Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2024, 18:34

General

  • Target

    PK SEARCH 1.2.exe

  • Size

    8.3MB

  • MD5

    af1683832f44bb89893c189f94786304

  • SHA1

    ea14d8ce6acdbc76a3612e4576831c483ffda674

  • SHA256

    30ec0a2d9d0564bb7596326733902c73b69c5ab3572a84e1c077c680372f2cc3

  • SHA512

    a4c375a7e68c1b92d28996916257cc3088288fec44f42b6442dfd16b70c91960d976599d02710640260dd3dd8b12c37444b3ef3584938b0caf36a61b676427ae

  • SSDEEP

    196608:Fb8a9BzzLO6QTKsk7asm10p50wcYkOnQsG22INZBM:Fb8SBTO6iKsk7tmep50wr6wNfM

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

pksearch

C2

186.26.107.205:4400

Mutex

zifbymzliwgywfwv

Attributes
  • delay

    1

  • install

    true

  • install_file

    PK SEARCH.exe

  • install_folder

    %Temp%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Executes dropped EXE 61 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 61 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
    "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2168
    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
        "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2688
      • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
        "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2796
        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1928
        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2864
          • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
            "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3020
          • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
            "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2260
            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2740
            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:380
              • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:852
              • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:776
                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:748
                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1620
                  • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                    "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1608
                  • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                    "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                    9⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1132
                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2708
                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                      10⤵
                      • Suspicious use of WriteProcessMemory
                      PID:752
                      • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                        "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2408
                      • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                        "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                        11⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1740
                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                          12⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2884
                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                          12⤵
                            PID:2452
                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                              13⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2272
                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                              13⤵
                                PID:2068
                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                  14⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2236
                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                  14⤵
                                    PID:1592
                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                      15⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3036
                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                      15⤵
                                        PID:2492
                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                          16⤵
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2744
                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                          16⤵
                                            PID:1900
                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                              17⤵
                                              • Executes dropped EXE
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1244
                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                              17⤵
                                                PID:1392
                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                  18⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1312
                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                  18⤵
                                                    PID:1708
                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                      19⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2000
                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                      19⤵
                                                        PID:1664
                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                          20⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1328
                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                          20⤵
                                                            PID:1784
                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                              21⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2392
                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                              21⤵
                                                                PID:1720
                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                  22⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2124
                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                  22⤵
                                                                    PID:1836
                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                      23⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2040
                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                      23⤵
                                                                        PID:1372
                                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                          24⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:2976
                                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                          24⤵
                                                                            PID:2440
                                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                              25⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:2820
                                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                              25⤵
                                                                                PID:1500
                                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                  26⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:2260
                                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                  26⤵
                                                                                    PID:296
                                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                      27⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:536
                                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                      27⤵
                                                                                        PID:760
                                                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                          28⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:1084
                                                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                          28⤵
                                                                                            PID:1220
                                                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                              29⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:1528
                                                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                              29⤵
                                                                                                PID:948
                                                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                  30⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:1664
                                                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                  30⤵
                                                                                                    PID:2316
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                      31⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:1696
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                      31⤵
                                                                                                        PID:1540
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                          32⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2464
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                          32⤵
                                                                                                            PID:2896
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                              33⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:2732
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                              33⤵
                                                                                                                PID:2640
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                  34⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:1360
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                  34⤵
                                                                                                                    PID:3024
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                      35⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:1552
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                      35⤵
                                                                                                                        PID:2568
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                          36⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:1500
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                          36⤵
                                                                                                                            PID:2104
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                              37⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              PID:828
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                              37⤵
                                                                                                                                PID:2056
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                  38⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                  PID:2436
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                  38⤵
                                                                                                                                    PID:580
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                      39⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                      PID:1804
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                      39⤵
                                                                                                                                        PID:1820
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                          40⤵
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:2308
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                          40⤵
                                                                                                                                            PID:948
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                              41⤵
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                              PID:2192
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                              41⤵
                                                                                                                                                PID:316
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                  42⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                  PID:2356
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                  42⤵
                                                                                                                                                    PID:1544
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                      43⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                      PID:1740
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                      43⤵
                                                                                                                                                        PID:2728
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                          44⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                          PID:2876
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                          44⤵
                                                                                                                                                            PID:2800
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                              45⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                              PID:2840
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                              45⤵
                                                                                                                                                                PID:1108
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                                  46⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                  PID:1976
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                                  46⤵
                                                                                                                                                                    PID:2980
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                                      47⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                      PID:684
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                                      47⤵
                                                                                                                                                                        PID:2092
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                                          48⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                          PID:828
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                                          48⤵
                                                                                                                                                                            PID:1680
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                                              49⤵
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                              PID:1604
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                                              49⤵
                                                                                                                                                                                PID:1968
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                                                  50⤵
                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                  PID:1860
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                                                  50⤵
                                                                                                                                                                                    PID:2320
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                                                      51⤵
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                      PID:1328
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                                                      51⤵
                                                                                                                                                                                        PID:2308
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                                                          52⤵
                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                          PID:1692
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                                                          52⤵
                                                                                                                                                                                            PID:2848
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                                                              53⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                              PID:2684
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                                                              53⤵
                                                                                                                                                                                                PID:2644
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                                                                  54⤵
                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                  PID:2664
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                                                                  54⤵
                                                                                                                                                                                                    PID:2068
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                                                                      55⤵
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                      PID:2900
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                                                                      55⤵
                                                                                                                                                                                                        PID:2852
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                                                                          56⤵
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                          PID:2492
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                                                                          56⤵
                                                                                                                                                                                                            PID:1652
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                                                                              57⤵
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                              PID:2812
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                                                                              57⤵
                                                                                                                                                                                                                PID:2744
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                                                                                  58⤵
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                  PID:2328
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                                                                                  58⤵
                                                                                                                                                                                                                    PID:1776
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                                                                                      59⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                      PID:2104
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                                                                                      59⤵
                                                                                                                                                                                                                        PID:1616
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                                                                                          60⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:1584
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                                                                                          60⤵
                                                                                                                                                                                                                            PID:1528
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                                                                                              61⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                              PID:892
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                                                                                              61⤵
                                                                                                                                                                                                                                PID:2384
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                                                                                                  62⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                  PID:2948
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\PK SEARCH 1.2.exe"
                                                                                                                                                                                                                                  62⤵
                                                                                                                                                                                                                                    PID:1700
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe"
                                                                                                                                                                                                                                      63⤵
                                                                                                                                                                                                                                        PID:1784

