Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 11:28
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86-64_build_4355/setup_x86-64_build_4355.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
setup_x86-64_build_4355/setup_x86-64_build_4355.exe
Resource
win10v2004-20240611-en
General
-
Target
setup_x86-64_build_4355/setup_x86-64_build_4355.exe
-
Size
24.3MB
-
MD5
28ff0cac1b7a4225c599b7366f5afb42
-
SHA1
89562ab281aecd486f4d07e5cd6f1cb823459521
-
SHA256
f6affa968b207a553f4825db54f148a2697c7a786eac16f83df8997a5ea85044
-
SHA512
a88a332f72e38386eaf9c689df65f4762a1f9c67cab9a63f94beb199d9c04543ff16f522b2ebe180600b78f2fb3d0f49808349ab5dcaa3d5ef5153651c12c95d
-
SSDEEP
393216:VwUKAUS7TtyXxSUTxnZ17LYLye4ik0opiCmZ:G/eyXzgLyXiOpI
Malware Config
Signatures
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1844 netsh.exe 3128 netsh.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 39 discord.com 40 discord.com 41 discord.com 81 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 ip-api.com -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 2116 cmd.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4900 sc.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Collects information from the system 1 TTPs 1 IoCs
Uses WMIC.exe to find detailed system information.
pid Process 2284 WMIC.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4872 WMIC.exe -
Enumerates processes with tasklist 1 TTPs 5 IoCs
pid Process 4684 tasklist.exe 2984 tasklist.exe 2160 tasklist.exe 1016 tasklist.exe 2564 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 3440 NETSTAT.EXE 392 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 3984 systeminfo.exe -
Kills process with taskkill 6 IoCs
pid Process 3224 taskkill.exe 4312 taskkill.exe 4420 taskkill.exe 3560 taskkill.exe 64 taskkill.exe 4388 taskkill.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2584 powershell.exe 2584 powershell.exe 2584 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1348 WMIC.exe Token: SeSecurityPrivilege 1348 WMIC.exe Token: SeTakeOwnershipPrivilege 1348 WMIC.exe Token: SeLoadDriverPrivilege 1348 WMIC.exe Token: SeSystemProfilePrivilege 1348 WMIC.exe Token: SeSystemtimePrivilege 1348 WMIC.exe Token: SeProfSingleProcessPrivilege 1348 WMIC.exe Token: SeIncBasePriorityPrivilege 1348 WMIC.exe Token: SeCreatePagefilePrivilege 1348 WMIC.exe Token: SeBackupPrivilege 1348 WMIC.exe Token: SeRestorePrivilege 1348 WMIC.exe Token: SeShutdownPrivilege 1348 WMIC.exe Token: SeDebugPrivilege 1348 WMIC.exe Token: SeSystemEnvironmentPrivilege 1348 WMIC.exe Token: SeRemoteShutdownPrivilege 1348 WMIC.exe Token: SeUndockPrivilege 1348 WMIC.exe Token: SeManageVolumePrivilege 1348 WMIC.exe Token: 33 1348 WMIC.exe Token: 34 1348 WMIC.exe Token: 35 1348 WMIC.exe Token: 36 1348 WMIC.exe Token: SeIncreaseQuotaPrivilege 4872 WMIC.exe Token: SeSecurityPrivilege 4872 WMIC.exe Token: SeTakeOwnershipPrivilege 4872 WMIC.exe Token: SeLoadDriverPrivilege 4872 WMIC.exe Token: SeSystemProfilePrivilege 4872 WMIC.exe Token: SeSystemtimePrivilege 4872 WMIC.exe Token: SeProfSingleProcessPrivilege 4872 WMIC.exe Token: SeIncBasePriorityPrivilege 4872 WMIC.exe Token: SeCreatePagefilePrivilege 4872 WMIC.exe Token: SeBackupPrivilege 4872 WMIC.exe Token: SeRestorePrivilege 4872 WMIC.exe Token: SeShutdownPrivilege 4872 WMIC.exe Token: SeDebugPrivilege 4872 WMIC.exe Token: SeSystemEnvironmentPrivilege 4872 WMIC.exe Token: SeRemoteShutdownPrivilege 4872 WMIC.exe Token: SeUndockPrivilege 4872 WMIC.exe Token: SeManageVolumePrivilege 4872 WMIC.exe Token: 33 