Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    03-06-2024 07:29

General

  • Target

    4363463463464363463463463.exe

  • Size

    10KB

  • MD5

    2a94f3960c58c6e70826495f76d00b85

  • SHA1

    e2a1a5641295f5ebf01a37ac1c170ac0814bb71a

  • SHA256

    2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce

  • SHA512

    fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f

  • SSDEEP

    192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Family

phorphiex

C2

http://185.215.113.66/

http://5.42.96.117/

http://91.202.233.141/

Wallets

0xCa90599132C4D88907Bd8E046540284aa468a035

TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6

qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r

XryzFMFVpDUvU7famUGf214EXD3xNUSmQf

LLeT2zkStY3cvxMBFhoWXkG5VuZPoezduv

rwc4LVd9ABpULQ1CuCpDkgX2xVB1fUijyb

48jYpFT6bT8MTeph7VsyzCQeDsGHqdQNc2kUkRFJPzfRHHjarBvBtudPUtParMkDzZbYBrd3yntWBQcsnVBNeeMbN9EXifg

15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC

17hgMFyLDwMjxWqw5GhijhnPdJDyFDqecY

ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp

3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc

3FerB8kUraAVGCVCNkgv57zTBjUGjAUkU3

DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA

t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh

stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj

bnb1epx67ne4vckqmaj4gwke8m322f4yjr6eh52wqw

bc1qmpkehfffkr6phuklsksnd7nhgx0369sxu772m3

bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r

GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3

Attributes
  • mutex

    plo7udsa2s

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36

Extracted

Family

xworm

C2

127.0.0.1:7000

beshomandotestbesnd.run.place:7000

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    cmd.exe

  • telegram

    https://api.telegram.org/bot2128988424:AAEkYnwvOQA95riqRZwlqBxg4GV-odRNOyo/sendMessage?chat_id=966649672

Extracted

Family

gcleaner

C2

185.172.128.90

185.172.128.69

Attributes
  • url_path

    /advdlc.php

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect Xworm Payload 5 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Modifies security service 2 TTPs 1 IoCs
  • Phorphiex payload 1 IoCs
  • Phorphiex, Phorpiex

    Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Windows security bypass 2 TTPs 6 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Drops startup file 2 IoCs
  • Executes dropped EXE 16 IoCs
  • Loads dropped DLL 12 IoCs
  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe
    "C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Users\Admin\AppData\Local\Temp\Files\zwuivg.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\zwuivg.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1592
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\zwuivg.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2008
    • C:\Users\Admin\AppData\Local\Temp\Files\pei.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\pei.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Users\Admin\AppData\Local\Temp\2950214741.exe
        C:\Users\Admin\AppData\Local\Temp\2950214741.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1744
        • C:\Windows\syslmgrsvc.exe
          C:\Windows\syslmgrsvc.exe
          4⤵
          • Modifies security service
          • Windows security bypass
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious use of WriteProcessMemory
          PID:2660
          • C:\Users\Admin\AppData\Local\Temp\1250824866.exe
            C:\Users\Admin\AppData\Local\Temp\1250824866.exe
            5⤵
            • Executes dropped EXE
            PID:1220
    • C:\Users\Admin\AppData\Local\Temp\Files\lordga.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\lordga.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2860
    • C:\Users\Admin\AppData\Local\Temp\Files\IerLRtXpEcMnUjz.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\IerLRtXpEcMnUjz.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Files\IerLRtXpEcMnUjz.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3040
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DzmQEVPXhX.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2140
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DzmQEVPXhX" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5F6E.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:1044
      • C:\Users\Admin\AppData\Local\Temp\Files\IerLRtXpEcMnUjz.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\IerLRtXpEcMnUjz.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1868
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\IerLRtXpEcMnUjz.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2692
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'IerLRtXpEcMnUjz.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1928
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\cmd.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1076
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'cmd.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3056
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "cmd" /tr "C:\ProgramData\cmd.exe"
          4⤵
          • Creates scheduled task(s)
          PID:2732
    • C:\Users\Admin\AppData\Local\Temp\Files\inte.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\inte.exe"
      2⤵
      • Executes dropped EXE
      PID:2240
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c taskkill /im "inte.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\Files\inte.exe" & exit
        3⤵
          PID:2356
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /im "inte.exe" /f
            4⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1464
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        2⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2452
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6b59758,0x7fef6b59768,0x7fef6b59778
          3⤵
            PID:1824
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1388,i,8257395320343994791,3688105287911601153,131072 /prefetch:2
            3⤵
              PID:2832
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1564 --field-trial-handle=1388,i,8257395320343994791,3688105287911601153,131072 /prefetch:8
              3⤵
                PID:2172
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1632 --field-trial-handle=1388,i,8257395320343994791,3688105287911601153,131072 /prefetch:8
                3⤵
                  PID:1700
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2044 --field-trial-handle=1388,i,8257395320343994791,3688105287911601153,131072 /prefetch:1
                  3⤵
                    PID:2352
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2320 --field-trial-handle=1388,i,8257395320343994791,3688105287911601153,131072 /prefetch:1
                    3⤵
                      PID:2564
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1508 --field-trial-handle=1388,i,8257395320343994791,3688105287911601153,131072 /prefetch:2
                      3⤵
                        PID:2332
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1256 --field-trial-handle=1388,i,8257395320343994791,3688105287911601153,131072 /prefetch:1
                        3⤵
                          PID:1880
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3420 --field-trial-handle=1388,i,8257395320343994791,3688105287911601153,131072 /prefetch:8
                          3⤵
                            PID:1380
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3584 --field-trial-handle=1388,i,8257395320343994791,3688105287911601153,131072 /prefetch:8
                            3⤵
                              PID:2448
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3612 --field-trial-handle=1388,i,8257395320343994791,3688105287911601153,131072 /prefetch:8
                              3⤵
                                PID:1816
                          • C:\Windows\system32\taskeng.exe
                            taskeng.exe {FC443BF9-DD91-45FD-A871-5E04A7646968} S-1-5-21-2721934792-624042501-2768869379-1000:BISMIZHX\Admin:Interactive:[1]
                            1⤵
                              PID:1364
                              • C:\ProgramData\cmd.exe
                                C:\ProgramData\cmd.exe
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2388
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\cmd.exe"
                                  3⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Drops file in System32 directory
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:300
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DzmQEVPXhX.exe"
                                  3⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Drops file in System32 directory
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2516
                                • C:\Windows\SysWOW64\schtasks.exe
                                  "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DzmQEVPXhX" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2E51.tmp"
                                  3⤵
                                  • Creates scheduled task(s)
                                  PID:2728
                                • C:\ProgramData\cmd.exe
                                  "C:\ProgramData\cmd.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  PID:2644
                                • C:\ProgramData\cmd.exe
                                  "C:\ProgramData\cmd.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:588
                              • C:\ProgramData\cmd.exe
                                C:\ProgramData\cmd.exe
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1444
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\cmd.exe"
                                  3⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Drops file in System32 directory
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2244
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DzmQEVPXhX.exe"
                                  3⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Drops file in System32 directory
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1380
                                • C:\Windows\SysWOW64\schtasks.exe
                                  "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DzmQEVPXhX" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1880.tmp"
                                  3⤵
                                  • Creates scheduled task(s)
                                  PID:2060
                                • C:\ProgramData\cmd.exe
                                  "C:\ProgramData\cmd.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  PID:3048
                                • C:\ProgramData\cmd.exe
                                  "C:\ProgramData\cmd.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  PID:1556
                                • C:\ProgramData\cmd.exe
                                  "C:\ProgramData\cmd.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2188
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:2004

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                Filesize

                                70KB

                                MD5

                                49aebf8cbd62d92ac215b2923fb1b9f5

                                SHA1

                                1723be06719828dda65ad804298d0431f6aff976

                                SHA256

                                b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                SHA512

                                bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                Filesize

                                342B

                                MD5

                                6bd0bac39610bd23dfd9211d94eb9eeb

                                SHA1

                                3c5dd84de3e089b8d94ca68ac6ac80963962231f

                                SHA256

                                8eba9b5e0ded26bc5fe978ac30fe1169952f255c6dd02eca02730ee02f387f9e

                                SHA512

                                2ce9790ddb10dc4d337848b715e7e7b91fca9096f72daaae80ccfcb24782c061f8b5a1cc4f48ef5493b32b989e3fc3fe7fbec9b00c6b12c3b4fb9d88733d795b

