Analysis
-
max time kernel
146s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 01:10
Behavioral task
behavioral1
Sample
Random.exe
Resource
win10v2004-20240709-en
General
-
Target
Random.exe
-
Size
10.8MB
-
MD5
6d1350a0bf5967f1ba997dedffe269c3
-
SHA1
62c6acf6290d228cdaf6831a453843d48ff48bea
-
SHA256
b081ff18e10debb0c42c059e33b04cf04d9fdfe52b48be421552b48989f28463
-
SHA512
8468c3fb5c6f807354c2ad532214deac8b446c7b362d1c4eeb97d28a02954b8c8971ed5bd3bf76e58e892c13d72faf79365a5dee6c4b3948ed387b8c1280e037
-
SSDEEP
196608:2xUHbhJb3tQk5tsurErvI9pWj+laeAnags22/VCES9ZoQlyKvo+:/Hbh7v5tsurEUWjEVkiVCDnrkR+
Malware Config
Signatures
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 464 netsh.exe 3728 netsh.exe -
Loads dropped DLL 33 IoCs
pid Process 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe 2804 Random.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x00070000000234f6-47.dat upx behavioral1/memory/2804-51-0x00007FFE28F00000-0x00007FFE295C5000-memory.dmp upx behavioral1/files/0x00070000000234c6-53.dat upx behavioral1/files/0x00070000000234f0-58.dat upx behavioral1/memory/2804-82-0x00007FFE3E7A0000-0x00007FFE3E7AF000-memory.dmp upx behavioral1/files/0x00070000000234cd-76.dat upx behavioral1/memory/2804-81-0x00007FFE3DAF0000-0x00007FFE3DB15000-memory.dmp upx behavioral1/files/0x00070000000234f7-84.dat upx behavioral1/files/0x00070000000234c4-87.dat upx behavioral1/files/0x00070000000234ce-89.dat upx behavioral1/files/0x00070000000234f8-90.dat upx behavioral1/memory/2804-97-0x00007FFE38570000-0x00007FFE386EE000-memory.dmp upx behavioral1/files/0x00070000000234ec-98.dat upx behavioral1/memory/2804-95-0x00007FFE3D630000-0x00007FFE3D65D000-memory.dmp upx behavioral1/memory/2804-93-0x00007FFE3D690000-0x00007FFE3D69D000-memory.dmp upx behavioral1/memory/2804-94-0x00007FFE3D660000-0x00007FFE3D67A000-memory.dmp upx behavioral1/memory/2804-96-0x00007FFE3D600000-0x00007FFE3D624000-memory.dmp upx behavioral1/memory/2804-92-0x00007FFE3E790000-0x00007FFE3E79D000-memory.dmp upx behavioral1/memory/2804-100-0x00007FFE28330000-0x00007FFE28AD1000-memory.dmp upx behavioral1/memory/2804-91-0x00007FFE3D6A0000-0x00007FFE3D6B9000-memory.dmp upx behavioral1/files/0x00070000000234c9-88.dat upx behavioral1/files/0x00070000000234d1-85.dat upx behavioral1/files/0x00070000000234cf-78.dat upx behavioral1/files/0x00070000000234cc-75.dat upx behavioral1/files/0x00070000000234c3-67.dat upx behavioral1/files/0x00070000000234c7-70.dat upx behavioral1/files/0x00070000000234ca-73.dat upx behavioral1/files/0x00070000000234cb-74.dat upx behavioral1/files/0x00070000000234c8-71.dat upx behavioral1/files/0x00070000000234c5-69.dat upx behavioral1/files/0x00070000000234f9-65.dat upx behavioral1/files/0x00070000000234f4-62.dat upx behavioral1/files/0x00070000000234f1-61.dat upx behavioral1/files/0x00070000000234ef-60.dat upx behavioral1/memory/2804-103-0x00007FFE384F0000-0x00007FFE38529000-memory.dmp upx behavioral1/memory/2804-105-0x00007FFE35650000-0x00007FFE35683000-memory.dmp upx behavioral1/memory/2804-110-0x00007FFE27C10000-0x00007FFE28139000-memory.dmp upx behavioral1/memory/2804-106-0x00007FFE28B10000-0x00007FFE28BDD000-memory.dmp upx behavioral1/files/0x00070000000234f3-114.dat upx behavioral1/files/0x00070000000234fb-121.dat