Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 12:07
Static task
static1
Behavioral task
behavioral1
Sample
downloader.exe
Resource
win7-20240704-en
General
-
Target
downloader.exe
-
Size
70.1MB
-
MD5
de8c4fd7ed1b7623ab3c9a4e55c17211
-
SHA1
40f68eb4eb8194fa236f13e980d7d0940db0a9fe
-
SHA256
192933cb274a687f0072e0db4064e4ee9080b95e303fd0ab9347760bc091e3c2
-
SHA512
85c4bd56d6187c10baf3278de30268379b23131025e9fb6f21cf040d29c7291db6d3d1beefe0c9a7c814d932f34b0a22bf3443184f30dc4e0244eab2230c374b
-
SSDEEP
393216:lWxQN89qQk4adiJCuE2fUCdod+OvqKkZHzXhJ/KTe8uiBUtkc0k3qEsGg4GUo3Nf:lWoI7zGi5ahWc3Im9
Malware Config
Extracted
xworm
5.0
88.0.183.177:1603
88.0.172.65:1603
83.36.190.196:1603
83.38.30.219:1603
XpRJMNcN9dWrZEo0
-
Install_directory
%ProgramData%
-
install_file
RuntimeBroker.exe
Extracted
xworm
88.0.183.177:1603
88.0.172.65:1603
83.36.190.196:1603
83.38.30.219:1603
-
Install_directory
%Public%
-
install_file
WmiPrvSE.exe
Signatures
-
Detect Xworm Payload 6 IoCs
resource yara_rule behavioral2/files/0x00080000000234f4-35.dat family_xworm behavioral2/files/0x00070000000234f7-64.dat family_xworm behavioral2/memory/1960-86-0x0000000000F20000-0x0000000000F30000-memory.dmp family_xworm behavioral2/files/0x00070000000234f8-117.dat family_xworm behavioral2/memory/4236-122-0x0000000000970000-0x00000000009B2000-memory.dmp family_xworm behavioral2/memory/3980-121-0x0000000000380000-0x00000000003A4000-memory.dmp family_xworm -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sdsd_1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ notepadd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ notepadd.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5028 powershell.exe 1832 powershell.exe 2296 powershell.exe 3460 powershell.exe 3412 powershell.exe 972 powershell.exe 3256 powershell.exe 3148 powershell.exe 3488 powershell.exe 3960 powershell.exe 1940 powershell.exe 1184 powershell.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sdsd_1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion notepadd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion notepadd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion notepadd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion notepadd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sdsd_1.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation notepadd.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation WmiPrvSE.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation SecurityHealthSystray.exe -
Drops startup file 8 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\microsoft.lnk sdsd_1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WmiPrvSE.lnk WmiPrvSE.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WmiPrvSE.lnk WmiPrvSE.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RuntimeBroker.lnk RuntimeBroker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RuntimeBroker.lnk RuntimeBroker.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecurityHealthSystray.lnk SecurityHealthSystray.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecurityHealthSystray.lnk SecurityHealthSystray.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\microsoft.lnk sdsd_1.exe -
Executes dropped EXE 12 IoCs
pid Process 4456 sdsd_1.exe 2668 notepadd.exe 1960 RuntimeBroker.exe 4236 SecurityHealthSystray.exe 3980 WmiPrvSE.exe 2296 notepadd.exe 720 RuntimeBroker.exe 1300 WmiPrvSE.exe 4040 SecurityHealthSystray.exe 720 RuntimeBroker.exe 4976 WmiPrvSE.exe 4436 SecurityHealthSystray.exe -
Loads dropped DLL 3 IoCs