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                Filesize

                                342B

                                MD5

                                973c48451a53d80b94a5a19bbb910055

                                SHA1

                                125250dc0c2297786f7fb15c1eca17e0823ca46f

                                SHA256

                                c24975755a833fae014c3970dcc96d01d19395ff683370279e75df0b8181b906

                                SHA512

                                f8c3fb33d312ccda1e9d9b0cdb50619472e3f20428144c9fdb611d4ecbc424b1cb7ed64424b318cfe71e16b503622b4f2a8b8116b17ef26f89455b80ba7cf737

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                Filesize

                                342B

                                MD5

                                f14964911e0bb35763f8f3c44c1c429f

                                SHA1

                                66a3620fb3ebaa9907d871101412eeaef3876715

                                SHA256

                                5b3363c2c77ba5dfae21fa22139bd2b890cf099ec966e58fb6f5c64c1aaa6045

                                SHA512

                                2ab9906cf283d5c6f4f624c14a4007c5070d3dd1ab89c06fb6e4458a724b26ec1ab071f0bcd0ef34b474d8693e18b655d765a10639c110946df49102f7a713d8

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                Filesize

                                16B

                                MD5

                                aefd77f47fb84fae5ea194496b44c67a

                                SHA1

                                dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                SHA256

                                4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                SHA512

                                b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\CURRENT

                                Filesize

                                16B

                                MD5

                                18e723571b00fb1694a3bad6c78e4054

                                SHA1

                                afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                SHA256

                                8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                SHA512

                                43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                Filesize

                                264KB

                                MD5

                                f50f89a0a91564d0b8a211f8921aa7de

                                SHA1

                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                SHA256

                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                SHA512

                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CY2G78MW\advdlc[1].htm

                                Filesize

                                1B

                                MD5

                                cfcd208495d565ef66e7dff9f98764da

                                SHA1

                                b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                SHA256

                                5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                SHA512

                                31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                              • C:\Users\Admin\AppData\Local\Temp\Files\IerLRtXpEcMnUjz.exe

                                Filesize

                                515KB

                                MD5

                                148b2c38cf0726535d760a703f803c80

                                SHA1

                                107503ca149f547d4745fe9b9a3fbae03d60126c

                                SHA256

                                30a110aa704b2beebbe56ad92cc4910defd943360d6bc10113e7fc17f9c31e7d

                                SHA512

                                6b9c13d80fb24924604245f9046c28df75d009c6cd6f819ef2ac6e99a592acfc84473b4fcc6e2c1ccafd6001bb4a931a8ced6a968bd874e2ebf81cd8c714bdbd

                              • C:\Users\Admin\AppData\Local\Temp\Tar1A2C.tmp

                                Filesize

                                181KB

                                MD5

                                4ea6026cf93ec6338144661bf1202cd1

                                SHA1

                                a1dec9044f750ad887935a01430bf49322fbdcb7

                                SHA256

                                8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                SHA512

                                6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                              • C:\Users\Admin\AppData\Local\Temp\tmp5F6E.tmp

                                Filesize

                                1KB

                                MD5

                                558a3288d70b4f8329cbeadf26727c92

                                SHA1

                                a3392d20a030cc3c2d25d61886c4163c6108df45

                                SHA256

                                392fda08b6b9ac75f9a6ebf0de8b3786f4e5c96b661b9b5cd8143c68b6720520

                                SHA512

                                f13f8a6583a0a2fd8598ec22b3c2e67a2d7c582ce0eef271cf1fc35f2a99e52fa78f419d400dcb3974b1c43c53a14c4d96b7ec65fea410c48185f1e820c7d3df

