Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
PK SEARCH 1.2.exe
Resource
win7-20240508-en
General
-
Target
PK SEARCH 1.2.exe
-
Size
8.3MB
-
MD5
af1683832f44bb89893c189f94786304
-
SHA1
ea14d8ce6acdbc76a3612e4576831c483ffda674
-
SHA256
30ec0a2d9d0564bb7596326733902c73b69c5ab3572a84e1c077c680372f2cc3
-
SHA512
a4c375a7e68c1b92d28996916257cc3088288fec44f42b6442dfd16b70c91960d976599d02710640260dd3dd8b12c37444b3ef3584938b0caf36a61b676427ae
-
SSDEEP
196608:Fb8a9BzzLO6QTKsk7asm10p50wcYkOnQsG22INZBM:Fb8SBTO6iKsk7tmep50wr6wNfM
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
pksearch
186.26.107.205:4400
zifbymzliwgywfwv
-
delay
1
-
install
true
-
install_file
PK SEARCH.exe
-
install_folder
%Temp%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000a0000000122ec-5.dat family_asyncrat -
Executes dropped EXE 61 IoCs
pid Process 2168 PK SEARCH.exe 2688 PK SEARCH.exe 1928 PK SEARCH.exe 3020 PK SEARCH.exe 2740 PK SEARCH.exe 852 PK SEARCH.exe 748 PK SEARCH.exe 1608 PK SEARCH.exe 2708 PK SEARCH.exe 2408 PK SEARCH.exe 2884 PK SEARCH.exe 2272 PK SEARCH.exe 2236 PK SEARCH.exe 3036 PK SEARCH.exe 2744 PK SEARCH.exe 1244 PK SEARCH.exe 1312 PK SEARCH.exe 2000 PK SEARCH.exe 1328 PK SEARCH.exe 2392 PK SEARCH.exe 2124 PK SEARCH.exe 2040 PK SEARCH.exe 2976 PK SEARCH.exe 2820 PK SEARCH.exe 2260 PK SEARCH.exe 536 PK SEARCH.exe 1084 PK SEARCH.exe 1528 PK SEARCH.exe 1664 PK SEARCH.exe 1696 PK SEARCH.exe 2464 PK SEARCH.exe 2732 PK SEARCH.exe 1360 PK SEARCH.exe 1552 PK SEARCH.exe 1500 PK SEARCH.exe 828 PK SEARCH.exe 2436 PK SEARCH.exe 1804 PK SEARCH.exe 2308 PK SEARCH.exe 2192 PK SEARCH.exe 2356 PK SEARCH.exe 1740 PK SEARCH.exe 2876 PK SEARCH.exe 2840 PK SEARCH.exe 1976 PK SEARCH.exe 684 PK SEARCH.exe 828 PK SEARCH.exe 1604 PK SEARCH.exe 1860 PK SEARCH.exe 1328 PK SEARCH.exe 1692 PK SEARCH.exe 2684 PK SEARCH.exe 2664 PK SEARCH.exe 2900 PK SEARCH.exe 2492 PK SEARCH.exe 2812 PK SEARCH.exe 2328 PK SEARCH.exe 2104 PK SEARCH.exe 1584 PK SEARCH.exe 892 PK SEARCH.exe 2948 PK SEARCH.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe 2168 PK SEARCH.exe -
Suspicious use of AdjustPrivilegeToken 61 IoCs
description pid Process Token: SeDebugPrivilege 2168 PK SEARCH.exe Token: SeDebugPrivilege 2688 PK SEARCH.exe Token: SeDebugPrivilege 1928 PK SEARCH.exe Token: SeDebugPrivilege 3020 PK SEARCH.exe Token: SeDebugPrivilege 2740 PK SEARCH.exe Token: SeDebugPrivilege 852 PK SEARCH.exe Token: SeDebugPrivilege 748 PK SEARCH.exe Token: SeDebugPrivilege 1608 PK SEARCH.exe Token: SeDebugPrivilege 2708 PK SEARCH.exe Token: SeDebugPrivilege 2408 PK SEARCH.exe Token: SeDebugPrivilege 2884 PK SEARCH.exe Token: SeDebugPrivilege 2272 PK SEARCH.exe Token: SeDebugPrivilege 2236 PK SEARCH.exe Token: SeDebugPrivilege 3036 PK SEARCH.exe Token: SeDebugPrivilege 2744 PK SEARCH.exe Token: SeDebugPrivilege 1244 PK SEARCH.exe Token: SeDebugPrivilege 1312 PK SEARCH.exe Token: SeDebugPrivilege 2000 PK SEARCH.exe Token: SeDebugPrivilege 1328 PK SEARCH.exe Token: SeDebugPrivilege 2392 PK SEARCH.exe Token: SeDebugPrivilege 2124 PK SEARCH.exe Token: SeDebugPrivilege 2040 PK SEARCH.exe Token: SeDebugPrivilege 2976 PK SEARCH.exe Token: SeDebugPrivilege 2820 PK SEARCH.exe Token: SeDebugPrivilege 2260 PK SEARCH.exe Token: SeDebugPrivilege 536 PK SEARCH.exe Token: SeDebugPrivilege 1084 PK SEARCH.exe Token: SeDebugPrivilege 1528 PK SEARCH.exe Token: SeDebugPrivilege 1664 PK SEARCH.exe Token: SeDebugPrivilege 1696 PK SEARCH.exe Token: SeDebugPrivilege 2464 PK SEARCH.exe Token: SeDebugPrivilege 2732 PK SEARCH.exe Token: SeDebugPrivilege 1360 PK SEARCH.exe Token: SeDebugPrivilege 1552 PK SEARCH.exe Token: SeDebugPrivilege 1500 PK SEARCH.exe Token: SeDebugPrivilege 828 PK SEARCH.exe Token: SeDebugPrivilege 2436 PK SEARCH.exe Token: SeDebugPrivilege 1804 PK SEARCH.exe Token: SeDebugPrivilege 2308 PK SEARCH.exe Token: SeDebugPrivilege 2192 PK SEARCH.exe Token: SeDebugPrivilege 2356 PK SEARCH.exe Token: SeDebugPrivilege 1740 PK SEARCH.exe Token: SeDebugPrivilege 2876 PK SEARCH.exe Token: SeDebugPrivilege 2840 PK SEARCH.exe Token: SeDebugPrivilege 1976 PK SEARCH.exe Token: SeDebugPrivilege 684 PK SEARCH.exe Token: SeDebugPrivilege 828 PK SEARCH.exe Token: SeDebugPrivilege 1604 PK SEARCH.exe Token: SeDebugPrivilege 1860 PK SEARCH.exe Token: SeDebugPrivilege 1328 PK SEARCH.exe Token: SeDebugPrivilege 1692 PK SEARCH.exe Token: SeDebugPrivilege 2684 PK SEARCH.exe Token: SeDebugPrivilege 2664 PK SEARCH.exe Token: SeDebugPrivilege 2900 PK SEARCH.exe Token: SeDebugPrivilege 2492 PK SEARCH.exe Token: SeDebugPrivilege 2812 PK SEARCH.exe Token: SeDebugPrivilege 2328 PK SEARCH.exe Token: SeDebugPrivilege 2104 PK SEARCH.exe Token: SeDebugPrivilege 1584 PK SEARCH.exe Token: SeDebugPrivilege 892 PK SEARCH.exe Token: SeDebugPrivilege 2948 PK SEARCH.