Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
9Static
static
3Pralevia.exe
windows7-x64
7Pralevia.exe
windows10-2004-x64
9$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
3LICENSES.c...m.html
windows10-2004-x64
3Pralevia.exe
windows7-x64
1Pralevia.exe
windows10-2004-x64
9d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1resources/elevate.exe
windows7-x64
3resources/elevate.exe
windows10-2004-x64
3vk_swiftshader.dll
windows7-x64
1vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows7-x64
1vulkan-1.dll
windows10-2004-x64
1$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows7-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3$R0/Uninst...ia.exe
windows7-x64
7Analysis
-
max time kernel
151s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
Pralevia.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Pralevia.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
LICENSES.chromium.html
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
LICENSES.chromium.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Pralevia.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
Pralevia.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
ffmpeg.dll
Resource
win7-20240704-en
Behavioral task
behavioral17
Sample
ffmpeg.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
libEGL.dll
Resource
win7-20240708-en
Behavioral task
behavioral19
Sample
libEGL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
libGLESv2.dll
Resource
win7-20240705-en
Behavioral task
behavioral21
Sample
libGLESv2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
resources/elevate.exe
Resource
win7-20240705-en
Behavioral task
behavioral23
Sample
resources/elevate.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
vk_swiftshader.dll
Resource
win7-20240729-en
Behavioral task
behavioral25
Sample
vk_swiftshader.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
vulkan-1.dll
Resource
win7-20240704-en
Behavioral task
behavioral27
Sample
vulkan-1.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240708-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20240708-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
$R0/Uninstall Pralevia.exe
Resource
win7-20240704-en
General
-
Target
Pralevia.exe
-
Size
168.7MB
-
MD5
a6fcb87a864455a93cd2c24399c52b26
-
SHA1
a4f03ac9fd364221cc4c407ca2c708dc0cecf22c
-
SHA256
5f831e7ed92b73244b2689f5dd0455d217a38bca458b3b1bca83f5ffe47bfac4
-
SHA512
89100fcd5852894c22e10db3158b27e8cce312e8ab7b3dd5f126e6751a9dfb71a348801cfb63ea38c74e3c965b04546836cf24edb61ef25dddda3998e01ab5cb
-
SSDEEP
1572864:1OhiqBPiJU33xaD1gWcdcMPEDCNCgDX0Bf+NNvTPQYhl49RIuKj53fHcTLNKJF96:JgmeNxNNZxqV
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL 1 IoCs
pid Process 4556 Pralevia.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
pid Process 544 cmd.exe 2828 cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF Pralevia.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF Pralevia.exe -
Enumerates processes with tasklist 1 TTPs 3 IoCs
pid Process 5076 tasklist.exe 2232 tasklist.exe 4688 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2696 powershell.exe 2696 powershell.exe 1932 powershell.exe 1932 powershell.exe 860 Pralevia.exe 860 Pralevia.exe 860 Pralevia.exe 860 Pralevia.