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                Filesize

                                7KB

                                MD5

                                4a6410c54faa6a4481fca9f01f466cb0

                                SHA1

                                a2a68fdd1de5859ee020ced3d2124e79bf013b68

                                SHA256

                                948dd02a0c2435358f767dc13676c4606a95fd22c363a844e88392a02073e234

                                SHA512

                                a3b1f5976f02610d4002ff66050ca2554c736a3cafcd939f6168f8fb7f91421828a037c5019c2c03c36f59ae80dfafacacaaf74f1517f98522e5eb3c98842a50

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                Filesize

                                7KB

                                MD5

                                0a0fcc614d0638c8e92364ea4d379aaf

                                SHA1

                                4c75c8478413b46ebbd525daa30aacdacc902836

                                SHA256

                                fa8ee250522c324862bb48ebdb4c9acac2a81707f357cd40ed672110daee7a34

                                SHA512

                                3ebe8533bf4efc08cbc4fd6e0f71aa29be744cdf9f8ca5f2777a9fd416f86b5109115ce34180db270f563702615d4b5319d9b999efd77dd7636257012893dc0b

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                Filesize

                                7KB

                                MD5

                                745e79d3549c1ef0ee991c0dec2ced6a

                                SHA1

                                f63563225daee74a5f9759631f083ae67839b7a8

                                SHA256

                                a7ffd719adcef6b031523266fcda9e7949c22b6506ef3887c46e865d02452420

                                SHA512

                                83f9350f1f10942ec78b6c45795f7c52bc9ddfffdec42ff6f40ca7c1cd24ccd3e4562c776009ee3ed7c4c44cc30aad81bdd6329786230467599758ecf2485f55

                              • \Users\Admin\AppData\Local\Temp\2950214741.exe

                                Filesize

                                93KB

                                MD5

                                a318cc45e79498b93e40d5e5b9b76be4

                                SHA1

                                4ebc9969cc3c330741c377e22a5fb0cdb8ce5fd5

                                SHA256

                                4b4e596641d0dd9eece8a24556fd1246056cbc315a79675a7400927858bbd7c2

                                SHA512

                                3131d627837a3cafdf532173ccadd4beff933ee3d5e050366153434b1394c4d57056b4d273ddb826a1a0478caa83e1f6e095e83366102ae1d3705ab2d3ec0e2c

                              • \Users\Admin\AppData\Local\Temp\Files\inte.exe

                                Filesize

                                176KB

                                MD5

                                b7fcd8d0429e1001ac2b10de60a2d42e

                                SHA1

                                b0a6291666d683aee0b42a9a074b107ef42c64cd

                                SHA256

                                0e432916a8dabba9ee190f7cc5260c619d8b35ae84048c165f86a79d5bc9f4a2

                                SHA512

                                9ef313191d11e04f4b6bcd8bd7ce16198f71bdbf6ec2df625ebaaed4904861e9d514a35964cf1de0b3b6277e32193538a5b93357ab666b1e73a8446b3cb8c7e9

                              • \Users\Admin\AppData\Local\Temp\Files\lordga.exe

                                Filesize

                                5.5MB

                                MD5

                                2a302c859a9ad3a02c688e9f812221be

                                SHA1

                                e222920bddb6a6959a79541f7d866a7087048472

                                SHA256

                                51409e95b696e5c2e8d770d3fad29976c4a5e5ff54f9fc5ea22062d97d5c6cd2

                                SHA512

                                9546312e4346a487d6dbe549ff04207292a91fb2f77584beb9d3fa9260e82628e6143a54ce8d46f7bc4427c21e6533c16526b783254aa0de62eedfed9b1a81ae

                              • \Users\Admin\AppData\Local\Temp\Files\pei.exe

                                Filesize

                                9KB

                                MD5

                                8d8e6c7952a9dc7c0c73911c4dbc5518

                                SHA1

                                9098da03b33b2c822065b49d5220359c275d5e94

                                SHA256

                                feb4c3ae4566f0acbb9e0f55417b61fefd89dc50a4e684df780813fb01d61278

                                SHA512

                                91a573843c28dd32a9f31a60ba977f9a3d4bb19ffd1b7254333e09bcecef348c1b3220a348ebb2cb08edb57d56cb7737f026519da52199c9dc62c10aea236645

