Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
3WorldWars.exe
windows10-1703-x64
7$PLUGINSDI...er.dll
windows10-1703-x64
1$PLUGINSDI...ls.dll
windows10-1703-x64
3$PLUGINSDI...em.dll
windows10-1703-x64
3$PLUGINSDI...ll.dll
windows10-1703-x64
3$PLUGINSDIR/app-64.7z
windows10-1703-x64
3LICENSES.c...m.html
windows10-1703-x64
1WorldWars.exe
windows10-1703-x64
8chrome_100...nt.pak
windows10-1703-x64
3chrome_200...nt.pak
windows10-1703-x64
3d3dcompiler_47.dll
windows10-1703-x64
1ffmpeg.dll
windows10-1703-x64
1libEGL.dll
windows10-1703-x64
1libGLESv2.dll
windows10-1703-x64
1locales/af.ps1
windows10-1703-x64
3locales/en-US.pak
windows10-1703-x64
3locales/uk.ps1
windows10-1703-x64
3resources.pak
windows10-1703-x64
3resources/app.asar
windows10-1703-x64
3resources/elevate.exe
windows10-1703-x64
1snapshot_blob.bin
windows10-1703-x64
3v8_context...ot.bin
windows10-1703-x64
3vk_swiftshader.dll
windows10-1703-x64
1vk_swiftsh...d.json
windows10-1703-x64
3vulkan-1.dll
windows10-1703-x64
1$PLUGINSDI...ec.dll
windows10-1703-x64
3$PLUGINSDI...7z.dll
windows10-1703-x64
3$R0/Uninst...rs.exe
windows10-1703-x64
7$PLUGINSDI...ls.dll
windows10-1703-x64
3$PLUGINSDI...em.dll
windows10-1703-x64
3$PLUGINSDI...ll.dll
windows10-1703-x64
3$PLUGINSDI...ec.dll
windows10-1703-x64
3Resubmissions
16/07/2024, 12:36
240716-ps1mhswamh 716/07/2024, 01:37
240716-b2cedsyhjn 716/07/2024, 00:50
240716-a64h1azfkb 8Analysis
-
max time kernel
301s -
max time network
262s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
16/07/2024, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
WorldWars.exe
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/app-64.7z
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
LICENSES.chromium.html
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
WorldWars.exe
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
chrome_100_percent.pak
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
chrome_200_percent.pak
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
d3dcompiler_47.dll
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
ffmpeg.dll
Resource
win10-20240611-en
Behavioral task
behavioral13
Sample
libEGL.dll
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
libGLESv2.dll
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
locales/af.ps1
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
locales/en-US.pak
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
locales/uk.ps1
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
resources.pak
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
resources/app.asar
Resource
win10-20240611-en
Behavioral task
behavioral20
Sample
resources/elevate.exe
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
snapshot_blob.bin
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
v8_context_snapshot.bin
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
vk_swiftshader.dll
Resource
win10-20240404-en
Behavioral task
behavioral24
Sample
vk_swiftshader_icd.json
Resource
win10-20240404-en
Behavioral task
behavioral25
Sample
vulkan-1.dll
Resource
win10-20240404-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10-20240404-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10-20240404-en
Behavioral task
behavioral28
Sample
$R0/Uninstall WorldWars.exe
Resource
win10-20240404-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10-20240611-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/System.dll
Resource
