Analysis
-
max time kernel
139s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 23:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.canva.com/design/DAGH7ncEuLI/eAPrLkpLwjWbgXoBrm0VZQ/view?utm_content=DAGH7ncEuLI&utm_campaign=designshare&utm_medium=link&utm_source=editor
Resource
win10v2004-20240508-en
General
-
Target
https://www.canva.com/design/DAGH7ncEuLI/eAPrLkpLwjWbgXoBrm0VZQ/view?utm_content=DAGH7ncEuLI&utm_campaign=designshare&utm_medium=link&utm_source=editor
Malware Config
Signatures
-
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\system32\SRU\SRU.chk svchost.exe File opened for modification C:\Windows\system32\SRU\SRU.log svchost.exe File opened for modification C:\Windows\system32\SRU\SRUDB.dat svchost.exe File opened for modification C:\Windows\system32\SRU\SRUDB.jfm svchost.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtl64.inf_amd64_8e9c2368fe308df2\netrtl64.PNF svchost.exe File created C:\Windows\system32\NDF\{33E16B46-2902-4277-B9A0-FDFA07D5916B}-temp-06122024-2308.etl svchost.exe File opened for modification C:\Windows\system32\NDF\{33E16B46-2902-4277-B9A0-FDFA07D5916B}-temp-06122024-2308.etl svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Network\Connections\Pbk\_hiddenPbk\rasphone.pbk svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1560 ipconfig.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\RAS AutoDial svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\RAS AutoDial\Default svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4004 msedge.exe 4004 msedge.exe 736 msedge.exe 736 msedge.exe 1752 identity_helper.exe 1752 identity_helper.exe 3444 sdiagnhost.exe 3444 sdiagnhost.exe 2372 svchost.exe 2372 svchost.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3444 sdiagnhost.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 1540 msdt.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 736 wrote to memory of 1364 736 msedge.exe 83 PID 736 wrote to memory of 1364 736 msedge.exe 83 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4100 736 msedge.exe 84 PID 736 wrote to memory of 4004 736 msedge.exe 85 PID 736 wrote to memory of 4004 736 msedge.exe 85 PID 736 wrote to memory of 552 736 msedge.exe 86 PID 736 wrote to memory of 552 736 msedge.exe 86 PID 736 wrote to memory of 552 736 msedge.exe 86 PID 736 wrote to memory of 552 736 msedge.exe 86 PID 736 wrote to memory of 552 736 msedge.exe 86 PID 736 wrote to memory of 552 736 msedge.exe 86 PID 736 wrote to memory of 552 736 msedge.exe 86 PID 736 wrote to memory of 552 736 msedge.exe 86 PID 736 wrote to memory of 552 736 msedge.exe 86 PID 736 wrote to memory of 552 736 msedge.exe 86 PID 736 wrote to memory of 552 736 msedge.exe 86 PID 736 wrote to memory of 552 736 msedge.exe 86 PID 736 wrote to memory of 552 736 msedge.exe 86 PID 736 wrote to memory of 552 736 msedge.exe 86 PID 736 wrote to memory of 552 736 msedge.exe 86 PID 736 wrote to memory of 552 736 msedge.exe 86 PID 736 wrote to memory of 552 736 msedge.exe 86 PID 736 wrote to memory of 552 736 msedge.exe 86 PID 736 wrote to memory of 552 736 msedge.exe 86 PID 736 wrote to memory of 552 736 msedge.