pid Process 4456 sdsd_1.exe 2668 notepadd.exe 2296 notepadd.exe -
Obfuscated with Agile.Net obfuscator 4 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/files/0x000b00000002343d-5.dat agile_net behavioral2/files/0x000a00000002343e-8.dat agile_net behavioral2/memory/4456-9-0x00000000007A0000-0x0000000000EA8000-memory.dmp agile_net behavioral2/memory/2668-10-0x0000000000D10000-0x0000000001486000-memory.dmp agile_net -
resource yara_rule behavioral2/files/0x0008000000023461-15.dat themida behavioral2/memory/4456-23-0x00007FFF7CA70000-0x00007FFF7D5F4000-memory.dmp themida behavioral2/memory/2668-24-0x00007FFF79010000-0x00007FFF79B94000-memory.dmp themida behavioral2/memory/4456-26-0x00007FFF7CA70000-0x00007FFF7D5F4000-memory.dmp themida behavioral2/memory/2668-28-0x00007FFF79010000-0x00007FFF79B94000-memory.dmp themida behavioral2/memory/2668-120-0x00007FFF79010000-0x00007FFF79B94000-memory.dmp themida behavioral2/memory/2296-130-0x00007FFF79010000-0x00007FFF79B94000-memory.dmp themida behavioral2/memory/2296-131-0x00007FFF79010000-0x00007FFF79B94000-memory.dmp themida behavioral2/memory/2296-133-0x00007FFF79010000-0x00007FFF79B94000-memory.dmp themida behavioral2/memory/4456-284-0x00007FFF7CA70000-0x00007FFF7D5F4000-memory.dmp themida behavioral2/memory/4456-285-0x00007FFF7CA70000-0x00007FFF7D5F4000-memory.dmp themida behavioral2/memory/4456-286-0x00007FFF7CA70000-0x00007FFF7D5F4000-memory.dmp themida behavioral2/memory/4456-287-0x00007FFF7CA70000-0x00007FFF7D5F4000-memory.dmp themida behavioral2/memory/4456-294-0x00007FFF7CA70000-0x00007FFF7D5F4000-memory.dmp themida behavioral2/memory/4456-298-0x00007FFF7CA70000-0x00007FFF7D5F4000-memory.dmp themida behavioral2/memory/4456-300-0x00007FFF7CA70000-0x00007FFF7D5F4000-memory.dmp themida behavioral2/memory/4456-304-0x00007FFF7CA70000-0x00007FFF7D5F4000-memory.dmp themida behavioral2/memory/4456-305-0x00007FFF7CA70000-0x00007FFF7D5F4000-memory.dmp themida behavioral2/memory/4456-306-0x00007FFF7CA70000-0x00007FFF7D5F4000-memory.dmp themida behavioral2/memory/4456-314-0x00007FFF7CA70000-0x00007FFF7D5F4000-memory.dmp themida behavioral2/memory/4456-315-0x00007FFF7CA70000-0x00007FFF7D5F4000-memory.dmp themida behavioral2/memory/4456-316-0x00007FFF7CA70000-0x00007FFF7D5F4000-memory.dmp themida behavioral2/memory/4456-317-0x00007FFF7CA70000-0x00007FFF7D5F4000-memory.dmp themida behavioral2/memory/4456-318-0x00007FFF7CA70000-0x00007FFF7D5F4000-memory.dmp themida -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "C:\\ProgramData\\RuntimeBroker.exe" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Users\\Admin\\AppData\\Local\\Temp\\SecurityHealthSystray.exe" SecurityHealthSystray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Users\\Public\\WmiPrvSE.exe" WmiPrvSE.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA notepadd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA notepadd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sdsd_1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 4456 sdsd_1.exe 2668 notepadd.exe 2296 notepadd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3096 schtasks.exe 2556 schtasks.exe 4056 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4456 sdsd_1.