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5076 tasklist.exe Token: SeIncreaseQuotaPrivilege 4056 WMIC.exe Token: SeSecurityPrivilege 4056 WMIC.exe Token: SeTakeOwnershipPrivilege 4056 WMIC.exe Token: SeLoadDriverPrivilege 4056 WMIC.exe Token: SeSystemProfilePrivilege 4056 WMIC.exe Token: SeSystemtimePrivilege 4056 WMIC.exe Token: SeProfSingleProcessPrivilege 4056 WMIC.exe Token: SeIncBasePriorityPrivilege 4056 WMIC.exe Token: SeCreatePagefilePrivilege 4056 WMIC.exe Token: SeBackupPrivilege 4056 WMIC.exe Token: SeRestorePrivilege 4056 WMIC.exe Token: SeShutdownPrivilege 4056 WMIC.exe Token: SeDebugPrivilege 4056 WMIC.exe Token: SeSystemEnvironmentPrivilege 4056 WMIC.exe Token: SeRemoteShutdownPrivilege 4056 WMIC.exe Token: SeUndockPrivilege 4056 WMIC.exe Token: SeManageVolumePrivilege 4056 WMIC.exe Token: 33 4056 WMIC.exe Token: 34 4056 WMIC.exe Token: 35 4056 WMIC.exe Token: 36 4056 WMIC.exe Token: SeDebugPrivilege 2232 tasklist.exe Token: SeIncreaseQuotaPrivilege 4056 WMIC.exe Token: SeSecurityPrivilege 4056 WMIC.exe Token: SeTakeOwnershipPrivilege 4056 WMIC.exe Token: SeLoadDriverPrivilege 4056 WMIC.exe Token: SeSystemProfilePrivilege 4056 WMIC.exe Token: SeSystemtimePrivilege 4056 WMIC.exe Token: SeProfSingleProcessPrivilege 4056 WMIC.exe Token: SeIncBasePriorityPrivilege 4056 WMIC.exe Token: SeCreatePagefilePrivilege 4056 WMIC.exe Token: SeBackupPrivilege 4056 WMIC.exe Token: SeRestorePrivilege 4056 WMIC.exe Token: SeShutdownPrivilege 4056 WMIC.exe Token: SeDebugPrivilege 4056 WMIC.exe Token: SeSystemEnvironmentPrivilege 4056 WMIC.exe Token: SeRemoteShutdownPrivilege 4056 WMIC.exe Token: SeUndockPrivilege 4056 WMIC.exe Token: SeManageVolumePrivilege 4056 WMIC.exe Token: 33 4056 WMIC.exe Token: 34 4056 WMIC.exe Token: 35 4056 WMIC.exe Token: 36 4056 WMIC.exe Token: SeDebugPrivilege 4688 tasklist.exe Token: SeDebugPrivilege 2696 powershell.exe Token: SeDebugPrivilege 1932 powershell.exe Token: SeShutdownPrivilege 4556 Pralevia.exe Token: SeCreatePagefilePrivilege 4556 Pralevia.exe Token: SeIncreaseQuotaPrivilege 3576 WMIC.exe Token: SeSecurityPrivilege 3576 WMIC.exe Token: SeTakeOwnershipPrivilege 3576 WMIC.exe Token: SeLoadDriverPrivilege 3576 WMIC.exe Token: SeSystemProfilePrivilege 3576 WMIC.exe Token: SeSystemtimePrivilege 3576 WMIC.exe Token: SeProfSingleProcessPrivilege 3576 WMIC.exe Token: SeIncBasePriorityPrivilege 3576 WMIC.exe Token: SeCreatePagefilePrivilege 3576 WMIC.exe Token: SeBackupPrivilege 3576 WMIC.exe Token: SeRestorePrivilege 3576 WMIC.exe Token: SeShutdownPrivilege 3576 WMIC.exe Token: SeDebugPrivilege 3576 WMIC.exe Token: SeSystemEnvironmentPrivilege 3576 WMIC.exe Token: SeRemoteShutdownPrivilege 3576 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4556 wrote to memory of 408 4556 Pralevia.exe 89 PID 4556 wrote to memory of 408 4556 Pralevia.exe 89 PID 408 wrote to memory of 5076 408 cmd.exe 91 PID 408 wrote to memory of 5076 408 cmd.exe 91 PID 4556 wrote to memory of 1312 4556 Pralevia.exe 92 PID 4556 wrote to memory of 1312 4556 Pralevia.exe 92 PID 4556 wrote to memory of 2956 4556 Pralevia.exe 93 PID 4556 wrote to memory of 2956 4556 Pralevia.exe 93 PID 2956 wrote to memory of 2232 2956 cmd.exe 96 PID 2956 wrote to memory of 2232 2956 cmd.exe 96 PID 1312 wrote to memory of 4056 1312 cmd.exe 97 PID 1312 wrote to memory of 4056 1312 cmd.exe 97 PID 4556 wrote to memory of 3704 4556 Pralevia.exe 98 PID 4556 wrote to memory of 3704 4556 Pralevia.exe 98 PID 4556 wrote to memory of 544 4556 Pralevia.exe 99 PID 4556 wrote to memory of 544 4556 Pralevia.exe 99 PID 3704 wrote to memory of 4688 3704 cmd.exe 103 PID 3704 wrote to memory of 4688 3704 cmd.exe 103 PID 544 wrote to memory of 2696 544 cmd.exe 102 PID 544 wrote to memory of 2696 544 cmd.exe 102 PID 4556 wrote to memory of 2828 4556 Pralevia.exe 105 PID 4556 wrote to memory of 2828 4556 Pralevia.exe 105 PID 2828 wrote to memory of 1932 2828 cmd.exe 107 PID 2828 wrote to memory of 1932 2828 cmd.exe 107 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 