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.canva.com/design/DAGH7ncEuLI/eAPrLkpLwjWbgXoBrm0VZQ/view?utm_content=DAGH7ncEuLI&utm_campaign=designshare&utm_medium=link&utm_source=editor1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f40f46f8,0x7ff8f40f4708,0x7ff8f40f47182⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,10870236943602694461,12838088456742126222,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,10870236943602694461,12838088456742126222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,10870236943602694461,12838088456742126222,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10870236943602694461,12838088456742126222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10870236943602694461,12838088456742126222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,10870236943602694461,12838088456742126222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 /prefetch:82⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,10870236943602694461,12838088456742126222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10870236943602694461,12838088456742126222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10870236943602694461,12838088456742126222,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10870236943602694461,12838088456742126222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10870236943602694461,12838088456742126222,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10870236943602694461,12838088456742126222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10870236943602694461,12838088456742126222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10870236943602694461,12838088456742126222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10870236943602694461,12838088456742126222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1992 /prefetch:12⤵PID:4848
-
-
C:\Windows\system32\msdt.exe-modal "197140" -skip TRUE -path "C:\Windows\diagnostics\system\networking" -af "C:\Users\Admin\AppData\Local\Temp\NDF4DDD.tmp" -ep "NetworkDiagnosticsWeb"2⤵
- Suspicious use of FindShellTrayWindow
PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10870236943602694461,12838088456742126222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,10870236943602694461,12838088456742126222,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:8
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1844
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4460
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3444 -
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter2⤵PID:5004
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter2⤵PID:388
-
-
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /all2⤵
- Gathers network information
PID:1560
-
-
C:\Windows\system32\ROUTE.EXE"C:\Windows\system32\ROUTE.EXE" print2⤵PID:2232
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" /f NetworkConfiguration.ddf2⤵PID:4352
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNoNetwork -p -s DPS1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s WdiServiceHost1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2108 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\winethc.dll",ForceProxyDetectionOnNextRun2⤵PID:1788
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s WdiSystemHost1⤵PID:3892
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\ElevatedDiagnostics\460911090\2024061223.000\NetworkDiagnostics.debugreport.xml
Filesize210KB
MD53413606cc6424c9d07625d315bbcf563
SHA19948fa6eb3bac24d98fada66ebbbcc020c49d5ad
SHA256dac62b0f639a5995b6d633e9ed0663ddd4b5a671b18a2312b29e07da3349e698
SHA512ffeed34e1900cb7dd38cd61bb7158920988f054ddb4d550cf35a3bd588836a9151a19596b1401292fc2996842abb4afc1e809ca1b6fc8fcfddb2fc795d3c6a83
-
Filesize
38KB
MD5c7c36dbb74dfc3b203b9584dcca39c43
SHA12bdfd2cea64f6a6e0ae65a00d9da6a25f13c76c2
SHA256a7a9afce0d9ad065d03e5df3bdde11fd4e9b41a7396ac94b99b8fe6cee437a49
SHA5123f6db110e3d7dfc7cb099bbbc75d6c9a7a6de6968a20764157186ee18cd344d9a3db228fdfd5752adb8935483b9826b252c6d12ed774f10bc03c675fc47857c0
-
Filesize
