Analysis
-
max time kernel
157s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 15:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.anonfile.la/file/ZV8UKdTqR
Resource
win10v2004-20240709-en
General
-
Target
https://www.anonfile.la/file/ZV8UKdTqR
Malware Config
Signatures
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 548 netsh.exe 3900 netsh.exe -
ACProtect 1.3x - 1.4x DLL software 26 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00070000000234fa-126.dat acprotect behavioral1/files/0x00070000000234cb-132.dat acprotect behavioral1/files/0x00070000000234f4-137.dat acprotect behavioral1/files/0x00070000000234f3-141.dat acprotect behavioral1/files/0x00070000000234d2-160.dat acprotect behavioral1/files/0x00070000000234d4-158.dat acprotect behavioral1/files/0x00070000000234c9-162.dat acprotect behavioral1/files/0x00070000000234fc-165.dat acprotect behavioral1/files/0x00070000000234d3-164.dat acprotect behavioral1/files/0x0006000000023273-163.dat acprotect behavioral1/files/0x00070000000234fb-161.dat acprotect behavioral1/files/0x00070000000234d1-155.dat acprotect behavioral1/files/0x00070000000234d0-154.dat acprotect behavioral1/files/0x00070000000234cf-153.dat acprotect behavioral1/files/0x00080000000234ce-151.dat acprotect behavioral1/files/0x00070000000234cc-150.dat acprotect behavioral1/files/0x00070000000234ca-149.dat acprotect behavioral1/files/0x00070000000234c8-147.dat acprotect behavioral1/files/0x00070000000234fd-146.dat acprotect behavioral1/files/0x00070000000234f8-143.dat acprotect behavioral1/files/0x00070000000234f5-142.dat acprotect behavioral1/files/0x00070000000234f7-189.dat acprotect behavioral1/files/0x00070000000234ff-196.dat acprotect behavioral1/files/0x00070000000234d7-200.dat acprotect behavioral1/files/0x00070000000234d8-203.dat acprotect behavioral1/files/0x00070000000234d9-202.dat acprotect -
Executes dropped EXE 4 IoCs
pid Process 4252 Bootstrapper.exe 3592 Bootstrapper.exe 1964 Bootstrapper.exe 2176 Bootstrapper.exe -
Loads dropped DLL 61 IoCs
pid Process 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 3592 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe 2176 Bootstrapper.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x00070000000234fa-126.dat upx behavioral1/memory/3592-130-0x00000000750D0000-0x00000000755DB000-memory.dmp upx behavioral1/files/0x00070000000234cb-132.dat upx behavioral1/files/0x00070000000234f4-137.dat upx behavioral1/memory/3592-140-0x0000000075070000-0x000000007507D000-memory.dmp upx behavioral1/memory/3592-139-0x0000000075080000-0x000000007509F000-memory.dmp upx behavioral1/files/0x00070000000234f3-141.dat upx behavioral1/files/0x00070000000234d2-160.dat upx behavioral1/files/0x00070000000234d4-158.dat upx behavioral1/files/0x00070000000234c9-162.dat upx behavioral1/files/0x00070000000234fc-165.dat upx behavioral1/memory/3592-170-0x0000000074F90000-0x0000000074FAB000-memory.dmp upx behavioral1/memory/3592-171-0x0000000074E50000-0x0000000074F87000-memory.dmp upx behavioral1/memory/3592-169-0x0000000074FB0000-0x0000000074FD7000-memory.dmp upx behavioral1/memory/3592-168-0x0000000074FE0000-0x0000000074FF8000-memory.dmp upx behavioral1/memory/3592-167-0x0000000075000000-0x000000007500C000-memory.dmp upx behavioral1/memory/3592-166-0x0000000075050000-0x0000000075066000-memory.dmp upx behavioral1/files/0x00070000000234d3-164.dat upx behavioral1/files/0x0006000000023273-163.dat upx behavioral1/files/0x00070000000234fb-161.dat upx behavioral1/files/0x00070000000234d1-155.dat upx behavioral1/files/0x00070000000234d0-154.dat