4872 WMIC.exe Token: 34 4872 WMIC.exe Token: 35 4872 WMIC.exe Token: 36 4872 WMIC.exe Token: SeDebugPrivilege 4684 tasklist.exe Token: SeIncreaseQuotaPrivilege 4872 WMIC.exe Token: SeSecurityPrivilege 4872 WMIC.exe Token: SeTakeOwnershipPrivilege 4872 WMIC.exe Token: SeLoadDriverPrivilege 4872 WMIC.exe Token: SeSystemProfilePrivilege 4872 WMIC.exe Token: SeSystemtimePrivilege 4872 WMIC.exe Token: SeProfSingleProcessPrivilege 4872 WMIC.exe Token: SeIncBasePriorityPrivilege 4872 WMIC.exe Token: SeCreatePagefilePrivilege 4872 WMIC.exe Token: SeBackupPrivilege 4872 WMIC.exe Token: SeRestorePrivilege 4872 WMIC.exe Token: SeShutdownPrivilege 4872 WMIC.exe Token: SeDebugPrivilege 4872 WMIC.exe Token: SeSystemEnvironmentPrivilege 4872 WMIC.exe Token: SeRemoteShutdownPrivilege 4872 WMIC.exe Token: SeUndockPrivilege 4872 WMIC.exe Token: SeManageVolumePrivilege 4872 WMIC.exe Token: 33 4872 WMIC.exe Token: 34 4872 WMIC.exe Token: 35 4872 WMIC.exe Token: 36 4872 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3228 wrote to memory of 3712 3228 setup_x86-64_build_4355.exe 91 PID 3228 wrote to memory of 3712 3228 setup_x86-64_build_4355.exe 91 PID 3228 wrote to memory of 2484 3228 setup_x86-64_build_4355.exe 94 PID 3228 wrote to memory of 2484 3228 setup_x86-64_build_4355.exe 94 PID 3228 wrote to memory of 1480 3228 setup_x86-64_build_4355.exe 95 PID 3228 wrote to memory of 1480 3228 setup_x86-64_build_4355.exe 95 PID 3228 wrote to memory of 2372 3228 setup_x86-64_build_4355.exe 96 PID 3228 wrote to memory of 2372 3228 setup_x86-64_build_4355.exe 96 PID 3228 wrote to memory of 3312 3228 setup_x86-64_build_4355.exe 97 PID 3228 wrote to memory of 3312 3228 setup_x86-64_build_4355.exe 97 PID 2484 wrote to memory of 4872 2484 cmd.exe 102 PID 2484 wrote to memory of 4872 2484 cmd.exe 102 PID 1480 wrote to memory of 1348 1480 cmd.exe 103 PID 1480 wrote to memory of 1348 1480 cmd.exe 103 PID 3312 wrote to memory of 4684 3312 cmd.exe 104 PID 3312 wrote to memory of 4684 3312 cmd.exe 104 PID 3228 wrote to memory of 3440 3228 setup_x86-64_build_4355.exe 106 PID 3228 wrote to memory of 3440 3228 setup_x86-64_build_4355.exe 106 PID 3440 wrote to memory of 2564 3440 cmd.exe 108 PID 3440 wrote to memory of 2564 3440 cmd.exe 108 PID 3228 wrote to memory of 2772 3228 setup_x86-64_build_4355.exe 109 PID 3228 wrote to memory of 2772 3228 setup_x86-64_build_4355.exe 109 PID 3228 wrote to memory of 3708 3228 setup_x86-64_build_4355.exe 110 PID 3228 wrote to memory of 3708 3228 setup_x86-64_build_4355.exe 110 PID 3708 wrote to memory of 2984 3708 cmd.exe 113 PID 3708 wrote to memory of 2984 3708 cmd.exe 113 PID 2772 wrote to memory of 1572 2772 cmd.exe 114 PID 2772 wrote to memory of 1572 2772 cmd.exe 114 PID 3228 wrote to memory of 2116 3228 setup_x86-64_build_4355.exe 117 PID 3228 wrote to memory of 2116 3228 setup_x86-64_build_4355.exe 117 PID 2116 wrote to memory of 1212 2116 cmd.exe 119 PID 2116 wrote to memory of 1212 2116 cmd.exe 119 PID 3228 wrote to memory of 3460 3228 setup_x86-64_build_4355.exe 120 PID 3228 wrote to memory of 3460 3228 setup_x86-64_build_4355.exe 120 PID 3460 wrote to memory of 2160 3460 cmd.exe 122 PID 3460 wrote to memory of 2160 3460 cmd.exe 122 PID 3228 wrote to memory of 312 3228 setup_x86-64_build_4355.exe 123 PID 3228 wrote to memory of 312 3228 setup_x86-64_build_4355.exe 123 PID 312 wrote to memory of 4312 312 cmd.exe 125 PID 312 wrote to memory of 4312 312 cmd.exe 125 PID 3228 wrote to memory of 2432 3228 setup_x86-64_build_4355.exe 127 PID 3228 wrote to memory of 2432 3228 