Analysis
-
max time kernel
91s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 19:11
URLScan task
urlscan1
General
Malware Config
Extracted
lumma
https://solutionpxmuzo.shop/api
https://writerospzm.shop/api
https://deallerospfosu.shop/api
https://bassizcellskz.shop/api
https://languagedscie.shop/api
https://complaintsipzzx.shop/api
https://quialitsuzoxm.shop/api
https://tenntysjuxmz.shop/api
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 28 IoCs
Run Powershell and hide display window.
pid Process 4220 powershell.exe 5780 powershell.exe 5964 powershell.exe 5500 powershell.exe 5644 powershell.exe 3708 powershell.exe 5444 powershell.exe 5552 powershell.exe 5680 powershell.exe 5872 powershell.exe 5304 powershell.exe 6132 powershell.exe 5344 powershell.exe 3252 powershell.exe 5444 powershell.exe 5780 powershell.exe 5964 powershell.exe 6132 powershell.exe 5680 powershell.exe 5304 powershell.exe 5552 powershell.exe 5872 powershell.exe 4220 powershell.exe 3252 powershell.exe 5644 powershell.exe 5500 powershell.exe 3708 powershell.exe 5344 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 5376 hper.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 161 raw.githubusercontent.com 162 raw.githubusercontent.com 221 raw.githubusercontent.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5376 hper.exe 5376 hper.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hper.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4220 powershell.exe 4220 powershell.exe 4220 powershell.exe 5304 powershell.exe 5304 powershell.exe 5304 powershell.exe 5444 powershell.exe 5444 powershell.exe 5444 powershell.exe 5644 powershell.exe 5644 powershell.exe 5644 powershell.exe 5780 powershell.exe 5780 powershell.exe 5780 powershell.exe 5908 taskmgr.exe 5908 taskmgr.exe 5964 powershell.exe 5964 powershell.exe 5964 powershell.exe 6132 powershell.exe 6132 powershell.exe 6132 powershell.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 4220 powershell.exe Token: SeDebugPrivilege 5304 powershell.exe Token: SeDebugPrivilege 5444 powershell.exe Token: SeDebugPrivilege 5644 powershell.exe Token: SeDebugPrivilege 5780 powershell.exe Token: SeDebugPrivilege 5908 taskmgr.exe Token: SeSystemProfilePrivilege 5908 taskmgr.exe Token: SeCreateGlobalPrivilege 5908 taskmgr.exe Token: SeDebugPrivilege 5964 powershell.exe Token: SeDebugPrivilege 6132 powershell.exe Token: SeDebugPrivilege 5500 powershell.exe Token: SeDebugPrivilege 3708 powershell.exe Token: SeDebugPrivilege 5344 powershell.exe Token: SeDebugPrivilege 5552 powershell.exe Token: SeDebugPrivilege 3252 powershell.exe Token: SeDebugPrivilege 5680 powershell.exe Token: SeDebugPrivilege 5872 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe 5908 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5376 hper.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2488 wrote to memory of 4220 2488 Bootstrapper.exe 126 PID 2488 wrote to memory of 4220 2488 Bootstrapper.exe 126 PID 2488 wrote to memory of 5304 2488 Bootstrapper.exe 128 PID 2488 wrote to memory of 5304 2488 Bootstrapper.exe 128 PID 2488 wrote to memory of 5444 2488 Bootstrapper.exe 129 PID 2488 wrote to memory of 5444 2488 Bootstrapper.exe 129 PID 2488 wrote to memory of 5644 2488 Bootstrapper.exe 131 PID 2488 wrote to memory of 5644 2488 Bootstrapper.exe 131 PID 2488 wrote to memory of 5780 2488 Bootstrapper.exe 132 PID 2488 wrote to memory of 5780 2488 Bootstrapper.exe 132 PID 2488 wrote to memory of 5964 2488 Bootstrapper.exe 134 PID 2488 wrote to memory of 5964 2488 Bootstrapper.exe 134 PID 2488 wrote to memory of 6132 2488 Bootstrapper.exe 135 PID 2488 wrote to memory of 6132 2488 Bootstrapper.exe 135 PID 2488 wrote to memory of 5376 2488 Bootstrapper.exe 137 PID 2488 wrote to memory of 5376 2488 Bootstrapper.exe 137 PID 2488 wrote to memory of 5376 2488 Bootstrapper.exe 137 PID 3036 wrote to memory of 5500 3036 Bootstrapper.exe 146 PID 3036 wrote to memory of 5500 3036 Bootstrapper.exe 146 PID 3036 wrote to memory of 3708 3036 Bootstrapper.exe 147 PID 3036 wrote to memory of 3708 3036 Bootstrapper.exe 147 PID 3036 wrote to memory of 5344 3036 Bootstrapper.exe 148 PID 3036 wrote to memory of 5344 3036 Bootstrapper.exe 148 PID 3036 wrote to memory of 5552 3036 Bootstrapper.exe 149 PID 3036 wrote to memory of 5552 3036 Bootstrapper.exe 149 PID 3036 wrote to memory of 3252 3036 Bootstrapper.exe 150 PID 3036 wrote to memory of 3252 3036 Bootstrapper.exe 150 PID 3036 wrote to memory of 5680 3036 Bootstrapper.exe 151 PID 3036 wrote to memory of 5680 3036 Bootstrapper.exe 151 PID 3036 wrote to memory of 5872 3036 Bootstrapper.exe 152 PID 3036 wrote to memory of 5872 3036 Bootstrapper.exe 152