upx behavioral1/files/0x00070000000234cf-153.dat upx behavioral1/files/0x00080000000234ce-151.dat upx behavioral1/files/0x00070000000234cc-150.dat upx behavioral1/files/0x00070000000234ca-149.dat upx behavioral1/files/0x00070000000234c8-147.dat upx behavioral1/files/0x00070000000234fd-146.dat upx behavioral1/files/0x00070000000234f8-143.dat upx behavioral1/files/0x00070000000234f5-142.dat upx behavioral1/memory/3592-178-0x0000000074E20000-0x0000000074E48000-memory.dmp upx behavioral1/memory/3592-183-0x0000000074B20000-0x0000000074D7A000-memory.dmp upx behavioral1/memory/3592-186-0x0000000074B00000-0x0000000074B12000-memory.dmp upx behavioral1/memory/3592-182-0x0000000074D80000-0x0000000074E14000-memory.dmp upx behavioral1/memory/3592-188-0x0000000074AF0000-0x0000000074AFF000-memory.dmp upx behavioral1/files/0x00070000000234f7-189.dat upx behavioral1/memory/3592-192-0x0000000074A80000-0x0000000074A90000-memory.dmp upx behavioral1/memory/3592-193-0x0000000074A70000-0x0000000074A80000-memory.dmp upx behavioral1/memory/3592-195-0x0000000074950000-0x0000000074A69000-memory.dmp upx behavioral1/files/0x00070000000234ff-196.dat upx behavioral1/memory/3592-198-0x0000000074930000-0x000000007494E000-memory.dmp upx behavioral1/files/0x00070000000234d7-200.dat upx behavioral1/memory/3592-204-0x00000000750D0000-0x00000000755DB000-memory.dmp upx behavioral1/files/0x00070000000234d8-203.dat upx behavioral1/files/0x00070000000234d9-202.dat upx behavioral1/memory/3592-210-0x0000000075050000-0x0000000075066000-memory.dmp upx behavioral1/memory/3592-213-0x0000000074860000-0x000000007487A000-memory.dmp upx behavioral1/memory/3592-212-0x0000000074E50000-0x0000000074F87000-memory.dmp upx behavioral1/memory/3592-211-0x0000000074F90000-0x0000000074FAB000-memory.dmp upx behavioral1/memory/3592-209-0x0000000075080000-0x000000007509F000-memory.dmp upx behavioral1/memory/3592-208-0x00000000748F0000-0x0000000074906000-memory.dmp upx behavioral1/memory/3592-207-0x0000000074890000-0x000000007489F000-memory.dmp upx behavioral1/memory/3592-206-0x00000000748A0000-0x00000000748E5000-memory.dmp upx behavioral1/memory/3592-205-0x0000000074910000-0x0000000074924000-memory.dmp upx behavioral1/memory/3592-216-0x00000000742E0000-0x000000007485A000-memory.dmp upx behavioral1/memory/3592-214-0x0000000074E20000-0x0000000074E48000-memory.dmp upx behavioral1/memory/3592-219-0x00000000742A0000-0x00000000742D1000-memory.dmp upx behavioral1/memory/3592-218-0x0000000074B20000-0x0000000074D7A000-memory.dmp upx behavioral1/memory/3592-217-0x0000000074D80000-0x0000000074E14000-memory.dmp upx behavioral1/memory/3592-234-0x0000000074B00000-0x0000000074B12000-memory.dmp upx behavioral1/memory/3592-295-0x0000000074270000-0x000000007427C000-memory.dmp upx behavioral1/memory/3592-294-0x0000000074AF0000-0x0000000074AFF000-memory.dmp upx behavioral1/memory/3592-332-0x0000000074E50000-0x0000000074F87000-memory.dmp upx behavioral1/memory/3592-325-0x0000000075080000-0x000000007509F000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 73 discord.com 74 discord.com 76 discord.com 77 discord.com 79 discord.com 80 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 60 ip-api.com -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 2588 cmd.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1460 sc.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x00070000000234c4-69.dat pyinstaller -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Collects information from the system 1 TTPs 1 IoCs
Uses WMIC.exe to find detailed system information.