win10-20240404-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10-20240404-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10-20240404-en
General
-
Target
WorldWars.exe
-
Size
154.6MB
-
MD5
2083e38dc689c08455a74b5201f3ebb2
-
SHA1
b905d6d3ba73eba3b219ea6de7bb7e42de2605fb
-
SHA256
5a48729eeb6e105d5849faee5d4888841c02263622e2fdd5b66309186910d7a2
-
SHA512
6d16116a78aded98f26b44f6277e92f7f3296a752eef8247b3976f718e5b79144f353451687ebde16f6a559d868b25b46a2b9c84dc306c015507ae93efadc528
-
SSDEEP
1572864:uTmw0ciLNpDPuAvHxJLkY2O6Ea3f9kwZXeT6EivLp1vUAtdjtZn+f4FnIvGaC9dU:pv6E70+Mk
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 4176 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 436 mt55v.exe -
Loads dropped DLL 2 IoCs
pid Process 824 WorldWars.exe 436 mt55v.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
pid Process 768 cmd.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2896 tasklist.exe 1556 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2388 powershell.exe 2388 powershell.exe 2388 powershell.exe 4564 powershell.exe 4564 powershell.exe 4564 powershell.exe 4288 WorldWars.exe 4288 WorldWars.exe 4176 powershell.exe 4176 powershell.exe 4176 powershell.exe 408 WorldWars.exe 408 WorldWars.exe 408 WorldWars.exe 408 WorldWars.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2896 tasklist.exe Token: SeDebugPrivilege 2388 powershell.exe Token: SeDebugPrivilege 1556 tasklist.exe Token: SeDebugPrivilege 4564 powershell.exe Token: SeShutdownPrivilege 824 WorldWars.exe Token: SeCreatePagefilePrivilege 824 WorldWars.exe Token: SeIncreaseQuotaPrivilege 1240 WMIC.exe Token: SeSecurityPrivilege 1240 WMIC.exe Token: SeTakeOwnershipPrivilege 1240 WMIC.exe Token: SeLoadDriverPrivilege 1240 WMIC.exe Token: SeSystemProfilePrivilege 1240 WMIC.exe Token: SeSystemtimePrivilege 1240 WMIC.exe Token: SeProfSingleProcessPrivilege 1240 WMIC.exe Token: SeIncBasePriorityPrivilege 1240 WMIC.exe Token: SeCreatePagefilePrivilege 1240 WMIC.exe Token: SeBackupPrivilege 1240 WMIC.exe Token: SeRestorePrivilege 1240 WMIC.exe Token: SeShutdownPrivilege 1240 WMIC.exe Token: SeDebugPrivilege 1240 WMIC.exe Token: SeSystemEnvironmentPrivilege 1240 WMIC.exe Token: SeRemoteShutdownPrivilege 1240 WMIC.exe Token: SeUndockPrivilege 1240 WMIC.exe Token: SeManageVolumePrivilege 1240 WMIC.exe Token: 33 1240 WMIC.exe Token: 34 1240 WMIC.exe Token: 35 1240 WMIC.exe Token: 36 1240 WMIC.exe Token: SeIncreaseQuotaPrivilege 1240 WMIC.exe Token: SeSecurityPrivilege 1240 WMIC.exe Token: SeTakeOwnershipPrivilege 1240 WMIC.exe Token: SeLoadDriverPrivilege 1240 WMIC.exe Token: SeSystemProfilePrivilege 1240 WMIC.exe Token: SeSystemtimePrivilege 1240 WMIC.exe Token: SeProfSingleProcessPrivilege 1240 WMIC.exe Token: SeIncBasePriorityPrivilege 1240 WMIC.exe Token: SeCreatePagefilePrivilege 1240 WMIC.exe Token: SeBackupPrivilege 1240 WMIC.exe Token: SeRestorePrivilege 1240 WMIC.exe Token: SeShutdownPrivilege 1240 WMIC.exe Token: SeDebugPrivilege 1240 WMIC.exe Token: SeSystemEnvironmentPrivilege 1240 WMIC.exe Token: SeRemoteShutdownPrivilege 1240 WMIC.exe Token: SeUndockPrivilege 1240 WMIC.exe Token: SeManageVolumePrivilege 1240 WMIC.exe Token: 33 1240 WMIC.exe Token: 34 1240 WMIC.exe Token: 35 1240 WMIC.exe Token: 36 1240 WMIC.exe Token: SeIncreaseQuotaPrivilege 5028 WMIC.exe Token: SeSecurityPrivilege 5028 WMIC.exe Token: SeTakeOwnershipPrivilege 5028 WMIC.exe Token: SeLoadDriverPrivilege 5028 WMIC.exe Token: SeSystemProfilePrivilege 5028 WMIC.exe Token: SeSystemtimePrivilege 5028 WMIC.exe Token: SeProfSingleProcessPrivilege 5028 WMIC.exe Token: SeIncBasePriorityPrivilege 5028 WMIC.exe Token: SeCreatePagefilePrivilege 5028 WMIC.exe Token: SeBackupPrivilege 5028 WMIC.exe Token: SeRestorePrivilege 5028 WMIC.exe Token: SeShutdownPrivilege 5028 WMIC.exe Token: SeDebugPrivilege 5028 WMIC.exe Token: SeSystemEnvironmentPrivilege 5028 WMIC.exe Token: SeRemoteShutdownPrivilege 5028 WMIC.exe Token: SeUndockPrivilege 5028 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 824 wrote to memory of 1580 824 WorldWars.exe 73 PID 824 wrote to memory of 1580 824 WorldWars.exe 73 PID 824 wrote to memory of 208 824 WorldWars.exe 75 PID 824 wrote to memory of 208 824 WorldWars.exe 75 PID 1580 wrote to memory of 2388 1580 cmd.exe 77 PID 1580 wrote to memory of 2388 1580 cmd.exe 77 PID 208 wrote to memory of 2896 208 cmd.exe 78 PID 208 wrote to memory of 2896 208 cmd.exe 78 PID 824 wrote to memory of 2112 824 WorldWars.exe 80 PID 824 wrote to memory of 2112 824 WorldWars.exe 80 PID 824 wrote to memory of 768 824 WorldWars.exe 82 PID 824 wrote to memory of 768 824 WorldWars.exe 82 PID 2112 wrote to memory of 1556 2112 cmd.exe 84 PID 2112 wrote to memory of 1556 2112 cmd.exe 84 PID 768 wrote to memory of 4564 768 cmd.exe 85 PID 768 wrote to memory of 4564 768 cmd.exe 85 PID 824 wrote to memory of 3632 824 WorldWars.exe 86 PID 824 wrote to memory of 3632 824 WorldWars.exe 86 PID 3632 wrote to memory of 1240 3632 cmd.exe 88 PID 3632 wrote to memory of 1240 3632 cmd.exe 88 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 2680 824 WorldWars.exe 89 PID 824 wrote to memory of 4288 824 WorldWars.exe 90 PID 824 wrote to memory of 4288 824 WorldWars.exe 90 PID 824 wrote to memory of 4068 824 WorldWars.exe 91 PID 824 wrote to memory of 4068 824 WorldWars.exe 91 PID 4068 wrote to memory of 5028 4068 cmd.exe 93 PID 4068 wrote to memory of 5028 4068 cmd.exe 93 PID 824 wrote to memory of 4668 824 WorldWars.exe 94 PID 824 wrote to memory of 4668 824 WorldWars.exe 94 PID 4668 wrote to memory of 4644 4668 cmd.exe 96 PID 4668 wrote to memory of 4644 4668 cmd.exe 96 PID 824 wrote to memory of 4680 824 WorldWars.exe 97 PID 824 wrote to memory of 4680 824 WorldWars.exe 97 PID 4680 wrote to memory of 408 4680 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\WorldWars.exe"C:\Users\Admin\AppData\Local\Temp\WorldWars.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"2⤵
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,87,212,196,210,124,230,59,67,161,164,74,188,173,47,152,49,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,42,144,174,75,151,108,166,153,222,237,136,28,87,26,24,82,182,202,107,187,144,164,220,51,246,242,25,119,9,158,46,152,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,176,48,48,10,29,108,244,168,17,173,244,197,21,33,68,36,65,27,172,90,66,1,7,0,101,23,28,241,151,75,50,82,48,0,0,0,214,89,73,239,166,62,101,217,82,172,121,245,141,59,225,236,8,184,155,69,178,175,226,188,29,222,188,22,5,232,234,251,132,97,77,145,69,158,199,224,125,249,24,219,101,156,14,212,64,0,0,0,52,84,202,201,230,21,226,20,45,91,90,45,205,168,20,127,116,11,66,185,143,23,144,32,219,138,94,234,96,214,154,75,20,214,187,201,45,199,214,65,249,116,69,34,116,167,116,77,113,114,200,120,42,103,245,228,226,43,177,204,28,237,76,122), $null, 'CurrentUser')"2⤵
- An obfuscated cmd.exe command-line is typically used to evade detection.