                              • \Users\Admin\AppData\Local\Temp\Files\zwuivg.exe

                                Filesize

                                1020KB

                                MD5

                                9bd9e74ec90979f70c3e6ceead15aa5a

                                SHA1

                                3e945f971d078852a63db6cbf2698e82700c2f35

                                SHA256

                                190469774e832bee578dd5ea4349878063b86eedca8b77f1efec51af20cd1ce7

                                SHA512

                                4362f80e3db045ed6898e225e740f72ec09b4dd8b4752d0323aaac3892d84e2c032eaaca7598f8d04651a44705249a05db9d52299d017a3b8232afc59eb5e928

                              • memory/588-436-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                Filesize

                                4KB

                              • memory/1444-448-0x00000000001C0000-0x0000000000248000-memory.dmp

                                Filesize

                                544KB

                              • memory/1868-342-0x0000000000400000-0x0000000000418000-memory.dmp

                                Filesize

                                96KB

                              • memory/1868-351-0x0000000000400000-0x0000000000418000-memory.dmp

                                Filesize

                                96KB

                              • memory/1868-354-0x0000000000400000-0x0000000000418000-memory.dmp

                                Filesize

                                96KB

                              • memory/1868-353-0x0000000000400000-0x0000000000418000-memory.dmp

                                Filesize

                                96KB

                              • memory/1868-346-0x0000000000400000-0x0000000000418000-memory.dmp

                                Filesize

                                96KB

                              • memory/1868-348-0x0000000000400000-0x0000000000418000-memory.dmp

                                Filesize

                                96KB

                              • memory/1868-344-0x0000000000400000-0x0000000000418000-memory.dmp

                                Filesize

                                96KB

                              • memory/1868-350-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                Filesize

                                4KB

                              • memory/2008-207-0x0000000000400000-0x0000000000442000-memory.dmp

                                Filesize

                                264KB

                              • memory/2008-208-0x0000000000400000-0x0000000000442000-memory.dmp

                                Filesize

                                264KB

                              • memory/2008-210-0x0000000000400000-0x0000000000442000-memory.dmp

                                Filesize

                                264KB

                              • memory/2188-473-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                Filesize

                                4KB

                              • memory/2204-2-0x0000000074010000-0x00000000746FE000-memory.dmp

                                Filesize

                                6.9MB

                              • memory/2204-326-0x000000007401E000-0x000000007401F000-memory.dmp

                                Filesize

                                4KB

                              • memory/2204-357-0x0000000074010000-0x00000000746FE000-memory.dmp

                                Filesize

                                6.9MB

                              • memory/2204-0-0x000000007401E000-0x000000007401F000-memory.dmp

                                Filesize

                                4KB

                              • memory/2204-1-0x0000000000160000-0x0000000000168000-memory.dmp

                                Filesize

                                32KB

                              • memory/2388-416-0x0000000001190000-0x0000000001218000-memory.dmp

                                Filesize

                                544KB

                              • memory/2508-325-0x0000000004A20000-0x0000000004A7A000-memory.dmp

                                Filesize

                                360KB

                              • memory/2508-324-0x0000000000510000-0x0000000000520000-memory.dmp

                                Filesize

                                64KB

                              • memory/2508-307-0x00000000005C0000-0x00000000005DA000-memory.dmp

                                Filesize

                                104KB

                              • memory/2508-306-0x00000000001E0000-0x0000000000268000-memory.dmp

                                Filesize

                                544KB

                              • memory/2860-296-0x00000000009F0000-0x00000000009F1000-memory.dmp

                                Filesize

                                4KB

                              • memory/2860-297-0x0000000000070000-0x0000000000979000-memory.dmp

                                Filesize

                                9.0MB

                              • memory/2860-292-0x00000000009F0000-0x00000000009F1000-memory.dmp

                                Filesize

                                4KB

                              • memory/2860-294-0x00000000009F0000-0x00000000009F1000-memory.dmp

                                Filesize

                                4KB