upx behavioral1/memory/2804-124-0x00007FFE27AF0000-0x00007FFE27C0B000-memory.dmp upx behavioral1/memory/2804-125-0x00007FFE35040000-0x00007FFE35062000-memory.dmp upx behavioral1/memory/2804-123-0x00007FFE28F00000-0x00007FFE295C5000-memory.dmp upx behavioral1/memory/2804-119-0x00007FFE35610000-0x00007FFE35624000-memory.dmp upx behavioral1/memory/2804-118-0x00007FFE35630000-0x00007FFE35644000-memory.dmp upx behavioral1/memory/2804-117-0x00007FFE37E70000-0x00007FFE37E82000-memory.dmp upx behavioral1/memory/2804-116-0x00007FFE384D0000-0x00007FFE384E6000-memory.dmp upx behavioral1/files/0x00070000000234d3-126.dat upx behavioral1/files/0x00070000000234d5-128.dat upx behavioral1/memory/2804-130-0x00007FFE39230000-0x00007FFE39247000-memory.dmp upx behavioral1/files/0x00070000000234d4-133.dat upx behavioral1/memory/2804-129-0x00007FFE38570000-0x00007FFE386EE000-memory.dmp upx behavioral1/files/0x00070000000234d6-135.dat upx behavioral1/memory/2804-137-0x00007FFE3D600000-0x00007FFE3D624000-memory.dmp upx behavioral1/memory/2804-136-0x00007FFE3D690000-0x00007FFE3D69D000-memory.dmp upx behavioral1/memory/2804-144-0x00007FFE33BD0000-0x00007FFE33BEE000-memory.dmp upx behavioral1/memory/2804-143-0x00007FFE34A30000-0x00007FFE34A41000-memory.dmp upx behavioral1/memory/2804-142-0x00007FFE33BF0000-0x00007FFE33C3C000-memory.dmp upx behavioral1/memory/2804-141-0x00007FFE34A50000-0x00007FFE34A69000-memory.dmp upx behavioral1/memory/2804-140-0x00007FFE28330000-0x00007FFE28AD1000-memory.dmp upx behavioral1/memory/2804-192-0x00007FFE35650000-0x00007FFE35683000-memory.dmp upx behavioral1/memory/2804-193-0x00007FFE380A0000-0x00007FFE380AD000-memory.dmp upx behavioral1/memory/2804-210-0x00007FFE28B10000-0x00007FFE28BDD000-memory.dmp upx behavioral1/memory/2804-212-0x00007FFE27C10000-0x00007FFE28139000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 31 discord.com 32 discord.com 33 discord.com 34 discord.com 35 discord.com 36 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 ip-api.com -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 3592 cmd.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2200 sc.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Collects information from the system 1 TTPs 1 IoCs
Uses WMIC.exe to find detailed system information.
pid Process 2708 WMIC.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 316 WMIC.exe -
Enumerates processes with tasklist 1 TTPs 5 IoCs
pid Process 3560 tasklist.exe 4128 tasklist.exe 3796 tasklist.exe 748 tasklist.exe 1952 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 3904 ipconfig.exe 1532 NETSTAT.EXE -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2868 systeminfo.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3700 powershell.exe 3700 powershell.exe 3700 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2016 WMIC.exe Token: SeSecurityPrivilege 2016 WMIC.exe Token: SeTakeOwnershipPrivilege 2016 WMIC.exe Token: SeLoadDriverPrivilege 2016 WMIC.exe Token: SeSystemProfilePrivilege 2016 WMIC.exe Token: SeSystemtimePrivilege 2016 WMIC.exe Token: SeProfSingleProcessPrivilege 2016 WMIC.exe Token: SeIncBasePriorityPrivilege 2016 WMIC.exe Token: SeCreatePagefilePrivilege 2016 WMIC.exe Token: SeBackupPrivilege 2016 WMIC.exe Token: SeRestorePrivilege 