pid Process 3640 WMIC.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4516 WMIC.exe -
Enumerates processes with tasklist 1 TTPs 5 IoCs
pid Process 1676 tasklist.exe 4128 tasklist.exe 3316 tasklist.exe 4708 tasklist.exe 432 tasklist.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2808 ipconfig.exe 208 NETSTAT.EXE -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2584 systeminfo.exe -
Kills process with taskkill 7 IoCs
pid Process 2044 taskkill.exe 4924 taskkill.exe 1864 taskkill.exe 4692 taskkill.exe 1072 taskkill.exe 3392 taskkill.exe 2692 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133661365821754838" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Local Settings chrome.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 3492 chrome.exe 3492 chrome.exe 5072 powershell.exe 5072 powershell.exe 5072 powershell.exe 2772 msedge.exe 2772 msedge.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3492 chrome.exe 3492 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeRestorePrivilege 1072 7zG.exe Token: 35 1072 7zG.exe Token: SeSecurityPrivilege 1072 7zG.exe Token: SeSecurityPrivilege 1072 7zG.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeShutdownPrivilege 3492 chrome.exe Token: SeCreatePagefilePrivilege 3492 chrome.exe Token: SeIncreaseQuotaPrivilege 4516 WMIC.exe Token: SeSecurityPrivilege 4516 WMIC.exe Token: SeTakeOwnershipPrivilege 4516 WMIC.exe Token: SeLoadDriverPrivilege 4516 WMIC.exe Token: SeSystemProfilePrivilege 4516 WMIC.exe Token: SeSystemtimePrivilege 4516 WMIC.exe Token: SeProfSingleProcessPrivilege 4516 WMIC.exe Token: SeIncBasePriorityPrivilege 4516 WMIC.exe Token: SeCreatePagefilePrivilege 4516 WMIC.exe Token: SeBackupPrivilege 4516 WMIC.exe Token: SeRestorePrivilege 4516 WMIC.exe Token: SeShutdownPrivilege 4516 WMIC.exe Token: SeDebugPrivilege 4516 WMIC.exe Token: SeSystemEnvironmentPrivilege 4516 WMIC.exe Token: SeRemoteShutdownPrivilege 4516 WMIC.exe Token: SeUndockPrivilege 4516 WMIC.exe Token: SeManageVolumePrivilege 4516 WMIC.exe Token: 33 4516 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 1072 7zG.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 3492 chrome.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe 5584 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3492 wrote to memory of 3960 3492 chrome.exe 85 PID 3492 wrote to memory of 3960 3492 chrome.exe 85 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 1880 3492 chrome.exe 86 PID 3492 wrote to memory of 3020 3492 chrome.exe 87 PID 3492 wrote to memory of 3020 3492 chrome.exe 87 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 PID 3492 wrote to memory of 4788 3492 chrome.exe 88 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1984 attrib.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.anonfile.la/file/ZV8UKdTqR1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb4d59cc40,0x7ffb4d59cc4c,0x7ffb4d59cc582⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,14821740364633174475,13361805976563855510,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2176,i,14821740364633174475,13361805976563855510,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2184 /prefetch:32⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,14821740364633174475,13361805976563855510,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2272 /prefetch:82⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,14821740364633174475,13361805976563855510,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,14821740364633174475,13361805976563855510,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4612,i,14821740364633174475,13361805976563855510,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4628 /prefetch:82⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4456,i,14821740364633174475,13361805976563855510,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4988 /prefetch:82⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:3488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1992