setup_x86-64_build_4355.exe 127 PID 2432 wrote to memory of 4420 2432 cmd.exe 129 PID 2432 wrote to memory of 4420 2432 cmd.exe 129 PID 3228 wrote to memory of 3932 3228 setup_x86-64_build_4355.exe 130 PID 3228 wrote to memory of 3932 3228 setup_x86-64_build_4355.exe 130 PID 3932 wrote to memory of 3560 3932 cmd.exe 132 PID 3932 wrote to memory of 3560 3932 cmd.exe 132 PID 3228 wrote to memory of 1972 3228 setup_x86-64_build_4355.exe 133 PID 3228 wrote to memory of 1972 3228 setup_x86-64_build_4355.exe 133 PID 1972 wrote to memory of 64 1972 cmd.exe 135 PID 1972 wrote to memory of 64 1972 cmd.exe 135 PID 3228 wrote to memory of 2224 3228 setup_x86-64_build_4355.exe 136 PID 3228 wrote to memory of 2224 3228 setup_x86-64_build_4355.exe 136 PID 2224 wrote to memory of 4388 2224 cmd.exe 138 PID 2224 wrote to memory of 4388 2224 cmd.exe 138 PID 3228 wrote to memory of 2720 3228 setup_x86-64_build_4355.exe 139 PID 3228 wrote to memory of 2720 3228 setup_x86-64_build_4355.exe 139 PID 2720 wrote to memory of 3224 2720 cmd.exe 141 PID 2720 wrote to memory of 3224 2720 cmd.exe 141 PID 3228 wrote to memory of 4016 3228 setup_x86-64_build_4355.exe 142 PID 3228 wrote to memory of 4016 3228 setup_x86-64_build_4355.exe 142 PID 3228 wrote to memory of 2820 3228 setup_x86-64_build_4355.exe 143 PID 3228 wrote to memory of 2820 3228 setup_x86-64_build_4355.exe 143 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1212 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86-64_build_4355\setup_x86-64_build_4355.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86-64_build_4355\setup_x86-64_build_4355.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"2⤵PID:3712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer"2⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get Manufacturer3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "gdb --version"2⤵PID:2372
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer"2⤵
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_ComputerSystem get Manufacturer3⤵PID:2564
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵PID:1572
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
PID:2984
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe""2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe"3⤵
- Views/modifies file attributes
PID:1212
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
PID:2160
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 960"2⤵
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Windows\system32\taskkill.exetaskkill /F /PID 9603⤵
- Kills process with taskkill
PID:4312
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 876"2⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\system32\taskkill.exetaskkill /F /PID 8763⤵
- Kills process with taskkill
PID:4420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3436"2⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\system32\taskkill.exetaskkill /F /PID 34363⤵
- Kills process with taskkill
PID:3560
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3520"2⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\system32\taskkill.exetaskkill /F /PID 35203⤵
- Kills process with taskkill
PID:64
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4792"2⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\system32\taskkill.exetaskkill /F /PID 47923⤵
- Kills process with taskkill
PID:4388
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3376"2⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\system32\taskkill.exetaskkill /F /PID 33763⤵
- Kills process with taskkill