2016 WMIC.exe Token: SeShutdownPrivilege 2016 WMIC.exe Token: SeDebugPrivilege 2016 WMIC.exe Token: SeSystemEnvironmentPrivilege 2016 WMIC.exe Token: SeRemoteShutdownPrivilege 2016 WMIC.exe Token: SeUndockPrivilege 2016 WMIC.exe Token: SeManageVolumePrivilege 2016 WMIC.exe Token: 33 2016 WMIC.exe Token: 34 2016 WMIC.exe Token: 35 2016 WMIC.exe Token: 36 2016 WMIC.exe Token: SeDebugPrivilege 748 tasklist.exe Token: SeIncreaseQuotaPrivilege 316 WMIC.exe Token: SeSecurityPrivilege 316 WMIC.exe Token: SeTakeOwnershipPrivilege 316 WMIC.exe Token: SeLoadDriverPrivilege 316 WMIC.exe Token: SeSystemProfilePrivilege 316 WMIC.exe Token: SeSystemtimePrivilege 316 WMIC.exe Token: SeProfSingleProcessPrivilege 316 WMIC.exe Token: SeIncBasePriorityPrivilege 316 WMIC.exe Token: SeCreatePagefilePrivilege 316 WMIC.exe Token: SeBackupPrivilege 316 WMIC.exe Token: SeRestorePrivilege 316 WMIC.exe Token: SeShutdownPrivilege 316 WMIC.exe Token: SeDebugPrivilege 316 WMIC.exe Token: SeSystemEnvironmentPrivilege 316 WMIC.exe Token: SeRemoteShutdownPrivilege 316 WMIC.exe Token: SeUndockPrivilege 316 WMIC.exe Token: SeManageVolumePrivilege 316 WMIC.exe Token: 33 316 WMIC.exe Token: 34 316 WMIC.exe Token: 35 316 WMIC.exe Token: 36 316 WMIC.exe Token: SeIncreaseQuotaPrivilege 2016 WMIC.exe Token: SeSecurityPrivilege 2016 WMIC.exe Token: SeTakeOwnershipPrivilege 2016 WMIC.exe Token: SeLoadDriverPrivilege 2016 WMIC.exe Token: SeSystemProfilePrivilege 2016 WMIC.exe Token: SeSystemtimePrivilege 2016 WMIC.exe Token: SeProfSingleProcessPrivilege 2016 WMIC.exe Token: SeIncBasePriorityPrivilege 2016 WMIC.exe Token: SeCreatePagefilePrivilege 2016 WMIC.exe Token: SeBackupPrivilege 2016 WMIC.exe Token: SeRestorePrivilege 2016 WMIC.exe Token: SeShutdownPrivilege 2016 WMIC.exe Token: SeDebugPrivilege 2016 WMIC.exe Token: SeSystemEnvironmentPrivilege 2016 WMIC.exe Token: SeRemoteShutdownPrivilege 2016 WMIC.exe Token: SeUndockPrivilege 2016 WMIC.exe Token: SeManageVolumePrivilege 2016 WMIC.exe Token: 33 2016 WMIC.exe Token: 34 2016 WMIC.exe Token: 35 2016 WMIC.exe Token: 36 2016 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2804 2140 Random.exe 84 PID 2140 wrote to memory of 2804 2140 Random.exe 84 PID 2804 wrote to memory of 2808 2804 Random.exe 89 PID 2804 wrote to memory of 2808 2804 Random.exe 89 PID 2804 wrote to memory of 1192 2804 Random.exe 90 PID 2804 wrote to memory of 1192 2804 Random.exe 90 PID 2804 wrote to memory of 1900 2804 Random.exe 91 PID 2804 wrote to memory of 1900 2804 Random.exe 91 PID 2804 wrote to memory of 4408 2804 Random.exe 92 PID 2804 wrote to memory of 4408 2804 Random.exe 92 PID 4408 wrote to memory of 748 4408 cmd.exe 97 PID 4408 wrote to memory of 748 4408 cmd.exe 97 PID 1192 wrote to memory of 2016 1192 cmd.exe 98 PID 1192 wrote to memory of 2016 1192 cmd.exe 98 PID 2808 wrote to memory of 316 2808 cmd.exe 99 PID 2808 wrote to memory of 316 2808 cmd.exe 99 PID 2804 wrote to memory of 4624 2804 Random.exe 100 PID 2804 wrote to memory of 4624 2804 Random.exe 100 PID 4624 wrote to memory of 368 4624 cmd.exe 102 PID 4624 wrote to memory of 368 4624 cmd.exe 102 PID 2804 wrote to memory of 3128 2804 Random.exe 103 PID 2804 wrote to memory of 3128 2804 Random.exe 103 PID 2804 wrote to memory of 2576 