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://solaraexploit.com/index.html@p=99.html1⤵PID:4528
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --field-trial-handle=3300,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4712 /prefetch:11⤵PID:3960
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --field-trial-handle=3996,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=5052 /prefetch:11⤵PID:2644
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --field-trial-handle=5364,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=5372 /prefetch:11⤵PID:3144
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=5404,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=5540 /prefetch:81⤵PID:4724
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --field-trial-handle=5532,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=5592 /prefetch:81⤵PID:3948
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=5920,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=6084 /prefetch:11⤵PID:3472
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=6268,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=6292 /prefetch:81⤵PID:3196
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=6420,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=6448 /prefetch:11⤵PID:2948
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --field-trial-handle=3428,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=6304 /prefetch:11⤵PID:1040
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --field-trial-handle=6396,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=6312 /prefetch:11⤵PID:4976
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --field-trial-handle=2944,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=6876 /prefetch:11⤵PID:4176
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --field-trial-handle=6028,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4800 /prefetch:81⤵PID:4400
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --field-trial-handle=6412,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=6752 /prefetch:11⤵PID:4428
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1464
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --field-trial-handle=6876,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=6884 /prefetch:11⤵PID:4924
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --field-trial-handle=6816,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=7164 /prefetch:11⤵PID:184
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --field-trial-handle=6692,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=6472 /prefetch:81⤵PID:3996
-
C:\Users\Admin\Downloads\Bootstrapper.exe"C:\Users\Admin\Downloads\Bootstrapper.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4220
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Windows'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5304
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Program Files'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5444
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Program Files (x86)'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Recovery'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\meral'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5964
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath '%USERPROFILE%\Desktop'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6132
-
-
C:\meral\hper.exeC:\meral\hper.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5376
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5908
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --field-trial-handle=6560,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=6404 /prefetch:81⤵PID:5156