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1652
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\WaveBootstrapper\" -spe -an -ai#7zMap3223:94:7zEvent209521⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1072
-
C:\Users\Admin\Downloads\WaveBootstrapper\Bootstrapper.exe"C:\Users\Admin\Downloads\WaveBootstrapper\Bootstrapper.exe"1⤵
- Executes dropped EXE
PID:4252 -
C:\Users\Admin\Downloads\WaveBootstrapper\Bootstrapper.exe"C:\Users\Admin\Downloads\WaveBootstrapper\Bootstrapper.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵PID:5076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵PID:4208
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer"3⤵PID:4192
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic computersystem get Manufacturer4⤵PID:5068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "gdb --version"3⤵PID:2524
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵PID:3640
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
PID:1676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer"3⤵PID:4548
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path Win32_ComputerSystem get Manufacturer4⤵PID:2764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:5076
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:2292
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵PID:2296
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
PID:4128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe""3⤵
- Hide Artifacts: Hidden Files and Directories
PID:2588 -
C:\Windows\SysWOW64\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe"4⤵
- Views/modifies file attributes
PID:1984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵PID:1332
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
PID:3316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3492"3⤵PID:3192
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 34924⤵
- Kills process with taskkill
PID:2692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3960"3⤵PID:2768
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 39604⤵
- Kills process with taskkill
PID:2044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 1880"3⤵PID:2176
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 18804⤵
- Kills process with taskkill
PID:4924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3020"3⤵PID:3372
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 30204⤵
- Kills process with taskkill
PID:1864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4788"3⤵PID:4664
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 47884⤵
- Kills process with taskkill
PID:4692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4176"3⤵PID:3116
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 41764⤵
- Kills process with taskkill
PID:1072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3860"3⤵PID:1484
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 38604⤵
- Kills process with taskkill
PID:3392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"3⤵PID:1704
-
C:\Windows\SysWOW64\cmd.execmd.exe /c chcp4⤵PID:5108
-
C:\Windows\SysWOW64\chcp.comchcp5⤵PID:3684
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"3⤵PID:2792
-
C:\Windows\SysWOW64\cmd.execmd.exe /c chcp4⤵PID:4376
-
C:\Windows\SysWOW64\chcp.comchcp5⤵PID:1880
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵PID:1556
-
C:\Windows\SysWOW64\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:4708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"3⤵PID:2552
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe Get-Clipboard4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"3⤵PID:4676
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profiles4⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"3⤵PID:2172
