba51ce05d3c632158d
SHA1253f9a594a6ca3a7a23acb90f8dc81939215ba4b
SHA256ecd586281fc4655e40108fcf118beeae3411c1c1176951a763e47fb66d2e421f
SHA512ba215fa65a011f5841f5e92b4053895c13368e894817551a982ca3e821726b8bbb13616bca8781fed08f4c83528d0d3ac233fa1f3e14ad4253fdefd9a22253cf
-
Filesize
145KB
MD5aa4ba7df205e6f0dc8d847ab3c3681c2
SHA1bb8c96c2f736f1d5f1923fc3b20f53b890b98e46
SHA25659a0bd599e306457164b08b7fe23bbf4fe92b202beaad836d6faa28da61073ca
SHA5120f8f57de1251e3102d1db2c72ed7c3f7cc1d12c3ce561a275d4d280944f77952970464c553da3ce6ce88e9462033818ed186e83eba1b8853d16d28bcc7140450