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2168 PK SEARCH.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2168 3068 PK SEARCH 1.2.exe 28 PID 3068 wrote to memory of 2168 3068 PK SEARCH 1.2.exe 28 PID 3068 wrote to memory of 2168 3068 PK SEARCH 1.2.exe 28 PID 3068 wrote to memory of 2040 3068 PK SEARCH 1.2.exe 29 PID 3068 wrote to memory of 2040 3068 PK SEARCH 1.2.exe 29 PID 3068 wrote to memory of 2040 3068 PK SEARCH 1.2.exe 29 PID 2040 wrote to memory of 2688 2040 PK SEARCH 1.2.exe 30 PID 2040 wrote to memory of 2688 2040 PK SEARCH 1.2.exe 30 PID 2040 wrote to memory of 2688 2040 PK SEARCH 1.2.exe 30 PID 2040 wrote to memory of 2796 2040 PK SEARCH 1.2.exe 31 PID 2040 wrote to memory of 2796 2040 PK SEARCH 1.2.exe 31 PID 2040 wrote to memory of 2796 2040 PK SEARCH 1.2.exe 31 PID 2796 wrote to memory of 1928 2796 PK SEARCH 1.2.exe 33 PID 2796 wrote to memory of 1928 2796 PK SEARCH 1.2.exe 33 PID 2796 wrote to memory of 1928 2796 PK SEARCH 1.2.exe 33 PID 2796 wrote to memory of 2864 2796 PK SEARCH 1.2.exe 34 PID 2796 wrote to memory of 2864 2796 PK SEARCH 1.2.exe 34 PID 2796 wrote to memory of 2864 2796 PK SEARCH 1.2.exe 34 PID 2864 wrote to memory of 3020 2864 PK SEARCH 1.2.exe 35 PID 2864 wrote to memory of 3020 2864 PK SEARCH 1.2.exe 35 PID 2864 wrote to memory of 3020 2864 PK SEARCH 1.2.exe 35 PID 2864 wrote to memory of 2260 2864 PK SEARCH 1.2.exe 36 PID 2864 wrote to memory of 2260 2864 PK SEARCH 1.2.exe 36 PID 2864 wrote to memory of 2260 2864 PK SEARCH 1.2.exe 36 PID 2260 wrote to memory of 2740 2260 PK SEARCH 1.2.exe 37 PID 2260 wrote to memory of 2740 2260 PK SEARCH 1.2.exe 37 PID 2260 wrote to memory of 2740 2260 PK SEARCH 1.2.exe 37 PID 2260 wrote to memory of 380 2260 PK SEARCH 1.2.exe 38 PID 2260 wrote to memory of 380 2260 PK SEARCH 1.2.exe 38 PID 2260 wrote to memory of 380 2260 PK SEARCH 1.2.exe 38 PID 380 wrote to memory of 852 380 PK SEARCH 1.2.exe 39 PID 380 wrote to memory of 852 380 PK SEARCH 1.2.exe 39 PID 380 wrote to memory of 852 380 PK SEARCH 1.2.exe 39 PID 380 wrote to memory of 776 380 PK SEARCH 1.2.exe 40 PID 380 wrote to memory of 776 380 PK SEARCH 1.2.exe 40 PID 380 wrote to memory of 776 380 PK SEARCH 1.2.exe 40 PID 776 wrote to memory of 748 776 PK SEARCH 1.2.exe 41 PID 776 wrote to memory of 748 776 PK SEARCH 1.2.exe 41 PID 776 wrote to memory of 748 776 PK SEARCH 1.2.exe 41 PID 776 wrote to memory of 1620 776 PK SEARCH 1.2.exe 42 PID 776 wrote to memory of 1620 776 PK SEARCH 1.2.exe 42 PID 776 wrote to memory of 1620 776 PK SEARCH 1.2.exe 42 PID 1620 wrote to memory of 1608 1620 PK SEARCH 1.2.exe 43 PID 1620 wrote to memory of 1608 1620 PK SEARCH 1.2.exe 43 PID 1620 wrote to memory of 1608 1620 PK SEARCH 1.2.exe 43 PID 1620 wrote to memory of 1132 1620 PK SEARCH 1.2.exe 44 PID 1620 wrote to memory of 1132 1620 PK SEARCH 1.2.exe 44 PID 1620 wrote to memory of 1132 1620 PK SEARCH 1.2.exe 44 PID 1132 wrote to memory of 2708 1132 PK SEARCH 1.2.exe 45 PID 1132 wrote to memory of 2708 1132 PK SEARCH 1.2.exe 45 PID 1132 wrote to memory of 2708 1132 PK SEARCH 1.2.exe 45 PID 1132 wrote to memory of 752 1132 PK SEARCH 1.2.exe 46 PID 1132 wrote to memory of 752 1132 PK SEARCH 1.2.exe 46 PID 1132 wrote to memory of 752 1132 PK SEARCH 1.2.exe 46 PID 752 wrote to memory of 2408 752 PK SEARCH 1.2.exe 47 PID 752 wrote to memory of 2408 752 PK SEARCH 1.2.exe 47 PID 752 wrote to memory of 2408 752 PK SEARCH 1.2.exe 47 PID 752 wrote to memory of 1740 752 PK SEARCH 1.2.exe 48 PID 752 wrote to memory of 1740 752 PK SEARCH 1.2.exe 48 PID 752 wrote to memory of 1740 752 PK SEARCH 1.2.exe 48 PID 1740 wrote to memory of 2884 1740 PK SEARCH 1.2.exe 49 PID 1740 wrote to memory of 2884 1740 PK SEARCH 1.2.exe 49 PID 1740 wrote to memory of 2884 1740 PK SEARCH 1.2.exe 49 PID 1740 wrote to memory of 2452 1740 PK SEARCH 1.2.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2168
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"7⤵
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:748
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"8⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"9⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"10⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"11⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"12⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"13⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"14⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"15⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"15⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"16⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"17⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"18⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"19⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"19⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1328
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"20⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"21⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"21⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"22⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"23⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"24⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"24⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"25⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"25⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"26⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"26⤵PID:296
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"27⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"27⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"28⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"29⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"29⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"30⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"30⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"31⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"31⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"32⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"32⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"33⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"33⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"34⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"35⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"35⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"36⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"37⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:828
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"37⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"38⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"39⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"39⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"40⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"41⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"41⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"42⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"43⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"44⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"45⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"45⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"46⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"47⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:684
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"47⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"48⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:828
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"48⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"49⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"49⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"50⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"50⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"51⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1328
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"51⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"52⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"52⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"53⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"53⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"54⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"55⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"55⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"56⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"57⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"57⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"58⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"59⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"59⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"60⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"61⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"61⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"62⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"63⤵PID:1784
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
74KB
MD501e77a0b330b7432c5ab92a199c9255a
SHA135b532360acb7d7caacb168033f598843f05dc5a
SHA256c4ed073ef70f66ad998f88bbb06f376bd5a99ec850c9f6550f258fe295de1730
SHA51248aecc2f00d682efa79e8d717302fa621b1bdc01cc3917ad1e30e4d28de610f5debb96e5dfdda5c517d0625daf0d69744f4108df20421ba66f4a55f27c475103
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b