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:2584
-
-
C:\Windows\SysWOW64\HOSTNAME.EXEhostname4⤵PID:864
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic logicaldisk get caption,description,providername4⤵
- Collects information from the system
PID:3640
-
-
C:\Windows\SysWOW64\net.exenet user4⤵PID:2960
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user5⤵PID:2292
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup4⤵PID:2444
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup5⤵PID:4964
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup administrators4⤵PID:2676
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators5⤵PID:3652
-
-
-
C:\Windows\SysWOW64\net.exenet user guest4⤵PID:224
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user guest5⤵PID:2024
-
-
-
C:\Windows\SysWOW64\net.exenet user administrator4⤵PID:4068
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user administrator5⤵PID:3224
-
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic startup get caption,command4⤵PID:4280
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /svc4⤵
- Enumerates processes with tasklist
PID:432
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:2808
-
-
C:\Windows\SysWOW64\ROUTE.EXEroute print4⤵PID:1496
-
-
C:\Windows\SysWOW64\ARP.EXEarp -a4⤵PID:2296
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -ano4⤵
- Gathers network information
PID:208
-
-
C:\Windows\SysWOW64\sc.exesc query type= service state= all4⤵
- Launches sc.exe
PID:1460
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall show state4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:548
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall show config4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3900
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:2836
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:2268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:2552
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:1628
-
-
-
-
C:\Users\Admin\Downloads\WaveBootstrapper\Bootstrapper.exe"C:\Users\Admin\Downloads\WaveBootstrapper\Bootstrapper.exe"1⤵
- Executes dropped EXE
PID:1964 -
C:\Users\Admin\Downloads\WaveBootstrapper\Bootstrapper.exe"C:\Users\Admin\Downloads\WaveBootstrapper\Bootstrapper.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵PID:5056
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault3e258dcfh8c11h4f1eh8ecch7f8c6fe72d791⤵PID:3988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffb3d9946f8,0x7ffb3d994708,0x7ffb3d9947182⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,15834554175767910750,6958089745606312579,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,15834554175767910750,6958089745606312579,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,15834554175767910750,6958089745606312579,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2392 /prefetch:82⤵PID:1524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5036
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:2444
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5584
Network
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5fb68c04ad16b7a6b8775188a8820d133
SHA178974ead7314341ca83488a10cab2f70d67b7e13
SHA2566e0074c279ece526f946bf799cc8dabf762c7847f4349bc18b16040c2ae0a94b
SHA5129ef559b3a8584c5935c7b056c4fd86771e6a9e1024051ffcd9e136f867a0f496d474ad5c6b6e56b65f90f5771447d9621029ed220c2a3a41a000d79354542cf8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
852B
MD50155104fe60950b96598838d8288d30c
SHA190f86f07f7059ce9291736a0f7169237ff9adc1b
SHA256386adfe814d07e00a070b3d04040978d27236a62bae3fc6df72724d25df0501e
SHA5126d499ca7dbe341ddf959f97cd8d3fc66506427cbe64806308fcac2a06d22612b0bdc804db2985d531dde82f29c1fb1c634778412d09a25ee250a3fa4e5f06a33
-
Filesize
9KB
MD5c3758cfe282d9a626cdf394ad730c127
SHA171da16fec94cef809a7a08a13f912be2ea4b7129