47KB
MD5310e1da2344ba6ca96666fb639840ea9
SHA1e8694edf9ee68782aa1de05470b884cc1a0e1ded
SHA25667401342192babc27e62d4c1e0940409cc3f2bd28f77399e71d245eae8d3f63c
SHA51262ab361ffea1f0b6ff1cc76c74b8e20c2499d72f3eb0c010d47dba7e6d723f9948dba3397ea26241a1a995cffce2a68cd0aaa1bb8d917dd8f4c8f3729fa6d244
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD5f7024401e16db01149cd259821bd5756
SHA10e012c8699a8bf7eba7967cb0ef72c5ffbcd0d76
SHA256b5b09656229d30dbff644fbf9ed72a546893ebf547fcdb361cfad2a70f1d3f0c
SHA512b603896f64f0bbb14a83832b6c6647ad96a492e503792a44cc9fecdc3ac89d3c82b7cbbb05cfec72735fff5573ba7864ca1399eb6fde6e97a7b60f40f0a0fd43
-
Filesize
5KB
MD5c3d62a7877a2f5eed4ae9ad260fe263e
SHA16fb02f95722af71b1930e7a8be55743bc717ed18
SHA256b4ff106c03a3330ac16884363909bae0040a635f086290e39d7b99a002dc359d
SHA512c3cd00b356000e67e8a60dbeb4b57ddb979f1939ba458cf5b29f5f35426d4ae3f263e65f5c8df44c421577626ecd15be9445f79d7aba6a0980106ff40b38cb30
-
Filesize
6KB
MD5efe157eb553d1ed1d1ec2500cb8c3699
SHA114b5a7ad4b0a8f38085852e3c52439f40120445d
SHA2568747397bd804487fef1ab651c99455a13c232e947794eed94c1a3df2c3b8ac8d
SHA512e4041b7dd55d82041211222ac5b8171c2985025a9617e98b5a49a79ee4562e0279b41ddc12c8766fc1f85c770ee1c3966d30e4b9383d452f8940b97736fbeb1f
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD5c22f993c9547a1a364f6707ea0154fdd
SHA122901b4521e109ebfbfb888eddaf371da3d9cd5b
SHA256124d710e0d7357f76bb8eae31ee470092c66609f3a58941216a488827d787caa
SHA5122cb41ebeb75a7e5b60d39c4979cef970f515bbcd7e32a0d882fb39904e7a16f954f967e98bfde588368ab04e2537555325232a2c4e2a9df3584dd7512d0b44ea
-
Filesize
9KB
MD53b50b8e48fb77f35ec702dd8238ed716
SHA1fffc250c8fa55cf68ea7d15d6176afb91e1663d6
SHA2562d143726d23bcdaab82d3c8667e1cafa7dc9932588b9dd578c72adb697f7e08e
SHA512762d1557de211c78f9fce17204efba999c7abdb7d5083132eea41808ea203df18409fb8e36415e46e60d8698e1a848edbf571fb6922707f54bf0816505b6b588
-
Filesize
3KB
MD582cbfd91b648274c70df20c6c954ef2c
SHA1df00ec2948760b653015539543b56dcdcf3a4896
SHA2563e73a0fab75080ebe44eb33f78da5d36f68dbaf5584ad710c0d57afa2173b6ae
SHA512b6388c26e30828ab7a04996ce345f7e36aa70105037afbd59a707610d76194024141cb12a2ac8a47a86d87588159efa8189433d94e3861b226079ec16c21029e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD540d4ccf6c1fc04b60f3efde9509ea01a
SHA14caa35104ce67b0fd902669a79f8a3135b30cf0b
SHA2567163f77aa3cb8f528fd3c92869ebf431463ff1f8de525fc713781a5d4e7cb28c
SHA51257ad33ae69365126ea64653fb90474cf767922a918687d2f140accc17264fa6908199f58b379ba3bc2dddbad9532d53ccc268083097ece26d6775e0c97c22371
-
Filesize
231B
MD500848049d4218c485d9e9d7a54aa3b5f
SHA1d1d5f388221417985c365e8acaec127b971c40d0
SHA256ffeafbb8e7163fd7ec9abc029076796c73cd7b4eddaeeda9ba394c547419769e
SHA5123a4874a5289682e2b32108740feea586cb9ccdad9ca08bf30f67c9742370c081ad943ea714f08dbf722f9f98f3b0bb307619a8ba47f96b24301c68b0fd1086d9
-
Filesize
1KB
MD5153d685cad27f538737b874450cf1ed8
SHA1603e1b49eeea05e4f70eba2e9545446a9d2de268
SHA2562a23f33efe9177b659c47c87cd2469fbecdb7eb2ab51f1de95cad6de57c6f94b
SHA5126b5f2d42aea89e212090e95360645a80817513b56277b1c8c8dcb5cc8f8b3d0c7ce9549a62e6a554a5408c82141d229fe172fcb95ae3b872d0b14ea010bbbdf8
-
Filesize
4KB
MD551b64cad6426bb4dcd0dac5f329e29df
SHA10146d0e2607a875399e0871e8fa8c9470c0625cd
SHA2568f8e528f5ad10d40be50022d70bb1a5d4f562febe27d937a458fcc38f71bf7fc
SHA5123b40ed3ea3683803506d2b60de9a2b3a10965836ad3f51aa0403fe2dc64968ce093da404a0f38b602c84ae2f634dc5991ec4b29bd4d52f7e5e83e0cc2b109cdc
-
Filesize
978B
MD5be9d7993db973587291961883635af17
SHA1505841d513321bc55ad931a7b441b21b03a864e2
SHA256d47cddba040515119034bc70a5a4e33eacb7a784d0a0ae2b46c7a9216bc72d75