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=6520,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=6828 /prefetch:81⤵PID:5564
-
C:\Users\Admin\Downloads\Bootstrapper.exe"C:\Users\Admin\Downloads\Bootstrapper.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5500
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Windows'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Program Files'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5344
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Program Files (x86)'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5552
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Recovery'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\meral'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath '%USERPROFILE%\Desktop'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d8cb3e9459807e35f02130fad3f9860d
SHA15af7f32cb8a30e850892b15e9164030a041f4bd6
SHA2562b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68
SHA512045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184
-
Filesize
944B
MD567e8893616f805af2411e2f4a1411b2a
SHA139bf1e1a0ddf46ce7c136972120f512d92827dcd
SHA256ca0dfe104c1bf27f7e01999fcdabc16c6400c3da937c832c26bdbca322381d31
SHA512164e911a9935e75c8be1a6ec3d31199a16ba2a1064da6c09d771b2a38dd7fddd142301ef55d67d90f306d3a454a1ce7b72e129ea42e44500b9b8c623a8d98b4d
-
Filesize
944B
MD5ce4540390cc4841c8973eb5a3e9f4f7d
SHA12293f30a6f4c9538bc5b06606c10a50ab4ecef8e
SHA256e834e1da338b9644d538cefd70176768816da2556939c1255d386931bd085105
SHA5122a3e466cb5a81d2b65256053b768a98321eb3e65ff46353eefc9864f14a391748116f050e7482ddd73a51575bf0a6fc5c673023dade62dbd8b174442bae1cc6b
-
Filesize
944B
MD505d3bee4c6bd38d484f92b3ce4d165c1
SHA11320c1fb82e8f3495335fd248c1b40a9c2ab9195
SHA2569e37ddb569122fcaa958f73073cfa236d2f22a9436ada3d3e12ad57b060087d1
SHA51258bcad15b86fccc5cc04115e7253f50bc7ede475b8d8eec9069371d67af51e44842a3bc3423af21474fb544e093daf2cd3b7b23ddfc30e3401dfa0c7d66e4889
-
Filesize
944B
MD5cae60f0ddddac635da71bba775a2c5b4
SHA1386f1a036af61345a7d303d45f5230e2df817477
SHA256b2dd636b7b0d3bfe44cef5e1175828b1fa7bd84d5563f54342944156ba996c16
SHA51228ed8a8bc132ef56971cfd7b517b17cdb74a7f8c247ef6bff232996210075e06aa58a415825a1e038cfb547ad3dc6882bf1ca1b68c5b360ef0512a1440850253
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
Filesize
944B
MD5ab24765a7393bd3cef8acbf0a617fba2
SHA1ef2c12a457a11f6204344afed09a39f4d3e803cb
SHA2563a03c7efabe880ae9f283b1cf373d3f09d07ab619028319b3599b643ae140d47
SHA512e16306674a8c89f54467d7fba3857e1e0bdf3729f5de9f4451520cfbddfa535c4d653dde6efcac38efd693e9b3e4965fcd08c559e720c372feca65050b46e355
-
Filesize
944B
MD5b51dc9e5ec3c97f72b4ca9488bbb4462
SHA15c1e8c0b728cd124edcacefb399bbd5e25b21bd3
SHA256976f9534aa2976c85c2455bdde786a3f55d63aefdd40942eba1223c4c93590db
SHA5120e5aa6cf64c535aefb833e5757b68e1094c87424abe2615a7d7d26b1b31eff358d12e36e75ca57fd690a9919b776600bf4c5c0e5a5df55366ba62238bdf3f280
-
Filesize
944B
MD50256bd284691ed0fc502ef3c8a7e58dc
SHA1dcdf69dc8ca8bf068f65d20ef1563bbe283e2413
SHA256e2fb83098e114084f51ed7187334f861ce670051046c39f338928296ca9a49cf
SHA512c5b29c1e0a15ddb68b0579848066774fa7cdc6f35087bbbf47c05a5c0dcc1eb3e61b2ddadfbded8c1ed9820e637596a9f08a97db8fb18000d168e6b159060c42
-
Filesize
944B
MD5eb1ad317bd25b55b2bbdce8a28a74a94
SHA198a3978be4d10d62e7411946474579ee5bdc5ea6
SHA2569e94e7c9ac6134ee30e79498558aa1a5a1ac79a643666c3f8922eed215dd3a98
SHA512d011f266c0240d84470c0f9577cd9e4927309bd19bb38570ca9704ed8e1d159f9bea982a59d3eefef72ce7a10bd81208b82e88ef57c7af587f7437a89769adc0
-
Filesize
944B
MD522310ad6749d8cc38284aa616efcd100
SHA1440ef4a0a53bfa7c83fe84326a1dff4326dcb515
SHA25655b1d8021c4eb4c3c0d75e3ed7a4eb30cd0123e3d69f32eeb596fe4ffec05abf
SHA5122ef08e2ee15bb86695fe0c10533014ffed76ececc6e579d299d3365fafb7627f53e32e600bb6d872b9f58aca94f8cb7e1e94cdfd14777527f7f0aa019d9c6def
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.2MB
MD54737660ec423f67db53227e32313fd95
SHA17db554f770ee70aa08bf0763997bf67ba511cc2a
SHA25627cf7add6792edae5ab8441cc53c005023be52bde47ad9f2821d6c65deadcc41
SHA51211731b1316eb8328b5e41f820c6a37d300e672a6658291acfa92176c546a1cfd27d593d03f8742b4f9eb52c9e22a0061b85c86035d83ee75d0b5ba6780854644