2804 Random.exe 104 PID 2804 wrote to memory of 2576 2804 Random.exe 104 PID 3128 wrote to memory of 4044 3128 cmd.exe 107 PID 3128 wrote to memory of 4044 3128 cmd.exe 107 PID 2576 wrote to memory of 1952 2576 cmd.exe 108 PID 2576 wrote to memory of 1952 2576 cmd.exe 108 PID 2804 wrote to memory of 3592 2804 Random.exe 109 PID 2804 wrote to memory of 3592 2804 Random.exe 109 PID 3592 wrote to memory of 428 3592 cmd.exe 111 PID 3592 wrote to memory of 428 3592 cmd.exe 111 PID 2804 wrote to memory of 1080 2804 Random.exe 112 PID 2804 wrote to memory of 1080 2804 Random.exe 112 PID 2804 wrote to memory of 1532 2804 Random.exe 114 PID 2804 wrote to memory of 1532 2804 Random.exe 114 PID 1080 wrote to memory of 2792 1080 cmd.exe 116 PID 1080 wrote to memory of 2792 1080 cmd.exe 116 PID 1532 wrote to memory of 3560 1532 cmd.exe 117 PID 1532 wrote to memory of 3560 1532 cmd.exe 117 PID 2804 wrote to memory of 2088 2804 Random.exe 118 PID 2804 wrote to memory of 2088 2804 Random.exe 118 PID 2804 wrote to memory of 4612 2804 Random.exe 119 PID 2804 wrote to memory of 4612 2804 Random.exe 119 PID 2804 wrote to memory of 3092 2804 Random.exe 120 PID 2804 wrote to memory of 3092 2804 Random.exe 120 PID 2804 wrote to memory of 4512 2804 Random.exe 121 PID 2804 wrote to memory of 4512 2804 Random.exe 121 PID 2088 wrote to memory of 4364 2088 cmd.exe 126 PID 2088 wrote to memory of 4364 2088 cmd.exe 126 PID 3092 wrote to memory of 4128 3092 cmd.exe 127 PID 3092 wrote to memory of 4128 3092 cmd.exe 127 PID 4612 wrote to memory of 2988 4612 cmd.exe 128 PID 4612 wrote to memory of 2988 4612 cmd.exe 128 PID 4512 wrote to memory of 3700 4512 cmd.exe 130 PID 4512 wrote to memory of 3700 4512 cmd.exe 130 PID 4364 wrote to memory of 5076 4364 cmd.exe 129 PID 4364 wrote to memory of 5076 4364 cmd.exe 129 PID 2988 wrote to memory of 2524 2988 cmd.exe 131 PID 2988 wrote to memory of 2524 2988 cmd.exe 131 PID 2804 wrote to memory of 4884 2804 Random.exe 132 PID 2804 wrote to memory of 4884 2804 Random.exe 132 PID 2804 wrote to memory of 5104 2804 Random.exe 133 PID 2804 wrote to memory of 5104 2804 Random.exe 133 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 428 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Random.exe"C:\Users\Admin\AppData\Local\Temp\Random.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\Random.exe"C:\Users\Admin\AppData\Local\Temp\Random.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer"3⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get Manufacturer4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "gdb --version"3⤵PID:1900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:748
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer"3⤵
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_ComputerSystem get Manufacturer4⤵PID:368
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:4044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
PID:1952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe""3⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe"4⤵
- Views/modifies file attributes
PID:428
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()""3⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\system32\mshta.exemshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()"4⤵PID:2792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