4120 4556 Pralevia.exe 108 PID 4556 wrote to memory of 3920 4556 Pralevia.exe 109 PID 4556 wrote to memory of 3920 4556 Pralevia.exe 109 PID 4556 wrote to memory of 3952 4556 Pralevia.exe 110 PID 4556 wrote to memory of 3952 4556 Pralevia.exe 110 PID 3920 wrote to memory of 3576 3920 cmd.exe 112 PID 3920 wrote to memory of 3576 3920 cmd.exe 112 PID 4556 wrote to memory of 3004 4556 Pralevia.exe 113 PID 4556 wrote to memory of 3004 4556 Pralevia.exe 113 PID 3004 wrote to memory of 3860 3004 cmd.exe 115 PID 3004 wrote to memory of 3860 3004 cmd.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\Pralevia.exe"C:\Users\Admin\AppData\Local\Temp\Pralevia.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic path win32_computersystemproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_computersystemproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,61,28,111,48,103,192,200,74,187,56,57,175,169,46,187,15,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,8,218,122,81,177,48,95,253,108,218,130,13,112,190,161,148,54,196,50,90,193,158,228,91,46,204,167,254,123,58,18,139,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,214,140,72,70,183,16,203,205,43,205,4,153,236,226,150,108,139,243,20,224,114,19,84,193,11,208,124,197,196,61,82,169,48,0,0,0,8,76,156,179,198,169,195,116,34,32,0,17,1,81,169,82,33,38,0,5,199,59,97,116,172,20,214,91,152,86,96,192,206,198,241,87,169,221,33,132,89,174,201,177,80,202,153,147,64,0,0,0,200,138,112,152,245,240,101,248,210,103,126,78,189,177,23,119,125,33,62,133,57,50,6,248,115,241,146,151,179,22,122,131,2,173,67,64,232,52,160,148,232,154,228,4,97,45,41,113,104,139,91,33,174,101,33,130,65,111,46,244,195,39,204,194), $null, 'CurrentUser')"2⤵
- An obfuscated cmd.exe command-line is typically used to evade detection.
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,61,28,111,48,103,192,200,74,187,56,57,175,169,46,187,15,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,8,218,122,81,177,48,95,253,108,218,130,13,112,190,161,148,54,196,50,90,193,158,228,91,46,204,167,254,123,58,18,139,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,214,140,72,70,183,16,203,205,43,205,4,153,236,226,150,108,139,243,20,224,114,19,84,193,11,208,124,197,196,61,82,169,48,0,0,0,8,76,156,179,198,169,195,116,34,32,0,17,1,81,169,82,33,38,0,5,199,59,97,116,172,20,214,91,152,86,96,192,206,198,241,87,169,221,33,132,89,174,201,177,80,202,153,147,64,0,0,0,200,138,112,152,245,240,101,248,210,103,126,78,189,177,23,119,125,33,62,133,57,50,6,248,115,241,146,151,179,22,122,131,2,173,67,64,232,52,160,148,232,154,228,4,97,45,41,113,104,139,91,33,174,101,33,130,65,111,46,244,195,39,204,194), $null, 'CurrentUser')3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,61,28,111,48,103,192,200,74,187,56,57,175,169,46,187,15,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,238,63,56,178,84,215,241,50,61,115,82,189,250,9,179,193,174,149,201,41,220,105,177,218,111,248,219,168,251,253,6,188,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,74,8,180,93,245,211,233,165,172,19,163,246,211,124,16,77,128,48,82,58,147,46,86,77,223,94,248,135,75,189,61,151,48,0,0,0,181,126,119,173,128,7,117,236,213,252,235,135,151,21,211,212,201,2,198,111,34,158,77,255,138,215,5,253,21,236,215,197,198,97,129,185,186,164,130,224,244,196,37,201,251,223,227,130,64,0,0,0,153,155,48,141,191,30,157,98,119,41,61,136,71,244,170,5,192,8,110,66,25,94,147,83,9,255,165,89,19,229,5,163,74,107,229,22,98,234,25,252,28,149,21,92,182,34,5,60,227,16,101,127,244,133,13,170,164,67,61,77,250,19,45,204), $null, 'CurrentUser')"2⤵
- An obfuscated cmd.exe command-line is typically used to evade detection.