PID:3224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"2⤵PID:4016
-
C:\Windows\system32\cmd.execmd.exe /c chcp3⤵PID:4376
-
C:\Windows\system32\chcp.comchcp4⤵PID:1052
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"2⤵PID:2820
-
C:\Windows\system32\cmd.execmd.exe /c chcp3⤵PID:184
-
C:\Windows\system32\chcp.comchcp4⤵PID:5060
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"2⤵PID:4688
-
C:\Windows\system32\tasklist.exetasklist /FO LIST3⤵
- Enumerates processes with tasklist
PID:1016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"2⤵PID:680
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Get-Clipboard3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"2⤵PID:312
-
C:\Windows\system32\netsh.exenetsh wlan show profiles3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"2⤵PID:1564
-
C:\Windows\system32\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:3984
-
-
C:\Windows\system32\HOSTNAME.EXEhostname3⤵PID:3100
-
-
C:\Windows\System32\Wbem\WMIC.exewmic logicaldisk get caption,description,providername3⤵
- Collects information from the system
PID:2284
-
-
C:\Windows\system32\net.exenet user3⤵PID:4400
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user4⤵PID:4680
-
-
-
C:\Windows\system32\query.exequery user3⤵PID:3436
-
C:\Windows\system32\quser.exe"C:\Windows\system32\quser.exe"4⤵PID:4412
-
-
-
C:\Windows\system32\net.exenet localgroup3⤵PID:2076
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup4⤵PID:2500
-
-
-
C:\Windows\system32\net.exenet localgroup administrators3⤵PID:3520
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators4⤵PID:836
-
-
-
C:\Windows\system32\net.exenet user guest3⤵PID:3080
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user guest4⤵PID:3424
-
-
-
C:\Windows\system32\net.exenet user administrator3⤵PID:3932
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user administrator4⤵PID:4776
-
-
-
C:\Windows\System32\Wbem\WMIC.exewmic startup get caption,command3⤵PID:2752
-
-
C:\Windows\system32\tasklist.exetasklist /svc3⤵
- Enumerates processes with tasklist
PID:2564
-
-
C:\Windows\system32\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:392
-
-
C:\Windows\system32\ROUTE.EXEroute print3⤵PID:4936
-
-
C:\Windows\system32\ARP.EXEarp -a3⤵PID:2400
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -ano3⤵
- Gathers network information
PID:3440
-
-
C:\Windows\system32\sc.exesc query type= service state= all3⤵
- Launches sc.exe
PID:4900
-
-
C:\Windows\system32\netsh.exenetsh firewall show state3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1844
-
-
C:\Windows\system32\netsh.exenetsh firewall show config3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3128
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"2⤵PID:4080
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵PID:4024
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"2⤵PID:2412
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵PID:4168
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4328,i,1236064252342462940,13180713657498721890,262144 --variations-seed-version --mojo-platform-channel-handle=3796 /prefetch:81⤵PID:3376
Network
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24.3MB
MD528ff0cac1b7a4225c599b7366f5afb42
SHA189562ab281aecd486f4d07e5cd6f1cb823459521
SHA256f6affa968b207a553f4825db54f148a2697c7a786eac16f83df8997a5ea85044
SHA512a88a332f72e38386eaf9c689df65f4762a1f9c67cab9a63f94beb199d9c04543ff16f522b2ebe180600b78f2fb3d0f49808349ab5dcaa3d5ef5153651c12c95d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82