PID:3560
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"3⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\system32\cmd.execmd.exe /c chcp4⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\system32\chcp.comchcp5⤵PID:5076
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"3⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\system32\cmd.execmd.exe /c chcp4⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\system32\chcp.comchcp5⤵PID:2524
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:4128
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"3⤵
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Get-Clipboard4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"3⤵PID:4884
-
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2464
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"3⤵PID:5104
-
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:2868
-
-
C:\Windows\system32\HOSTNAME.EXEhostname4⤵PID:1188
-
-
C:\Windows\System32\Wbem\WMIC.exewmic logicaldisk get caption,description,providername4⤵
- Collects information from the system
PID:2708
-
-
C:\Windows\system32\net.exenet user4⤵PID:680
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user5⤵PID:760
-
-
-
C:\Windows\system32\query.exequery user4⤵PID:400
-
C:\Windows\system32\quser.exe"C:\Windows\system32\quser.exe"5⤵PID:4896
-
-
-
C:\Windows\system32\net.exenet localgroup4⤵PID:3000
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup5⤵PID:2964
-
-
-
C:\Windows\system32\net.exenet localgroup administrators4⤵PID:1732
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators5⤵PID:3116
-
-
-
C:\Windows\system32\net.exenet user guest4⤵PID:2548
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user guest5⤵PID:4608
-
-
-
C:\Windows\system32\net.exenet user administrator4⤵PID:2116
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user administrator5⤵PID:4812
-
-
-
C:\Windows\System32\Wbem\WMIC.exewmic startup get caption,command4⤵PID:3012
-
-
C:\Windows\system32\tasklist.exetasklist /svc4⤵
- Enumerates processes with tasklist
PID:3796
-
-
C:\Windows\system32\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:3904
-
-
C:\Windows\system32\ROUTE.EXEroute print4⤵PID:2572
-
-
C:\Windows\system32\ARP.EXEarp -a4⤵PID:3560
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -ano4⤵
- Gathers network information
PID:1532
-
-
C:\Windows\system32\sc.exesc query type= service state= all4⤵
- Launches sc.exe
PID:2200
-
-
C:\Windows\system32\netsh.exenetsh firewall show state4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:464
-
-
C:\Windows\system32\netsh.exenetsh firewall show config4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3728
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:3964
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:5076
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:4196
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:4152
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
48KB
MD5f8dfa78045620cf8a732e67d1b1eb53d
SHA1ff9a604d8c99405bfdbbf4295825d3fcbc792704
SHA256a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5
SHA512ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371