SHA51232519869914c6d90064faedd340d1effa3a207bc84e2b3b60513cf2a0e61081220604720014ac178eff0aae5856ebc6cc0ca0fae480aa1d4fd212c20764bbc0e
-
Filesize
283B
MD52fc77a0b900c2849a523695445411d78
SHA1ce0f86436da4823cbd51fc7ca1f36128dc205c9e
SHA256be0f663f337d7a8b78fb262b9271a678ecad13bf046267b094c71a9e868ffff0
SHA5126e4db16648004d2ac95e7a96171eecc2794455a1b1965971f0e2e86d1390a24693e185d45cbdd29744710fc2b55a673b7e2bd2f8e23f32d3105a699a46751354
-
Filesize
11KB
MD5d213491a2d74b38a9535d616b9161217
SHA1bde94742d1e769638e2de84dfb099f797adcc217
SHA2564662c3c94e0340a243c2a39ca8a88fd9f65c74fb197644a11d4ffcae6b191211
SHA5125fd8b91b27935711495934e5d7ca14f9dd72bc40a38072595879ef334a47f99e0608087ddc62668c6f783938d9f22a3688c5cdef3a9ad6c3575f3cfa5a3b0104
-
Filesize
25KB
MD5d0cfc204ca3968b891f7ce0dccfb2eda
SHA156dad1716554d8dc573d0ea391f808e7857b2206
SHA256e3940266b4368c04333db89804246cb89bf2073626f22b8de72bea27c522282a
SHA5124d2225b599ad8af8ba8516f12cfddca5ec0ce69c5c80b133a6a323e9aaf5e0312efbcfa54d2e4462a5095f9a7c42b9d5b39f3204e0be72c3b1992cf33b22087c
-
Filesize
10KB
MD59b222d8ec4b20860f10ebf303035b984
SHA1b30eea35c2516afcab2c49ef6531af94efaf7e1a
SHA256a32e13da40ac4b9e1dac7dd28bc1d25e2f2136b61ff93be943018b20796f15bc
SHA5128331337ccb6e3137b01aeec03e6921fd3b9e56c44fa1b17545ae5c7bfcdd39fcd8a90192884b3a82f56659009e24b63ce7f500e8766fd01e8d4e60a52de0fe67
-
Filesize
567B
MD5a660422059d953c6d681b53a6977100e
SHA10c95dd05514d062354c0eecc9ae8d437123305bb
SHA256d19677234127c38a52aec23686775a8eb3f4e3a406f4a11804d97602d6c31813
SHA51226f8cf9ac95ff649ecc2ed349bc6c7c3a04b188594d5c3289af8f2768ab59672bc95ffefcc83ed3ffa44edd0afeb16a4c2490e633a89fce7965843674d94b523
-
Filesize
53KB
MD5c912faa190464ce7dec867464c35a8dc
SHA1d1c6482dad37720db6bdc594c4757914d1b1dd70
SHA2563891846307aa9e83bca66b13198455af72af45bf721a2fbd41840d47e2a91201
SHA5125c34352d36459fd8fcda5b459a2e48601a033af31d802a90ed82c443a5a346b9480880d30c64db7ad0e4a8c35b98c98f69eceedad72f2a70d9c6cca74dce826a
-
Filesize
2KB
MD50c75ae5e75c3e181d13768909c8240ba
SHA1288403fc4bedaacebccf4f74d3073f082ef70eb9
SHA256de5c231c645d3ae1e13694284997721509f5de64ee5c96c966cdfda9e294db3f
SHA5128fc944515f41a837c61a6c4e5181ca273607a89e48fbf86cf8eb8db837aed095aa04fc3043029c3b5cb3710d59abfd86f086ac198200f634bfb1a5dd0823406b
-
Filesize
5KB
MD5380768979618b7097b0476179ec494ed
SHA1af2a03a17c546e4eeb896b230e4f2a52720545ab
SHA2560637af30fc3b3544b1f516f6196a8f821ffbfa5d36d65a8798aeeadbf2e8a7c2
SHA512b9ef59e9bfdbd49052a4e754ead8cd54b77e79cc428e7aee2b80055ff5f0b038584af519bd2d66258cf3c01f8cc71384f6959ee32111eac4399c47e1c2352302
-
Filesize
478KB
MD5580dc3658fa3fe42c41c99c52a9ce6b0
SHA13c4be12c6e3679a6c2267f88363bbd0e6e00cac5
SHA2565b7aa413e4a64679c550c77e6599a1c940ee947cbdf77d310e142a07a237aad2
SHA51268c52cd7b762b8f5d2f546092ed9c4316924fa04bd3ab748ab99541a8b4e7d9aec70acf5c9594d1457ad3a2f207d0c189ec58421d4352ddbc7eae453324d13f2
-
Filesize
17KB
MD544c4385447d4fa46b407fc47c8a467d0
SHA141e4e0e83b74943f5c41648f263b832419c05256
SHA2568be175e8fbdae0dade54830fece6c6980d1345dbeb4a06c07f7efdb1152743f4
SHA512191cd534e85323a4cd9649a1fc372312ed4a600f6252dffc4435793650f9dd40d0c0e615ba5eb9aa437a58af334146aac7c0ba08e0a1bf24ec4837a40f966005
-
C:\Windows\Temp\SDIAG_aa563be0-0642-4884-953e-c5f9d1ea0c3e\result\33E16B46-2902-4277-B9A0-FDFA07D5916B.Diagnose.Admin.0.etl
Filesize192KB
MD56004404dbcebaaf7a4c7d703d93fa5a7
SHA19a06c7ea8d4c3047baf7d8cacd620a94ab87a647
SHA256adb9f04c4d2098a89b6025daa41098b168be6a966e54cbe56ce802aad0fc53d2
SHA512b54fe8302ba8596b6a5c2d6764db75cf317a2486e124303f571706cd74b5abe85377403b2c4acfc77d8082dae71be1cde9ad41010962431206cd3c77ee9bc1be