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 3256 powershell.exe 3256 powershell.exe 3256 powershell.exe 3488 powershell.exe 3488 powershell.exe 3148 powershell.exe 3148 powershell.exe 3488 powershell.exe 4456 sdsd_1.exe 4456 sdsd_1.exe 3148 powershell.exe 5028 powershell.exe 5028 powershell.exe 5028 powershell.exe 1832 powershell.exe 1832 powershell.exe 1832 powershell.exe 2296 powershell.exe 2296 powershell.exe 2296 powershell.exe 3960 powershell.exe 3960 powershell.exe 3960 powershell.exe 1940 powershell.exe 1940 powershell.exe 1940 powershell.exe 3460 powershell.exe 3460 powershell.exe 3460 powershell.exe 1184 powershell.exe 1184 powershell.exe 1184 powershell.exe 972 powershell.exe 972 powershell.exe 972 powershell.exe 3412 powershell.exe 3412 powershell.exe 3412 powershell.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeDebugPrivilege 4456 sdsd_1.exe Token: SeDebugPrivilege 1960 RuntimeBroker.exe Token: SeDebugPrivilege 4236 SecurityHealthSystray.exe Token: SeDebugPrivilege 3980 WmiPrvSE.exe Token: SeDebugPrivilege 3256 powershell.exe Token: SeDebugPrivilege 3488 powershell.exe Token: SeDebugPrivilege 3148 powershell.exe Token: SeDebugPrivilege 4456 sdsd_1.exe Token: SeDebugPrivilege 5028 powershell.exe Token: SeDebugPrivilege 1832 powershell.exe Token: SeDebugPrivilege 2296 powershell.exe Token: SeDebugPrivilege 3960 powershell.exe Token: SeDebugPrivilege 1940 powershell.exe Token: SeDebugPrivilege 3460 powershell.exe Token: SeDebugPrivilege 1184 powershell.exe Token: SeDebugPrivilege 972 powershell.exe Token: SeDebugPrivilege 3412 powershell.exe Token: SeDebugPrivilege 3980 WmiPrvSE.exe Token: SeDebugPrivilege 1960 RuntimeBroker.exe Token: SeDebugPrivilege 4236 SecurityHealthSystray.exe Token: SeDebugPrivilege 720 RuntimeBroker.exe Token: SeDebugPrivilege 1300 WmiPrvSE.exe Token: SeDebugPrivilege 4040 SecurityHealthSystray.exe Token: SeDebugPrivilege 4976 WmiPrvSE.exe Token: SeDebugPrivilege 720 RuntimeBroker.exe Token: SeDebugPrivilege 4436 SecurityHealthSystray.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4456 sdsd_1.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3752 wrote to memory of 1168 3752 downloader.exe 89 PID 3752 wrote to memory of 1168 3752 downloader.exe 89 PID 3752 wrote to memory of 4384 3752 downloader.exe 91 PID 3752 wrote to memory of 4384 3752 downloader.exe 91 PID 1168 wrote to memory of 4456 1168 cmd.exe 90 PID 1168 wrote to memory of 4456 1168 cmd.exe 90 PID 4384 wrote to memory of 2668 4384 cmd.exe 92 PID 4384 wrote to memory of 2668 4384 cmd.exe 92 PID 2668 wrote to memory of 1960 2668 notepadd.exe 93 PID 2668 wrote to memory of 1960 2668 notepadd.exe 93 PID 2668 wrote to memory of 4236 2668 notepadd.exe 94 PID 2668 wrote to memory of 4236 2668 notepadd.exe 94 PID 2668 wrote to memory of 3980 2668 notepadd.exe 95 PID 2668 wrote to memory of 3980 2668 notepadd.exe 95 PID 3752 wrote to memory of 5088 3752 downloader.exe 96 PID 3752 wrote to memory of 5088 3752 downloader.exe 96 PID 5088 wrote to memory of 2296 5088 cmd.exe 112 PID 5088 wrote to memory of 2296 5088 cmd.exe 112 PID 1960 wrote to memory of 3256 1960 RuntimeBroker.exe 100 PID 1960 wrote to memory of 3256 1960 RuntimeBroker.exe 100 PID 4236 wrote to memory of 3148 4236 SecurityHealthSystray.exe 102 PID 4236 wrote to memory of 3148 4236 SecurityHealthSystray.exe 102 PID 3980 wrote to memory of 3488 3980 WmiPrvSE.exe 104 PID 3980 wrote to memory of 3488 3980 WmiPrvSE.exe 104 PID 3980 wrote to memory of 5028 3980 WmiPrvSE.exe 108 PID 3980 wrote to memory of 5028 3980 WmiPrvSE.exe 108 PID 1960 wrote to memory of 1832 1960 RuntimeBroker.exe 110 PID 1960 wrote to memory of 1832 1960 RuntimeBroker.exe 110 PID 4236 wrote to memory of 2296 4236 SecurityHealthSystray.exe 112 PID 4236 wrote to memory of 2296 4236 SecurityHealthSystray.exe 112 PID 3980 wrote to memory of 3960 3980 WmiPrvSE.exe 114 PID 3980 wrote to memory of 3960 3980 WmiPrvSE.exe 114 PID 1960 wrote to memory of 