-
Filesize
37KB
MD5aa201667e71339521572d224ae77a1ea
SHA18da1f6c6ab2f3c38d28159c8844271be3a298f24
SHA256de660cf4cd1da9e9cfbfe9702da76b9a3c40540022da9dbbbd6a17b2c0385904
SHA512c149ad488bcb2c45505ec429564417472e0b96125f62ad0ae3ad95dbda9beffe0f13c8ed6cb814cc6b1a1eaf0e3c0329de17078849562b3a788b8defc7137327
-
Filesize
48KB
MD599614f713c9be905d87c0cf58200bc36
SHA141a599edac97c9f5dd9150116135413574614e60
SHA2567b3b785cdfa2c1b5eb54481144021f21adc2b35c4b660b6478dacbf04ae90baf
SHA512f7bff6f2f2700f5dba50dc08687705e03e4fddd252c3e2e6443c7d19422d5abf93fd237c10c835cdcaec21fb0b72478fd2d2db63cc4da7b659c003b6068d2b29
-
Filesize
71KB
MD51c0cc15036c54930c1e61306a8be4658
SHA17d88a5a72198e2785c5514200ab8f85b50946fb9
SHA2561666002cf4ff50cf337159e187ecf990d2ec23d5324736e66cf68df4c80cc12c
SHA512bb235e55a69bbdc27102d7afea9089480a5de35f064e63bb3265b060906268f8065472c8d87da588a6ea6ce6a39f2079e218f3cd762692713a93ec5cef4473dc
-
Filesize
59KB
MD5fe45b5661bb06d3a2d6ee8dde64950f5
SHA14c5aaac580cbadd90cd130059302d2ab9b25fdb7
SHA256a6a1a77fb313e650dbd15d9fb745f0f4987cf41b38328ae6b48bc4ca663ec058
SHA5128307ec73f42c49743d7e81dac54bc76f80ec0a35207fb4f5ad2286e0d6323f8ba77862e6e800f9e55ca9469d1526411b012db9901884c127bcfcab5584a319ef
-
Filesize
105KB
MD5ae175df8a381f9e1d408ef61e5cf7642
SHA1b094b14f7672aeac8e50ae173b72351d1c17d496
SHA256394573e22f7dc17eea87058c34d74378c4d290af3aa2d891b17c5968942d2ab4
SHA5125ff46274d42037a2b6162470a5dd38065409a7b10b3d3f22f3c66defe09923dc954fb384e27da7bf51d195cfc58fccae93c036c10e1f6f34b25afa6119528fec
-
Filesize
35KB
MD584a3ab6348f069b51543e187c484bd65
SHA129d984bce98ff562487ef40650f5beee528d8fb4
SHA256dddcf0bf7fa2b47ecb98912ab9469a41b74fe94ed226b92695ec377e46c33420
SHA5125b782f9ccdacfef9ac0b3513cce7544d41c8347276b02aaa8566fa283c4c084f568904abd18a504d50e585cd3d5863b4e6ac058264315468cd62eacc7f40fddd
-
Filesize
86KB
MD51dff217fe87e0843df6bc513995142a4
SHA159d79b2e261a330d6ae228f039e8bbf651ba2c0d
SHA256579cc8d6eabdda5334d1a3245fd2831d986e0ec88bb8b42b7bbfbe7ee05d6e1e
SHA512498d7f1fb0133630938af291ea0a2fcb78c3fa75cf1f00430bfd88b52a7b4a82532d3389093c2c8601aa73e3faeb0fe07adcd7ef3e789ef42c65027392c8514e
-
Filesize
27KB
MD5b59224c22510792057d97076838c311f
SHA11682f47e14deabe0ad479786323eb1a6f65fe053
SHA2564dec69fbe483165bd5eeb97425092d37345578e36d502f5431f369e41f007e9c
SHA512f4a5a9cbea9a6379b15cd2553b2e337a3b664346412ec02fef790fcbfe817b81749a0660daeddb9a092ac1e3c4386f4544ceda9805d1b67608d6ccf6fc34bbc8
-
Filesize
33KB
MD5c84e798d88b53a5d3afc475770188358
SHA1987fc82b36f36d023351c9466a7cf5353b9c40d0
SHA25626357cb8a48e40898d0edbfc58c5ee63827f74679473df488769630c5f5abca6
SHA512de3b8f60a62ab82a0a9d35673fbec0ca12b2a4bd55e036e1462f965aea0018f24ea75058a52c4eb9eeffe8d4dd63a7df2701a846f244b624ca81cab5a3d45706
-
Filesize
26KB
MD57e37a5910710ecb893e1c9ce5f17c43b
SHA1704eb1f38e3df1ff66a07416c4ea355b07bcf4cc
SHA256907c536e91c7d40d9829290662a21bddf497adaae157b7b576dd2ebae8516e10
SHA5121a73049845fb08b170ce080c4f8a37b11427328dfbf008b0dcf9b646c2dd775b180f5e741db164df628f128850550dd4f0e946d558a3484e7c9d3ecc89331d97
-
Filesize
44KB
MD5bf09a2ce93f8a0d5f404c15e1b025fa8
SHA129f815dd49b3c737f6c36d757653d39b307c31e8
SHA256f7226bdc07ee5eedadd180d8d37f9d9916a3c1d63c92ad1d2d09c4aa39487116