SHA256ad0a20a27759a8e13f2ec7c1c35312084b596427122eb1c44662c7497749bbfa
SHA512d9e07b5c0223002ffe537f20a979265382ef4d0dcc48430e640f353c9d5db76f9a059c59fb0ece961b2d4bfccf54b06aa4db33f20c40c53e9bdfd8f30d07090d
-
Filesize
9KB
MD5ec5e87458f2e17e21fb2cee4a373772d
SHA1fa9a3c4f9294e21a0c5f5269ce66816bc25b0af5
SHA256b70aa562ba1c99a6c078b5bbb9a35bd000c14fc8d329a48e796f0067f97a3026
SHA512fc6c9a786e99e7093a79288b0aacb50971a241f3bc7f39274f05e09221b79c2ce3abfdcceb77680f305e484eb6f1c8bedaf692a2e64d0636f763fb8881c51ed5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e554792f-dbbb-4255-9e98-9fcbc8965284.tmp
Filesize649B
MD5ccd2c37b719bb724b11da3ba8a964c0c
SHA11a602cfd2ed2fd04af4c72c4f301e2c7eca16106
SHA2563a5201d7e6cdb34dbe4c1c424f2408bdcb885847dbd3ba3f66fec4c5a05fda4b
SHA51246c19ef7f8ebafa2c94f33fbcb53d98f14533e64e95c119b2548adcfca6d4a09533b3622d41ad8ad25ee14f8b88dc4a8fb55b839ff7692af8680c86ba1512db3
-
Filesize
181KB
MD539e7bff745f5f0f34f1827d3335fff0e
SHA112c7622a5a1c84b171e04d04fc38485d388b2e58
SHA2565bc709c6c96c032197897c2b0c4ead02c81d09849b882e81ca9a6643ffc1dfd0
SHA5120fbed346727e9d9288232b791e1cc57ec1eb6e3cc1435666146dee0bec502db3f9cace46e5cb4247e9b27abac42d0274dbdd828772dc1e35ab6462016d639568
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
Filesize
5KB
MD5877c191a12dd26d7ccd0cb04928fbe86
SHA1c67f0ea3bbd7b3d116d34c108543932794cd0c52
SHA25615fdd96d1ea784bc3dce6381124185c94f8a89f35a5778daf262e1e89cacd666
SHA512a56369402fbbdfdd411ca5ba77569a08deae765bf46073738172013373fa6ebd96ce67eca7a76b291d9c4293eb354f2fe51cbfae520d1720b1d9905d09ee5f82
-
Filesize
8KB
MD54fe088ba86b2c42aaea6d5e188b1683c
SHA103a1d93a57bbebfb33c409de902104409f76f4ee
SHA256e01d3f3764a254bbcd0673b232174382e3e608e3e80c9bb620e74520253ec977
SHA512606da2788dd40b06d6c75aa74a5309907ddcf55e669a079b1e94b2049f3c434e94db8315d41fcef5bec7ca32abf32d0b78cf32bb5611bfb17709bb78921c357f
-
Filesize
78KB
MD51e6e97d60d411a2dee8964d3d05adb15
SHA10a2fe6ec6b6675c44998c282dbb1cd8787612faf
SHA2568598940e498271b542f2c04998626aa680f2172d0ff4f8dbd4ffec1a196540f9
SHA5123f7d79079c57786051a2f7facfb1046188049e831f12b549609a8f152664678ee35ad54d1fff4447428b6f76bea1c7ca88fa96aab395a560c6ec598344fcc7fa
-
Filesize
32KB
MD5140261084b0d5eac9b480970b76726cb
SHA172d47c28a50f32f26cb5f650e1673bb3bf1b7b87
SHA256fbdf50454e1e74d28bd3c195a57528f18af29339bd016bc5b9f5cd57b2e77df3
SHA5121c78117841f44d0f4afa4dee5b16524851a5a983810ea928d994f942eae127e7d471dbf8be0c7b7e11b92bed210cf7cac5cea7e7407be7dcc1710473ab7cff84
-
Filesize
43KB
MD58df17a44f2c197bd23aeb8a3e68df30c
SHA13aa2d329e70e73ea3952e98302edba9d862cb20e
SHA256bb9142d284c6c401dc9c3581a5c8e50da575af2801a9fc5036a5bdf2144e9a29
SHA512712fb32769367ce443c210d3962233d0eedda309b19656b8c77cbc77ec8553bc4b8760bc26c6d7d4f849f38e5a21dcd0966d9d1dd0470bd511d0904bdccf8bd5
-
Filesize
61KB
MD57cc273b3791a571d1ba406d3f5fadcb1
SHA15c8aa16caf55795d3d5d1c54934d8a9e2a8443d9
SHA2561bbb1be99842a10c6b681a7ade139729b82013aaa66c7becedfa876933fdb4af
SHA512d83fef8592d952843b9f00476497819c13892fd31a5dc70117b8a570440a75d6b8b08e00f2902ccd3e74e46d6ff7ebfef45bcb5da1a1a46b92d6abed74b0bbd6
-
Filesize
51KB
MD535f9c685c12def0b43484f24133a81d8
SHA15d9bfa5cf9a8c99d901ed52a593eafaa543a914d
SHA25614a4bb9dde27cbb8ea5a10baa0bfc37cfd7b11d8325d332a4a960397ea6f0e77
SHA5127b268bfdd137bb98137a73ccfefea686c59dc6fbb79ccd68c73debf4c171189f0ad9b89afac60998fca1580ab557b149c8edd1396d4e53a2ffe27ade098bf163
-
Filesize
77KB
MD59aae203f1c75b03764dd0edf81fb5c5e
SHA16208bcb6b5f9a2f033260f01aad117d44034c678
SHA256be03b9ab01dbc972dcbd08b2605a4c5814752d23225766ff7725f9e2d4c6b060
SHA5122f7f801638b1775079bb519e32137f2ab81f2b7a1873eb05054ff541a5ff79dec73425db143c39d23f29a8374b96812ab9dba5e25bb85c5007ee20af5292ed10
-
Filesize
28KB
MD534001fe9953d32df87b76333d90f6c95
SHA1f8da5142fa8ed196d0682b9ec9dc011b701096b8
SHA2568c535f8bc125f4cc966447551e9fc3a6a07f33c5298d0f5db9f8a12536482ed3