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,87,212,196,210,124,230,59,67,161,164,74,188,173,47,152,49,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,42,144,174,75,151,108,166,153,222,237,136,28,87,26,24,82,182,202,107,187,144,164,220,51,246,242,25,119,9,158,46,152,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,176,48,48,10,29,108,244,168,17,173,244,197,21,33,68,36,65,27,172,90,66,1,7,0,101,23,28,241,151,75,50,82,48,0,0,0,214,89,73,239,166,62,101,217,82,172,121,245,141,59,225,236,8,184,155,69,178,175,226,188,29,222,188,22,5,232,234,251,132,97,77,145,69,158,199,224,125,249,24,219,101,156,14,212,64,0,0,0,52,84,202,201,230,21,226,20,45,91,90,45,205,168,20,127,116,11,66,185,143,23,144,32,219,138,94,234,96,214,154,75,20,214,187,201,45,199,214,65,249,116,69,34,116,167,116,77,113,114,200,120,42,103,245,228,226,43,177,204,28,237,76,122), $null, 'CurrentUser')3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4564
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\System32\Wbem\WMIC.exewmic cpu get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
-
C:\Users\Admin\AppData\Local\Temp\WorldWars.exe"C:\Users\Admin\AppData\Local\Temp\WorldWars.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\WorldWars" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1804,i,6384069091323226160,3249909332704969315,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\WorldWars.exe"C:\Users\Admin\AppData\Local\Temp\WorldWars.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\WorldWars" --mojo-platform-channel-handle=2184 --field-trial-handle=1804,i,6384069091323226160,3249909332704969315,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic cpu get ProcessorId"2⤵
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\System32\Wbem\WMIC.exewmic cpu get ProcessorId3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic baseboard get Product"2⤵
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\System32\Wbem\WMIC.exewmic baseboard get Product3⤵PID:4644
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic baseboard get SerialNumber"2⤵
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\System32\Wbem\WMIC.exewmic baseboard get SerialNumber3⤵PID:408
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic OS get caption"2⤵PID:96
-
C:\Windows\System32\Wbem\WMIC.exewmic OS get caption3⤵PID:4396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic computersystem get TotalPhysicalMemory"2⤵PID:4320
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get TotalPhysicalMemory3⤵PID:2280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic path win32_videocontroller get caption,PNPDeviceID"2⤵PID:4440
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_videocontroller get caption,PNPDeviceID3⤵PID:1236
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic diskdrive get SerialNumber"2⤵PID:5096
-
C:\Windows\System32\Wbem\WMIC.exewmic diskdrive get SerialNumber3⤵PID:5052
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic path win32_computersystemproduct get uuid"2⤵PID:4948
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_computersystemproduct get uuid3⤵PID:4472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell -WindowStyle Hidden -Command "& {Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\mt55v.exe' -ArgumentList 'zt43dmuzeM' -WindowStyle Hidden}""2⤵PID:1152