SHA5120e24c3c5785de7debf0c497ecd5f4435ee7c67d8cd34175985cd98943c8381631b10f9b6c8a56d00e2566c5bdd4858160920e3890b043bdcd49ee441644126c0
-
Filesize
57KB
MD5b1c6aa12bb1589590b0629ea53432eae
SHA18a5b7011ac6dc15d839a057b3f7fa595e0b1d160
SHA256cfa6335fc0b869d33d9e079c2e87d382c8d8cfff7189ebe51678ed7411c95ce8
SHA512839404fe22a8f5b2bc74d494cd7a8e7e8d59bcfd0582ccd7a64d259ea3e050962cd048b7fd32c6f686cf3cebcb6f80e2d70b7d25d2a4d51137db5b110f1cbe55
-
Filesize
65KB
MD580b0b7893603ce10ca5b15dec847417b
SHA1bcdeac717552621d893529c34da628c84ee4177b
SHA256286a853cdd765a266295c4c23a1298ad8f26a43c798e7a80974fb4209fb1ce7e
SHA5120e748eaca61afe1e512695d7a28693fe86799a46f3dbc480294bfaf4e82cfa15b8fdf087c61060c49f04506129684607f0cf1965df074f797106cfec5e0765e3
-
Filesize
24KB
MD5353e11301ea38261e6b1cb261a81e0fe
SHA1607c5ebe67e29eabc61978fb52e4ec23b9a3348e
SHA256d132f754471bd8a6f6d7816453c2e542f250a4d8089b657392fe61a500ae7899
SHA512fa990b3e9619d59ae3ad0aeffca7a3513ab143bfd0ac9277e711519010f7c453258a4b041be86a275f3c365e980fc857c23563f3b393d1e3a223973a673e88c5
-
Filesize
28KB
MD5a77a72bc52f5717d4a0a7303eacb24f5
SHA1ac927a91f5410ee541bd8724819ff00a619dbaf0
SHA25637dc27997ac84b8478c5beebda1fe8fe2618243ee3fd936a119f826d75a4038b
SHA512c853b0ce6437f7ed38b377e12b7d1443950be27622cce1944b7a581b18e57672516fd4c6ef895d068100bcde24e1209e9c5abd916df00026bd6aa0047dd138b9
-
Filesize
26KB
MD5c410bbefad892761e0740ecd8f4d5e6f
SHA17c9cd82661bca55ff73f69605014b6a44f446474
SHA256c5b4fed2e40f482525e2b2594636cb0ef4e8b3bd96ebf5e09a6faf7c211ee048
SHA5127e7a416c71afa8a6482e643ef5a90c7642c41fe6cdb308df0079dfeb3dd64d823f895dc3a96f9417c4d45986b89bff44456dd06fdc24f997ebdd1a874bdc7179
-
Filesize
79KB
MD53048b7205298dfde89a3ad146c35bd4a
SHA12101cbc798621ad2d8eef5753a5908f9e8c938ea
SHA256be7404c647081b0590ae87d104c03f28f88dd826306cd262b84b2629069dd803
SHA512d915eb2da669fdf04c0529c386f2dd823a7bea2e62225bcdbf382652a74b7dec166a7436e5497a742de6f42942bb6bc725a0c2107b2f80616bbab12b4bf245cc
-
Filesize
25KB
MD5195c022969f2f44c4fcbd84639c7ed8c
SHA145681fbdf37461000ebab627e63a95c1224a1a9c
SHA2567f60b20705d75ef92022e2cb39bab1888e1b3d2a9cf8e8f38f7f1513daeedf85
SHA512adca54b638b57269b9aecb59e94d881569829b89323d28e8831be1f09b57261cbf712e99f10b5f7174e47597d8102634080792199d452e5ed1c83a052f228d4d
-
Filesize
20KB
MD5ea2b5dadf81517f8f82c088a3a6fde04
SHA16b9aea196e1c92920e11ba660c2290f98d103ffc
SHA256e6411e1bf1e90b703593da40b3edb93add2c377d8beab9dd00465aeb9961cac8
SHA512c113dd47d258205dc538732f3c77d2d564f4cb189a06980957e32b3f00182b68256c86e88a87920febc7981cc699e708f7d7f4ada941520879afcea5df509044
-
Filesize
1.3MB
MD58dad91add129dca41dd17a332a64d593
SHA170a4ec5a17ed63caf2407bd76dc116aca7765c0d
SHA2568de4f013bfecb9431aabaa97bb084fb7de127b365b9478d6f7610959bf0d2783
SHA5122163414bc01fc30d47d1de763a8332afe96ea7b296665b1a0840d5197b7e56f4963938e69de35cd2bf89158e5e2240a1650d00d86634ac2a5e2ad825455a2d50
-
Filesize
2.1MB
MD5073606ea92928af7b2863782c0114949
SHA1ec7b4dbf415af6a071a6ca3a0d4f4a0cf544515c
SHA2569be10e3f170875a5b3e403f29d7241bf64957c01bfcae3504f5576578183610a
SHA5125cd48348b475c9de7c2c8d85f36a1f8cf63ee5ee2bde60e2e5a1026f0e877b4c686ad07ab37c8ae37b46b719233b28aa699ce5a2fedd0247c7607da6e519a11e
-
Filesize
1.6MB
MD5443fd07a22ff1a688a3505d35f3c3dd1
SHA1ab9f501aa1d3d523b45f8170e53981672cd69131
SHA256f9c87ec6401039fd03b7c6732c74d1abfdb7c07c8e9803d00effe4c610baa9ee