SHA512da989737afd6d592cb6dd2aecd5569344989971a0addcd2240591152711da89988400e34d5272c44d6beaeae684098747afe4ab3225d83f930b9c21979fecea7
-
Filesize
78KB
MD5b58ec68fe28a4959ca3232335d8ec732
SHA169d9e6252e501423930766b8c0a9efc31978e326
SHA2569de489435f8c9baf8d9ce06c023e3b27ffa4c81a75c22f6a515b7f2d67b20426
SHA512ef74190b3c010e0a40055746c3cba091ca775e4d73f5eb3e44a2acbf6332e93f70ebe905dfe7a04d5016aedc5eafef016eec1293f5f1e264aa4e444c0e38fb18
-
Filesize
23KB
MD5184a3b2389a484a4aeb6b8b45e8b315e
SHA1205899fb7637cd3c240e10a8e823dbec6f1057b9
SHA2561a2102192f64d63e482cd9bc0227b7ac2db82b54f38591d6d1dee00ed97f13e0
SHA5127444b9e2607442bca85e36f2228bd0efdff7532b5c1632bb2183b39b50146ce8b3478f1dff9e395a4107dae0f23ad0310b8949ad63d4c62a4941bb569a63c11d
-
Filesize
27KB
MD52269121a4c214a26d28ddd21a37a0239
SHA174e633e29d0ba6085764dde538c84b6350e63975
SHA25613b3d027c73a356019981c18059ba3a7133c3b06adf029f16f9065bade77d387
SHA512ee8e03573541061bb42e2800a4a7eaac2c3638a715eab103ea1c5369bdb8f4146c745acd27604d9b7a506f756e9df4c3fcb391e22d6f3e87b3d11d5165c4d4d0
-
Filesize
23KB
MD5db2891c7e3c42f9550cfdf263113553d
SHA1c49d520878c20eb2129f97eca28f9e6893fe03d4
SHA256c8487a9e40fc8499f1075dcfebb811cd3c9b1a7f2299a758b4eaf7e9851b209d
SHA512dcf41ca1737503e7d0cbfecda8f51a96c3d4a5d508f25be8b60df3be4439c7294d0fce4c7ffc1b4a21c1806171d4659e4fcb0982b608e44e2287a00cee7b68a5
-
Filesize
37KB
MD52c7417030d8bb988c27afbbfd2d76a09
SHA11a4a37b205d8a98c200840ed32b29e2d09a94b1f
SHA256e858ac5eb10efb4151838209738d20d86bacaa3d8ac96b37846e47c5ec9fc7cb
SHA51228e409c536ea26f5881035622d67e435fc82795d656ed2e4ac3b87963387df5defb8cfc8b069fdc3748f5203262374cbb2b20d761d0da5f8002dfebfed1a5929
-
Filesize
43KB
MD54a6770da61441dcd88094ec3db230060
SHA1b9d2424f7f9ba5ca8c082971ba8670d6141b4c92
SHA256f96a669ae6e312d8b2e2a203088d2376b85b586ac3e7c9050e2089907c2a6dfd
SHA512f22f8125f51f970e5fc7cbbf1f801e50b2da52e84eb64830b29faca63c14f265934e0633aeccc0d0b325de07d0043b61b3ff567198560043052910b3a717f18d
-
Filesize
56KB
MD574337381b7a112673ac33f1c18c3bfa9
SHA187ad66be55d163185e5096918f08e36c9db49cbf
SHA256e27e46ae88e20ac46393a0588c50a2b22ae73c9584db2e040654c7c4856e319e
SHA512fe01a945f41e63a361b814a2b9739e518f4019351169b487b08417f7d8b62f5e65a311e9934beac35eded0f24066482bc4fa856062d72c3a7fd3dd489bf7c76c
-
Filesize
21KB
MD5954767d0bc7124d947b29991dee2ad2e
SHA1b50ec8a88ed8c6df6cde99c561f1ec04e1bf72a5
SHA256661f277751684b612708b21afad5ac70a00094774185f1f5d32981d72e6a922e
SHA5122f6990676f731c112479e453feac6069388fb0068ee57ef756f2fc8e5dd7b5951d14cddadf14773684d045eba99f99f39b0bdbd25d021fb5a9d0abca36707c01
-
Filesize
23KB
MD5625f2d6f5ee0c079214b13924287e193
SHA1751ec7f3db91a1725c72764a7e7ffe591724271b
SHA2564f736313ff2feda04068eb3f52ac48de2f79b8cc0d1e1188ad10c7c85ae3860b
SHA5126baf095369f2dc67456ab204ea28d8af50fccd3acfdcf77de8b872db185a4ac8d6caf375adbf06b585a2e0513e846d2c7b320dca16a8ce2884321cb7cd4fa557
-
Filesize
69KB
MD54d921bd5018b2337dae2b836131fd500
SHA1e35f97bc87c0e41f0dcc05bfd9c2ab9f14df3750
SHA2563c1cfb62f936a0f6a1d7abcae8cc53750445a797602902dbb5c58a32cde015df
SHA512705a557b1eced0897a8036b977d9b37fe8d9dbefeaa902f7fa4bcbfb4021e297b5dbd303e635c6e88f0877bb6ec5ce00629ec728fd7e7be7cc70382ad1a577eb
-
Filesize
21KB
MD5dc9fad220f112e8d6b8b0fffb7c48875
SHA1795e2b016892dee788dddd46aec01f1b187defab
SHA2561ae45e171f55242baf62a35f7fe226d57009e355311e9c7594964e3409a2b7f5
SHA512a45c8e6d27619b8c7de27d44682bb456ffd084712445a8a20a0e78440506a1d60989514a6744b1336c364f7e7ef6a87524a28944c091bb390c1b981a8e85b268
-
Filesize
1.4MB
MD583d235e1f5b0ee5b0282b5ab7244f6c4
SHA1629a1ce71314d7abbce96674a1ddf9f38c4a5e9c
SHA256db389a9e14bfac6ee5cce17d41f9637d3ff8b702cc74102db8643e78659670a0
SHA51277364aff24cfc75ee32e50973b7d589b4a896d634305d965ecbc31a9e0097e270499dbec93126092eb11f3f1ad97692db6ca5927d3d02f3d053336d6267d7e5f
-
Filesize
753KB
MD52eb116a4507e1b0a2a9bab42349fd1ae
SHA1e7cfeb42eb91e87dfe431c9b7fb068c766cc2245