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "& {Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\mt55v.exe' -ArgumentList 'zt43dmuzeM' -WindowStyle Hidden}"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\mt55v.exe"C:\Users\Admin\AppData\Local\Temp\mt55v.exe" zt43dmuzeM4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\WorldWars.exe"C:\Users\Admin\AppData\Local\Temp\WorldWars.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --user-data-dir="C:\Users\Admin\AppData\Roaming\WorldWars" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1328 --field-trial-handle=1804,i,6384069091323226160,3249909332704969315,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55d574dc518025fad52b7886c1bff0e13
SHA168217a5f9e9a64ca8fed9eefa4171786a8f9f8f7
SHA256755c4768f6e384030805284ab88689a325431667e9ab11d9aeaa55e9739742f2
SHA51221de152e07d269b265dae58d46e8c68a3268b2f78d771d4fc44377a14e0c6e73aadae923dcfd34ce2ef53c2eaa53d4df8f281d9b8a627edee213946c9ef37d13
-
Filesize
1KB
MD596d660046a866f5d23d49d34293afeda
SHA132eb45e2a1f149223bd44b775a39951ceb8b8357
SHA256990f6b9bf66790f2d6744f844cc2c3270387de665cdca0c1bc79195090690c52
SHA512a914da9f2a54a31cd64bfe40488e30a370fb04bc8fe680d328ffdbb5c757ebacb6c1b4826da7f06a052dd85af48e00946a9baa235fff1c7c90c53b3b6e3760ff
-
Filesize
1KB
MD56a15cfadc614cc97c6a9470ba8582a33
SHA11dc32c10fbe4a128fa76921e3c45b363e027798f
SHA2566c3b442efc8f99114eaefb991fed4fe2b02bfc0fbcfc26e82aafe6ede0dd2f78
SHA5126797a27fe112a003c456c1bc6fe1c1c443fe941b7b9f2c1b527d90273103b95c8c23d3cd15b4cc2688e65af5b695a95daaea2d7bf654c3ccc00e4ef5889b2fd2
-
Filesize
85B
MD508dc8720082b2ede1ec6e33339f189c1
SHA1e1b7e75d052d2ad60f42d400e968a5e9aa91481d
SHA2561de83568c3158f5b5e9ae372d31453115a5c166eb83692a6c94ea6c7e1e0387c
SHA512e9ed7977ac62e2ae15151e376d6ced8fd44a74cc62499bf61bf094f9862f99c1b8e1128b9a7d4971a6a726e27c559c99a155878297703f5161d9997a0ff0e6d5
-
Filesize
22B
MD576cdb2bad9582d23c1f6f4d868218d6c
SHA1b04f3ee8f5e43fa3b162981b50bb72fe1acabb33
SHA2568739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85
SHA5125e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f
-
Filesize
14B
MD5b4b41665eb819824e886204a28cc610b
SHA1e778edb6f635f665c0b512748b8fec6a2a23a88b
SHA256635f814c1f34ee53ee62b67f989fec91eb0e08f63769ab4bd22cf4206a2cfff6
SHA51237648652b1df14aa427382a4dac70d58a107d3dd77bd1977afc3acce8c56b7b6531b67d33f4b61b9fb8fbb9230ab0dfd461db07c1cc11a2923604e910a743d67
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
41.7MB
MD53086eaa607229cc7db53731758a73bc4
SHA10eb46695a5b2c225e60a0bea6d3ccf020793928f
SHA256805520950d228007ed5f7ebd994444fbc02b3ba9010cf8408b8b76123981b263
SHA512e72f3369c2759f0de5ac2b99058ac0bd1f3b6763a9b6a6a021b3fdab2d8c676dc26908a65ccd617e8cd5d9c589ee6d67434ec18bb5b7d85dc40fe6d9ee450ea7
-
Filesize
1.4MB
MD556192831a7f808874207ba593f464415
SHA1e0c18c72a62692d856da1f8988b0bc9c8088d2aa
SHA2566aa8763714aa5199a4065259af792292c2a7d6a2c381aa27007255421e5c9d8c
SHA512c82aa1ef569c232b4b4f98a3789f2390e5f7bf5cc7e73d199fe23a3f636817edfdc2fb49ce7f69169c028a9dd5ab9f63e8f64964bb22424fc08db71e85054a33
-
\Users\Admin\AppData\Local\Temp\pkg\89cbacbc842eb08645bf0b2ea5a03f0a0504a213aa123242343e5588e2f0149c\launcher.node
Filesize275KB
MD5b0de8894ef937d27715e81eedb6177b9
SHA17a3cce84c94c2a7cfc9b260d219d3738f0f93a99
SHA25689cbacbc842eb08645bf0b2ea5a03f0a0504a213aa123242343e5588e2f0149c
SHA5129166ddf27a1094817aba685c66bd2fc60d57c4d0961d96931a4e56bac34de339334532196253b676276241d88214e2927b1fc174acaf33296cf8f84e1455b055