Analysis
-
max time kernel
240s -
max time network
243s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 16:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1238808121997135882/1258091288566173818/tweaks.rar?ex=6686c851&is=668576d1&hm=0574d6b7eb121988452c2cbe304a6d9c89c91de690b21359223814fff0565a1c&
Resource
win10v2004-20240508-en
General
-
Target
https://cdn.discordapp.com/attachments/1238808121997135882/1258091288566173818/tweaks.rar?ex=6686c851&is=668576d1&hm=0574d6b7eb121988452c2cbe304a6d9c89c91de690b21359223814fff0565a1c&
Malware Config
Signatures
-
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\system32\SRU\SRU.chk svchost.exe File opened for modification C:\Windows\system32\SRU\SRU.log svchost.exe File opened for modification C:\Windows\system32\SRU\SRUDB.dat svchost.exe File opened for modification C:\Windows\system32\SRU\SRUDB.jfm svchost.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtl64.inf_amd64_8e9c2368fe308df2\netrtl64.PNF svchost.exe File created C:\Windows\system32\NDF\{22083CBF-1002-4C8D-BB48-76CAAFA137E4}-temp-07032024-1636.etl svchost.exe File opened for modification C:\Windows\system32\NDF\{22083CBF-1002-4C8D-BB48-76CAAFA137E4}-temp-07032024-1636.etl svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Network\Connections\Pbk\_hiddenPbk\rasphone.pbk svchost.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1552 ipconfig.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\RAS AutoDial svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\RAS AutoDial\Default svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1432 msedge.exe 1432 msedge.exe 2036 msedge.exe 2036 msedge.exe 4832 identity_helper.exe 4832 identity_helper.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 5688 sdiagnhost.exe 5688 sdiagnhost.exe 6072 svchost.exe 6072 svchost.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 656 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5688 sdiagnhost.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 1680 msdt.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2912 2036 msedge.exe 81 PID 2036 wrote to memory of 2912 2036 msedge.exe 81 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 2428 2036 msedge.exe 82 PID 2036 wrote to memory of 1432 2036 msedge.exe 83 PID 2036 wrote to memory of 1432 2036 msedge.exe 83 PID 2036 wrote to memory of 2664 2036 msedge.exe 84 PID 2036 wrote to memory of 2664 2036 msedge.exe 84 PID 2036 wrote to memory of 2664 2036 msedge.exe 84 PID 2036 wrote to memory of 2664 2036 msedge.exe 84 PID 2036 wrote to memory of 2664 2036 msedge.exe 84 PID 2036 wrote to memory of 2664 2036 msedge.exe 84 PID 2036 wrote to memory of 2664 2036 msedge.exe 84 PID 2036 wrote to memory of 2664 2036 msedge.exe 84 PID 2036 wrote to memory of 2664 2036 msedge.exe 84 PID 2036 wrote to memory of 2664 2036 msedge.exe 84 PID 2036 wrote to memory of 2664 2036 msedge.exe 84 PID 2036 wrote to memory of 2664 2036 msedge.exe 84 PID 2036 wrote to memory of 2664 2036 msedge.exe 84 PID 2036 wrote to memory of 2664 2036 msedge.exe 84 PID 2036 wrote to memory of 2664 2036 msedge.exe 84 PID 2036 wrote to memory of 2664 2036 msedge.exe 84 PID 2036 wrote to memory of 2664 2036 msedge.exe 84 PID 2036 wrote to memory of 2664 2036 msedge.exe 84 PID 2036 wrote to memory of 2664 2036 msedge.exe 84 PID 2036 wrote to memory of 2664 2036 msedge.