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,61,28,111,48,103,192,200,74,187,56,57,175,169,46,187,15,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,238,63,56,178,84,215,241,50,61,115,82,189,250,9,179,193,174,149,201,41,220,105,177,218,111,248,219,168,251,253,6,188,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,74,8,180,93,245,211,233,165,172,19,163,246,211,124,16,77,128,48,82,58,147,46,86,77,223,94,248,135,75,189,61,151,48,0,0,0,181,126,119,173,128,7,117,236,213,252,235,135,151,21,211,212,201,2,198,111,34,158,77,255,138,215,5,253,21,236,215,197,198,97,129,185,186,164,130,224,244,196,37,201,251,223,227,130,64,0,0,0,153,155,48,141,191,30,157,98,119,41,61,136,71,244,170,5,192,8,110,66,25,94,147,83,9,255,165,89,19,229,5,163,74,107,229,22,98,234,25,252,28,149,21,92,182,34,5,60,227,16,101,127,244,133,13,170,164,67,61,77,250,19,45,204), $null, 'CurrentUser')3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
-
C:\Users\Admin\AppData\Local\Temp\Pralevia.exe"C:\Users\Admin\AppData\Local\Temp\Pralevia.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Pralevia" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1884 --field-trial-handle=1888,i,3182818898159965021,13405437431254922181,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:22⤵PID:4120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic OS get caption"2⤵
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\System32\Wbem\WMIC.exewmic OS get caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3576
-
-
-
C:\Users\Admin\AppData\Local\Temp\Pralevia.exe"C:\Users\Admin\AppData\Local\Temp\Pralevia.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Pralevia" --mojo-platform-channel-handle=2088 --field-trial-handle=1888,i,3182818898159965021,13405437431254922181,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:82⤵PID:3952
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "hostname"2⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\HOSTNAME.EXEhostname3⤵PID:3860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Pralevia.exe"C:\Users\Admin\AppData\Local\Temp\Pralevia.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\Pralevia" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=908 --field-trial-handle=1888,i,3182818898159965021,13405437431254922181,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f48896adf9a23882050cdff97f610a7f
SHA14c5a610df62834d43f470cae7e851946530e3086
SHA2563ae35c2828715a2f9a5531d334a0cfffc81396c2dc058ca42a9943f3cdc22e78
SHA51216644246f2a35a186fcb5c2b6456ed6a16e8db65ad1383109e06547f9b1f9358f071c30cca541ca4cf7bae66cb534535e88f75f6296a4bfc6c7b22b0684a6ba9
-
Filesize
1KB
MD5c3d0e052ba84a5a94a12f82b5523b45e
SHA118c9412da40f1d565c47dc150f782672a8913baa
SHA2560937d02e49f29b26b70ae49a9709208b79a25cb2b927251e5ef2cce71942638d
SHA51278a4c052734d4540e190e37c674302d1a234c9d83e0761b1337241519685dbe486b65a8d58919bc2e166c8a58395895fd1385b8a47f5fed4506dbf132ddfc607
-
Filesize
1.4MB
MD556192831a7f808874207ba593f464415
SHA1e0c18c72a62692d856da1f8988b0bc9c8088d2aa
SHA2566aa8763714aa5199a4065259af792292c2a7d6a2c381aa27007255421e5c9d8c
SHA512c82aa1ef569c232b4b4f98a3789f2390e5f7bf5cc7e73d199fe23a3f636817edfdc2fb49ce7f69169c028a9dd5ab9f63e8f64964bb22424fc08db71e85054a33
-
Filesize
14B
MD5b4b41665eb819824e886204a28cc610b
SHA1e778edb6f635f665c0b512748b8fec6a2a23a88b
SHA256635f814c1f34ee53ee62b67f989fec91eb0e08f63769ab4bd22cf4206a2cfff6
SHA51237648652b1df14aa427382a4dac70d58a107d3dd77bd1977afc3acce8c56b7b6531b67d33f4b61b9fb8fbb9230ab0dfd461db07c1cc11a2923604e910a743d67
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82