                                                                                                          Network

                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                          Replay Monitor

                                                                                                          Loading Replay Monitor...

                                                                                                          Downloads

                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                                                                            Filesize

                                                                                                            70KB

                                                                                                            MD5

                                                                                                            49aebf8cbd62d92ac215b2923fb1b9f5

                                                                                                            SHA1

                                                                                                            1723be06719828dda65ad804298d0431f6aff976

                                                                                                            SHA256

                                                                                                            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                                                            SHA512

                                                                                                            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\PK SEARCH.exe

                                                                                                            Filesize

                                                                                                            74KB

                                                                                                            MD5

                                                                                                            01e77a0b330b7432c5ab92a199c9255a

                                                                                                            SHA1

                                                                                                            35b532360acb7d7caacb168033f598843f05dc5a

                                                                                                            SHA256

                                                                                                            c4ed073ef70f66ad998f88bbb06f376bd5a99ec850c9f6550f258fe295de1730

                                                                                                            SHA512

                                                                                                            48aecc2f00d682efa79e8d717302fa621b1bdc01cc3917ad1e30e4d28de610f5debb96e5dfdda5c517d0625daf0d69744f4108df20421ba66f4a55f27c475103

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Tar50D5.tmp

                                                                                                            Filesize

                                                                                                            181KB

                                                                                                            MD5

                                                                                                            4ea6026cf93ec6338144661bf1202cd1

                                                                                                            SHA1

                                                                                                            a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                                                            SHA256

                                                                                                            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                                                            SHA512

                                                                                                            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                                                          • C:\Users\Admin\AppData\Roaming\MyData\DataLogs.conf

                                                                                                            Filesize

                                                                                                            8B

                                                                                                            MD5

                                                                                                            cf759e4c5f14fe3eec41b87ed756cea8

                                                                                                            SHA1

                                                                                                            c27c796bb3c2fac929359563676f4ba1ffada1f5

                                                                                                            SHA256

                                                                                                            c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761

                                                                                                            SHA512

                                                                                                            c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b

                                                                                                          • memory/2168-7-0x00000000002F0000-0x0000000000308000-memory.dmp

                                                                                                            Filesize

                                                                                                            96KB

                                                                                                          • memory/2168-12-0x000007FEF55D0000-0x000007FEF5FBC000-memory.dmp

                                                                                                            Filesize

                                                                                                            9.9MB

                                                                                                          • memory/2168-9-0x000007FEF55D0000-0x000007FEF5FBC000-memory.dmp

                                                                                                            Filesize

                                                                                                            9.9MB

                                                                                                          • memory/2168-99-0x000007FEF55D0000-0x000007FEF5FBC000-memory.dmp

                                                                                                            Filesize

                                                                                                            9.9MB

                                                                                                          • memory/2168-121-0x000007FEF55D0000-0x000007FEF5FBC000-memory.dmp

                                                                                                            Filesize

                                                                                                            9.9MB

                                                                                                          • memory/3068-11-0x000007FEF55D0000-0x000007FEF5FBC000-memory.dmp

                                                                                                            Filesize

                                                                                                            9.9MB

                                                                                                          • memory/3068-8-0x000007FEF55D0000-0x000007FEF5FBC000-memory.dmp

                                                                                                            Filesize

                                                                                                            9.9MB

                                                                                                          • memory/3068-0-0x000007FEF55D3000-0x000007FEF55D4000-memory.dmp

                                                                                                            Filesize

                                                                                                            4KB

                                                                                                          • memory/3068-1-0x000000013FB20000-0x0000000140378000-memory.dmp

                                                                                                            Filesize

                                                                                                            8.3MB