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1238808121997135882/1258091288566173818/tweaks.rar?ex=6686c851&is=668576d1&hm=0574d6b7eb121988452c2cbe304a6d9c89c91de690b21359223814fff0565a1c&1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9924846f8,0x7ff992484708,0x7ff9924847182⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 /prefetch:82⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4328 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2216 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4276 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:4436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3968
-
C:\Windows\System32\msdt.exe"C:\Windows\System32\msdt.exe" -skip TRUE -id NetworkDiagnosticsNetworkAdapter -ep NetworkDiagnosticsPNI1⤵
- Suspicious use of FindShellTrayWindow
PID:1680
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5688 -
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter AdapterGuid={5BE78E21-D44E-49DB-A7D4-C5C794B7F262}2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5920
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter AdapterGuid={5BE78E21-D44E-49DB-A7D4-C5C794B7F262}2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3296
-
-
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /all2⤵
- Gathers network information
PID:1552
-
-
C:\Windows\system32\ROUTE.EXE"C:\Windows\system32\ROUTE.EXE" print2⤵PID:3512
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" /f NetworkConfiguration.ddf2⤵PID:5148
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNoNetwork -p -s DPS1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:6072
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s WdiServiceHost1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6100
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s WdiSystemHost1⤵PID:6128
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\ElevatedDiagnostics\1612347604\2024070316.000\NetworkDiagnostics.debugreport.xml
Filesize205KB
MD5631d0280af65fdac636262e79ae572a6
SHA199ec45dc183fddf4b62946ff3d8d4801b23ee26c
SHA256da985fc2e4dae5b2f004e585431d98d3e98780e66364960a6b49f3f4a362fd69
SHA5129f9a17fedddb6d713f6576e4f1363535fb077feefaa5cce058d88bb10f39b88c12e61b82f4a755bb0027e13a7fb0596518138c682bf35bb611afe837dabed94d
-
Filesize
47KB
MD5310e1da2344ba6ca96666fb639840ea9
SHA1e8694edf9ee68782aa1de05470b884cc1a0e1ded
SHA25667401342192babc27e62d4c1e0940409cc3f2bd28f77399e71d245eae8d3f63c
SHA51262ab361ffea1f0b6ff1cc76c74b8e20c2499d72f3eb0c010d47dba7e6d723f9948dba3397ea26241a1a995cffce2a68cd0aaa1bb8d917dd8f4c8f3729fa6d244
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\7487113c-7f66-4f6d-8988-07e02db36c4f.tmp
Filesize5KB
MD56e2f4551edd918666c68c427df1fb8fd