SHA256573b05deab62b1d1623995e27923576898050d00008dfdc5d82d6cf278c14944
SHA5124b27b64d20e3bc710cb6d8b8491b47e7c39cf1fc5c885b89a1ceb42b73060fae8288a8c7500ce5420e2b1b2948c717d3a4ab860e75ae159555a6cca8c368493a
-
Filesize
23KB
MD578621a7664d5e32ffdd35709bf7c9da9
SHA175179be2b3b1f81388d2d594600fcafdb4455228
SHA256a86d2c3acae805abff393bb109936e2b4a2b47414e4c5ee04a9c035ec42647f9
SHA51207e06117b9da7d2ea25b8d49c0a0fe89db07050aa2a4103000c8ed6701a89cb5f16c2660c6829398536bc925b57634a1b1f53b6a79e855770964b87a61d080c6
-
Filesize
171KB
MD5fcf946a6a60ed95e084aa1de9a7a4a36
SHA18da6dfd6531816ba03f2e06a61c83ca378082c3d
SHA256c1acad5cb0fc77abf7f553fc7340fa934b903d454b48588b0b172c964ef9c036
SHA51270086254be4e8bf1bda2fa30eaec7b4f6ed46c28d9a95169938c6d9725ab056ee33ed811da965c4c0411ea754f49edb8fd23716f0e980a367ee7942401f4a0df
-
Filesize
17KB
MD59b2153789c40daf0c785347f6d9e9cf8
SHA1fdc9e352a99a216ab6ab6f67f3cd22f21502dac3
SHA256d8eb1a9c7b1e67d49c186e7bec5b8b38eab361d71afdae493d43ba1297e88177
SHA512eb482d4001c2016146b8425bf19442adaa7db119a94bbfdce50c3d64ac4e5d586047a3c1d6da1883205ffabb9c7a6de01addaa7869f5eae798beff4a46d3a7fb
-
Filesize
70KB
MD5ea6c8866d5be5efc338edac62138bb1e
SHA14d7fdc901409f5fefd1257ed0a7bf65b78c45f22
SHA25647c4a5ba9e88f1a89ef758e9934445a5407bcfd9a61b7e3f9cc4191dbd950cc3
SHA5129c188f6a8d54b42fdc83808ebc92ea9e76aeddbd17b11f4b64f471c37422ca65e852405d6bbe2e148609a5aedeefe3eb162998e76d038be8a7201ca05c997992
-
Filesize
63KB
MD53a7aa7235f582933b181ae4e991fdba0
SHA1eee530f6e8fbd0f7b9003c17ce87b0d3eb83de74
SHA256711285652a92e4e1889289b757f405eac7c77bb114f4c325a67a1f89442d3889
SHA512257c7bf955ef5ba005676dda7eefed22ed25085246ce9daa563c45732c45028f2cdf50c63fefa0391fd65878087c693fcacedfa926a788c8f6e40ed608712d05
-
Filesize
1.4MB
MD528f7b68c03ddfd1b1d0e240340f7f194
SHA1c75315b59157679980a79143f2c32f3938abea45
SHA2560a0207eda8c5b43369d433599081615ec45d98ef42a3a5c207caf6807e488d11
SHA512066119c69292be8abe6e3c6fac42658e7e136d96a8da0223d9001c4e6c566d3211900752f6d703d5878b90af463b0cb54fe420b1d4587c28fde86a13324c3f5e
-
Filesize
23KB
MD52877f6f6d5c3289a4f9514a7affe7b90
SHA166f7abd82979413d32049d1532bf4cb11dfcffc5
SHA25696858ca959acc6cbff621b73c3c787f1666b02cc7acd773e653d3f53dd4ddc00
SHA5122de4b8810e1149023ca98cb06d7a800f37f905c638133f41b0abbd312c91049bfb1ce25504177a490ff32c15d6aaec96c3430bbd78a567c9847b82e5dbe0599c
-
Filesize
496KB
MD5745073ef12b8e3ff6beb8d851903f221
SHA1360cd9407021e7e1b3d7ca47f084d5ab5ca36981
SHA256d2c5bef79dea339037caf4a78ca7b37d9c504722fc8ffdd218323036c59f0240
SHA51285c264b01b7b373e2a24e0aa8a47b8037f1d1b5814c74fb1e789e0502ae037c03baad23bc21cd584c873d7b9b72fc2ccef2df4c9a2cdb85409c8ca460c7b4fea
-
Filesize
291KB
MD5c9264bda88577d485bbc68e3caa9649a
SHA11d8ad6766dcbe17e63b319980d18d281915999a9
SHA2561e6e3be7078368ede73c09cd4890328cec2dc706e78521fd6ca516d6052ad196
SHA512e548081ff98fe2fef4aaf0b419e3034effc3569657cd35ac444c816c266365ab2f28588e6b3e9332624bb38c4a044353db031a76de7c4937ec6f233dbff605c8
-
Filesize
34KB
MD55a758c3a5b1a740265d69d9f49dc045a
SHA1c0bbe5a8b6fede55085891be559e7618801894c1
SHA256e4b96f558dba927f0c9f562dc5d744d1d309d1f5720ced7d236725830fe387b5
SHA512fb77b97f9089a500409bc0faa100b4721aa753aa5b6031ab859094aa99d052195db344e891d52bca36d747d5446e34cac0baa5b6a3d956a6c598ef18c01ec8e4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
9.2MB
MD54edf55651659e4d15c3cbd0d761e35ae
SHA1197432a5097b7ddea2ac08348caa76d6dea05bdd
SHA2563cdf166e76ccdfb73557b03ec93760f72a88f81238e6445750ccdea7c682607c
SHA512099e612a382a9dc00c93d9f38083afa7948ed69e3b7e6a4c39fe4c57cd6eef23052e3ea2147cf720820f62f1a2117c903ca7ea821ee9db2d6eb37858e8823b1f
-
Filesize
20.3MB
MD5c2570b2a465aa102322d036e414e8a42
SHA1a8c0ae3e72c64a9c763b05bf4d8b83dedb140b66
SHA256f8709a1342b3d47f768e86ffe572d558f195b309cad337a77bbef6e987cecf06
SHA5124baaaabcb860fb7505a30d8545c3a731c646e4b3a871af9c9edb8a3edc40885cece2e481098f13de106d6310a48f0c3c0978b49df1755dee676ef5ccfe04d4b3