1940 1960 RuntimeBroker.exe 116 PID 1960 wrote to memory of 1940 1960 RuntimeBroker.exe 116 PID 4236 wrote to memory of 3460 4236 SecurityHealthSystray.exe 118 PID 4236 wrote to memory of 3460 4236 SecurityHealthSystray.exe 118 PID 3980 wrote to memory of 1184 3980 WmiPrvSE.exe 120 PID 3980 wrote to memory of 1184 3980 WmiPrvSE.exe 120 PID 1960 wrote to memory of 972 1960 RuntimeBroker.exe 122 PID 1960 wrote to memory of 972 1960 RuntimeBroker.exe 122 PID 4236 wrote to memory of 3412 4236 SecurityHealthSystray.exe 124 PID 4236 wrote to memory of 3412 4236 SecurityHealthSystray.exe 124 PID 3980 wrote to memory of 4056 3980 WmiPrvSE.exe 127 PID 3980 wrote to memory of 4056 3980 WmiPrvSE.exe 127 PID 1960 wrote to memory of 3096 1960 RuntimeBroker.exe 129 PID 1960 wrote to memory of 3096 1960 RuntimeBroker.exe 129 PID 4236 wrote to memory of 2556 4236 SecurityHealthSystray.exe 131 PID 4236 wrote to memory of 2556 4236 SecurityHealthSystray.exe 131 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\downloader.exe"C:\Users\Admin\AppData\Local\Temp\downloader.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "start "" "C:\Users\Admin\AppData\Local\Temp\sdsd_1.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\sdsd_1.exe"C:\Users\Admin\AppData\Local\Temp\sdsd_1.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4456
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "start "" "C:\Users\Admin\AppData\Local\Temp\notepadd.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\notepadd.exe"C:\Users\Admin\AppData\Local\Temp\notepadd.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\RuntimeBroker.exe"C:\Users\Admin\RuntimeBroker.exe"4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\RuntimeBroker.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RuntimeBroker.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\RuntimeBroker.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RuntimeBroker.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "RuntimeBroker" /tr "C:\ProgramData\RuntimeBroker.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:3096
-
-
-
C:\Users\Admin\SecurityHealthSystray.exe"C:\Users\Admin\SecurityHealthSystray.exe"4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\SecurityHealthSystray.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SecurityHealthSystray.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\SecurityHealthSystray.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3460
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SecurityHealthSystray.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SecurityHealthSystray" /tr "C:\Users\Admin\AppData\Local\Temp\SecurityHealthSystray.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:2556
-
-
-
C:\Users\Admin\WmiPrvSE.exe"C:\Users\Admin\WmiPrvSE.exe"4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3488
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "WmiPrvSE" /tr "C:\Users\Public\WmiPrvSE.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:4056
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "start "" "C:\Users\Admin\AppData\Local\Temp\notepadd.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\notepadd.exe"C:\Users\Admin\AppData\Local\Temp\notepadd.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2296
-
-
-
C:\Users\Public\WmiPrvSE.exeC:\Users\Public\WmiPrvSE.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
C:\ProgramData\RuntimeBroker.exeC:\ProgramData\RuntimeBroker.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:720
-