SHA1a5a771b8bdb0b7ef49c23250ad99020a22e41f5f
SHA256491711d3d0fc8b80eafa6409e609aebfde2966d73e2ac9131e6766d1f2ce78ca
SHA5126cb15c15b27c197c95b5247169a26c6a38e7212df51135ea5d281d0bca00c38c63d10b86b0d90d440aa497d0d7961468facefb7f82a5532328ec5e0286921d1f
-
Filesize
6KB
MD54d2c63212199230c0f91878525ab146e
SHA1d1fe54d02bfb17995922258064c6e24a958b0a2c
SHA25663c9f0afc2a14a25d6902b8ece16bfbc44fcf5092a520e56aed06f6f2429ab08
SHA51266a9929aed23e21689994692aa956305361a88ae76e37240b4f7b0eac613b92c6016df18ea210c5d5a93de565d6d6a0809d4b8344d5dbba2a5684e4c6f194ac8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
9KB
MD563887f535ad056c5b421886efd00fd37
SHA1108e19376b8930116eee21831545e4f994c5e900
SHA256c5bb57a80aba9700e634c38df074ccab50a5526b0b0064abde97e44bd6b53fdd
SHA51244a0c0feb75aa796c640265db72d7a761eecf98341fed583cd7e78fe164738dde70ef234d17845ced58fbc9bd9addc60fafb16d70765e01a6c3a99306e14f393
-
Filesize
8KB
MD5dedd0b189feaba192a64691040a65893
SHA1ce67ab146ab59fbb9bfb976f121d221b3e83f6ac
SHA2568b19a0f770213cc89f7c5f27d911d69d73b7697eb2c5b48b86cb85d9f6b37d3a
SHA5128726d405cc6bbeefd1b5234ab5121106647a190366cff7de84d4156b0ef3351f5dede7bdeb272e5dca8286d20a949fde098667449ae67ec3f9ab6511943d2f28
-
Filesize
192KB
MD57e36421d06311553b73fd0a5a409f6d1
SHA1de560d1b30098ff48752d0c6f7662ff266a92d23
SHA256359220805d27a8a7720c579e798fe1c312d4c45e5bf137d7c1fce1b2859504fa
SHA512221cf431ee3429e677d9a3e197fd48c8a37174151ae7cb4a463ac85d19dbf5f45ab98fef8466a9b31489d9e94dafd90903cf5392b0d32390aaf693193f1a1b93
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5f8c6e6e6d8b773c1bd7c9c5162356b3e
SHA16c961728da2e65c6932227ffaf6c060cad67a58e
SHA25660bf2a3bedda1d92183457ccae6bc50fda2f15ca7cfd2de667f5d6a7c004f846
SHA512b0b0254616d3cde5e2a32fc390c5b6c55a29a8a3c6001b42e29e789a277f5795eaf54ce3094e4f3483a2d07c4681688d32d8247469ddb3261ac661650f9961e2
-
Filesize
231B
MD500848049d4218c485d9e9d7a54aa3b5f
SHA1d1d5f388221417985c365e8acaec127b971c40d0
SHA256ffeafbb8e7163fd7ec9abc029076796c73cd7b4eddaeeda9ba394c547419769e
SHA5123a4874a5289682e2b32108740feea586cb9ccdad9ca08bf30f67c9742370c081ad943ea714f08dbf722f9f98f3b0bb307619a8ba47f96b24301c68b0fd1086d9
-
Filesize
1KB
MD513406d27d5537fb2d93c856d3dd998b0
SHA106a339d699be6a2531e207c804f6705a1841b07f
SHA2561d56eaded0b7fcdd2890d9ff8a984b04f6b02306e2384d3f8672dfc4be423a20
SHA512ae3f8fca6c3117a8c996c00d576ebb9b2a2bbb2ef0383dbb18667d3b2b49fe8e8ab835752c785efb0ab3e6c3423bf4747d90405bc972b7805944f46c5eb65cb8
-
Filesize
4KB
MD5d257fd8808d1f9b5b7e72c406532a2ce
SHA1c31ae241ca0564ccceb0f5125311e140c025fcc1
SHA256cd2be7137bbb0afc727bc4716a500ac9058ac82c638bf6a7f8aeb20fbc4b18a8
SHA512cc6618d4d31b8ad01fdec87fb1fb31f64ae2361bfd77dfe85a928f4f5fd8c08de7be033d784031eecfa7a333ee8f50b0afd3f9e0a1ebf843110c5e41bc7ec50a
-
Filesize
978B
MD5ca80170c999177c5121984fc2f027f98
SHA146cff2c8335b7188bf696f80c70873aec25ae466
SHA256ffb6010dd5c5c86a83da84da006a8751623f7f1695d8edd51d5ada04fb1de45a
SHA512c46ebb3dc3fe930ce12381a91ffa7b70c45626428dca6eecd15bf6a5ec44d2712d3fc35f270f27bcbeb652dc5182d2f37ce5254f202b3baf646f8188f06f42e6