SHA5121de390d5d9872c9876662f89c57173391ecd300cabde69c655b2ade7eea56e67376839607cac52572111b88a025797060653dc8bb987c6a165f535b245309844
-
Filesize
29KB
MD50d1c6b92d091cef3142e32ac4e0cc12e
SHA1440dad5af38035cb0984a973e1f266deff2bd7fc
SHA25611ee9c7fb70c3756c0392843245935517171b95cc5ba0d696b2c1742c8d46fb6
SHA5125d514ecab93941e83c008f0e9749f99e330949580884bf4850b11cac08fe1ac4ac50033e8888045fe4a9d8b4d2e3ea667b39be18f77266d00f8d7d6797260233
-
Filesize
222KB
MD5364a71831c9bd0a09eeeceb6980c58c7
SHA19d084ccb83e12ddccd17250a009362d720e6271c
SHA2563b20fb46f41234f8f7bbe342cfebfbbce5708d963cf5c7792d1237a1bc7b2676
SHA5125abe19130f9306fd6fc3644412ef6c8c5b7da970cfaed69657a6cb62d431abfbba64fefcbfa82910d17d744e299e3ba5036bd490223b2bf28689cf2e70633dce
-
Filesize
20KB
MD5877e8f7f3c980020b1da6bdbc6f1741c
SHA1184d162f6eea7cce343fe0c62fda49ca796ceb20
SHA25665b96acd7b6517c4493491f31083e75d905b48466f021fab098655f0d953497c
SHA512881332a6cbc7ab030f52bc46a8cf68c0ad922c54c68b3b8e35909f758aed9443cc90b49681f88c6c1f61741eb6507849857405a87dbbd78bb1a453ade3fe1ad8
-
Filesize
88KB
MD54036f8f39f15413396465317522ae157
SHA1398431ca1d476596bdaf213ace7599acbdf1fbf6
SHA25631356a90e63b6fabbdb47373fbffeb33d28d8e6f6d5ca395113b3362ce9eee52
SHA512b9750acaf86ae7bb942ece6067177a2b3ccc29672cffefbce213dd1b36acb5f143809331d657d6e7ffc7cac148d2e2793a6e9b941893c59b50dd32a982ddafaf
-
Filesize
66KB
MD579b02450d6ca4852165036c8d4eaed1f
SHA1ce9ff1b302426d4c94a2d3ea81531d3cb9e583e4
SHA256d2e348e615a5d3b08b0bac29b91f79b32f0c1d0be48976450042462466b51123
SHA51247044d18db3a4dd58a93b43034f4fafa66821d157dcfefb85fca2122795f4591dc69a82eb2e0ebd9183075184368850e4caf9c9fea0cfe6f766c73a60ffdf416
-
Filesize
1.7MB
MD53e5a523e2b08424c39a53dcba0c4f335
SHA1c6bafbf6501b62f23e0c2f4f68db822827babd76
SHA256d6864c703deb033db0c5bd9962d88b1e2e6b39f942f44558385ae9a0aff7eac3
SHA51274533088aee88b27d1cc94e56e70066109e05d6f1cfd3b4d647d16dc8a5977262f91e16dd875683c7e13dec0ed88d5febdd2058ca5ecc413e17934d782ade8f1
-
Filesize
25KB
MD5b6170b2e8b11051d2bbbc96583c6ba5e
SHA1e142e392f8e247dc6745a6be7ac5e3fbb0f12ba4
SHA2567cdd658961b23dfde1516ac43bf3b3de9314787c64a970cc169310d95a68709a
SHA512956ed83bae9f0cbc10bfe26b7de0f41bfb39f304850d32084baba9ec9b25e5866dd94ec1de7ec91f42610c3b65f5a4d2538500da0c0ed3b95bd8051581e58194
-
Filesize
644KB
MD523b8d930887ba4b256f91fb97bef6bcf
SHA1045791bbd8354f5955ec14ca3ca8270a27ce2bf1
SHA256002c755c90c0a4a108c5b27cd08b0bd2ac1732fadcec2ac3474a3e6b77df4013
SHA51273f9a8d94f7b121433d5af19700c5f51ba39c7d59e27aa9ba27aeb8f0fa11e59b3ed5df2b3afd7a98f4ac8c6e8ab761d502f5fa41782946e350feb1f7910028c
-
Filesize
295KB
MD5e37488a62ea94e6dc09a8e3755e36e3f
SHA1c485b3769c659c45853febdb2b3be5ab47e3a47a
SHA2568e6de46ea542bbe99479f442dabafd44bfb51ee4f144ae493f37d6f9d5214135
SHA5128128b609dca51a05186ec3bf894b8fb7911533b18fc70aea9682b5ae12d662aa174359ecddc98917ade9450a0c020ddcad2094afe5956be5ae3d6a38fd43c079
-
Filesize
40KB
MD54bbcf91653204023164d00202769fc4f
SHA1ccdaf8e3ee4ae4b6ae0b85193afb5b0fa9e68970
SHA256213e1ba2baabc331eb61461791c85498cefabc223c872fd57d0b98b43b5afd9f
SHA51279ad58112c2b7f1200c6fbc8074f8992c094ea785a3ac88cecbafcc245bbe41bfd1acd87fd0b1aca13e2bd644a9be540807ac31152824f86ef0a2d113405a765
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82