C:\Users\Admin\AppData\Local\Temp\SecurityHealthSystray.exeC:\Users\Admin\AppData\Local\Temp\SecurityHealthSystray.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
C:\ProgramData\RuntimeBroker.exeC:\ProgramData\RuntimeBroker.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:720
-
C:\Users\Public\WmiPrvSE.exeC:\Users\Public\WmiPrvSE.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
C:\Users\Admin\AppData\Local\Temp\SecurityHealthSystray.exeC:\Users\Admin\AppData\Local\Temp\SecurityHealthSystray.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4436
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
Filesize
944B
MD5d8cb3e9459807e35f02130fad3f9860d
SHA15af7f32cb8a30e850892b15e9164030a041f4bd6
SHA2562b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68
SHA512045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184
-
Filesize
944B
MD534f595487e6bfd1d11c7de88ee50356a
SHA14caad088c15766cc0fa1f42009260e9a02f953bb
SHA2560f9a4b52e01cb051052228a55d0515911b7ef5a8db3cf925528c746df511424d
SHA51210976c5deaf9fac449e703e852c3b08d099f430de2d7c7b8e2525c35d63e28b890e5aab63feff9b20bca0aaf9f35a3ba411aee3fbeee9ea59f90ed25bd617a0b
-
Filesize
944B
MD5ba169f4dcbbf147fe78ef0061a95e83b
SHA192a571a6eef49fff666e0f62a3545bcd1cdcda67
SHA2565ef1421e19fde4bc03cd825dd7d6c0e7863f85fd8f0aa4a4d4f8d555dc7606d1
SHA5128d2e5e552210dcda684682538bc964fdd8a8ff5b24cc2cc8af813729f0202191f98eb42d38d2355df17ae620fe401aad6ceaedaed3b112fdacd32485a3a0c07c
-
Filesize
944B
MD562d94562013cad250e309b4091503254
SHA1f658f6e53e980694f5ff5bae10455c21ee059a2e
SHA2561ff2d02730e490230262e82169d667b1db011b405f53b3bb4345ed1ee3efc1d5
SHA512282e6777407b759ba15e7410cefc8652ae362a5e9ae13dfb355a3044154ca018a8de2b98df0e83012ae98279480ee3b517c62d33c8122f078ea5f3732aaa2a97
-
Filesize
4.2MB
MD505b012457488a95a05d0541e0470d392
SHA174f541d6a8365508c794ef7b4ac7c297457f9ce3
SHA2561f77a0749ac730500f203b8c4d072587923ac679e184a3859aeb855c2a2e7d8d
SHA5126d6e7b838d4425d49ac8d3738135374ef5357f0677b07cecb7afbf5feddc1997bf6dce68d48787eff8a74c4728def8880c8f01842eda35b5815fb561fa401ae6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
7.4MB
MD5c694c8301947af8b5c65e6132581044b
SHA1d1c7cbb77eff86db70df4feae1c2a849fb695b65
SHA2560e18f1cd01243a43de369982b88a586b585f2dc34f0c8a942f54f21069e5c71c
SHA512babe000cade9afcc76cf41b0bd064c0124d5a97ff4e3e52024e25ad39fe8f9f26ac3a4027f4194d19ead2a502df4dbc916f1b2f870a14d4a2ae28a3115804775
-
Filesize
7.0MB
MD547d346922b3f771ddf7c8bb6561f7d4e
SHA19b9f255438265bf69e2aaf009500da72df23d416
SHA256839519c001ba1fdb59d646c9ccc02e6d0db57d1948d6c6efd2b1a40607b9c99b
SHA5124a8a5ad173d5c2b72d70fbd49e12df47fc6bd4e6b35f154ce6ce7f7ea7fc3de0a1422439c152221a1b000870e87299de58bc9cbcf68dbaf637377b4f6266e7d8
-
Filesize
36KB
MD551b33fef6848fd52da62f31ebe64e1a5
SHA1740fc31cd7b69aacc11a2377f52ef725fc1d3d77
SHA256058eb738227f17552cedd86fde447ff319d4b354bef777ff8149a9df30dc6e7f
SHA512c0727a6ee074dff2b5ac36d086ec86660b287e515fe7422cfc947df47328553a99af0812126d2243f4fefd1a784881dc283e8bac65007b77d487756734a4c0d6
-
Filesize
244KB
MD5f16d02b68f259d19e504bedd54d59e39
SHA1d9102d345fceafd22b5b9a69f62e933f79a10a19
SHA256b062135658f9e98a3dd7ae2cde12de8db784fd87cce6bf4c42aa0e9b3a775877
SHA512ab0ea68c5dced9a6b2441f58a5ca6392071f82c700692c7438472be253c51eba2f44a0fdeebd18508af9a6e25ad689219c502cd2b7790a2bb7387a840375b007
-
Filesize
127KB
MD5b57e530c98da33302694a3da8d773e31
SHA1476a5c20a5ae2e644442057635ea2da77c72a311
SHA2563ff319a9cc09b0b02a5881a55e15d309f47a8d615912434875a9346153bade6b
SHA51280ef2f24e6090d9c6c9bf9f54d6796a0066f2c90abcdda16c994b3864096678d9f0a98ff2a479b36acc174bc2d7b3ac15b58b9eefbbe6d88a92364f19206fc60