-
Filesize
283B
MD5bfadb988f201edd670f2071a82020b55
SHA1d44365889da4243d0ee5d3ee76240103a2fd9f6f
SHA256d8b6a6f6369e3e861be62289b77abcb8b11466b389596e6c67a78aae9dd0f64b
SHA5127a3b20dbc167403ced384f526a4c26fe42e38b0e0adeab4190df78f3dd2b44003a7ce1e4d6cb765f45c09f63bf56730b316c8f42da42f375ce03c06d550ce19b
-
Filesize
11KB
MD5d213491a2d74b38a9535d616b9161217
SHA1bde94742d1e769638e2de84dfb099f797adcc217
SHA2564662c3c94e0340a243c2a39ca8a88fd9f65c74fb197644a11d4ffcae6b191211
SHA5125fd8b91b27935711495934e5d7ca14f9dd72bc40a38072595879ef334a47f99e0608087ddc62668c6f783938d9f22a3688c5cdef3a9ad6c3575f3cfa5a3b0104
-
Filesize
25KB
MD5d0cfc204ca3968b891f7ce0dccfb2eda
SHA156dad1716554d8dc573d0ea391f808e7857b2206
SHA256e3940266b4368c04333db89804246cb89bf2073626f22b8de72bea27c522282a
SHA5124d2225b599ad8af8ba8516f12cfddca5ec0ce69c5c80b133a6a323e9aaf5e0312efbcfa54d2e4462a5095f9a7c42b9d5b39f3204e0be72c3b1992cf33b22087c
-
Filesize
10KB
MD59b222d8ec4b20860f10ebf303035b984
SHA1b30eea35c2516afcab2c49ef6531af94efaf7e1a
SHA256a32e13da40ac4b9e1dac7dd28bc1d25e2f2136b61ff93be943018b20796f15bc
SHA5128331337ccb6e3137b01aeec03e6921fd3b9e56c44fa1b17545ae5c7bfcdd39fcd8a90192884b3a82f56659009e24b63ce7f500e8766fd01e8d4e60a52de0fe67
-
Filesize
567B
MD5a660422059d953c6d681b53a6977100e
SHA10c95dd05514d062354c0eecc9ae8d437123305bb
SHA256d19677234127c38a52aec23686775a8eb3f4e3a406f4a11804d97602d6c31813
SHA51226f8cf9ac95ff649ecc2ed349bc6c7c3a04b188594d5c3289af8f2768ab59672bc95ffefcc83ed3ffa44edd0afeb16a4c2490e633a89fce7965843674d94b523
-
Filesize
53KB
MD5c912faa190464ce7dec867464c35a8dc
SHA1d1c6482dad37720db6bdc594c4757914d1b1dd70
SHA2563891846307aa9e83bca66b13198455af72af45bf721a2fbd41840d47e2a91201
SHA5125c34352d36459fd8fcda5b459a2e48601a033af31d802a90ed82c443a5a346b9480880d30c64db7ad0e4a8c35b98c98f69eceedad72f2a70d9c6cca74dce826a
-
Filesize
2KB
MD50c75ae5e75c3e181d13768909c8240ba
SHA1288403fc4bedaacebccf4f74d3073f082ef70eb9
SHA256de5c231c645d3ae1e13694284997721509f5de64ee5c96c966cdfda9e294db3f
SHA5128fc944515f41a837c61a6c4e5181ca273607a89e48fbf86cf8eb8db837aed095aa04fc3043029c3b5cb3710d59abfd86f086ac198200f634bfb1a5dd0823406b
-
Filesize
5KB
MD5380768979618b7097b0476179ec494ed
SHA1af2a03a17c546e4eeb896b230e4f2a52720545ab
SHA2560637af30fc3b3544b1f516f6196a8f821ffbfa5d36d65a8798aeeadbf2e8a7c2
SHA512b9ef59e9bfdbd49052a4e754ead8cd54b77e79cc428e7aee2b80055ff5f0b038584af519bd2d66258cf3c01f8cc71384f6959ee32111eac4399c47e1c2352302
-
Filesize
478KB
MD5580dc3658fa3fe42c41c99c52a9ce6b0
SHA13c4be12c6e3679a6c2267f88363bbd0e6e00cac5
SHA2565b7aa413e4a64679c550c77e6599a1c940ee947cbdf77d310e142a07a237aad2
SHA51268c52cd7b762b8f5d2f546092ed9c4316924fa04bd3ab748ab99541a8b4e7d9aec70acf5c9594d1457ad3a2f207d0c189ec58421d4352ddbc7eae453324d13f2
-
Filesize
17KB
MD544c4385447d4fa46b407fc47c8a467d0
SHA141e4e0e83b74943f5c41648f263b832419c05256
SHA2568be175e8fbdae0dade54830fece6c6980d1345dbeb4a06c07f7efdb1152743f4
SHA512191cd534e85323a4cd9649a1fc372312ed4a600f6252dffc4435793650f9dd40d0c0e615ba5eb9aa437a58af334146aac7c0ba08e0a1bf24ec4837a40f966005