Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-08-2024 18:48
Behavioral task
behavioral1
Sample
Solara.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Solara.exe
Resource
win10v2004-20240802-en
General
-
Target
Solara.exe
-
Size
1005KB
-
MD5
d1a6835f7934684efb8df6b6f2d8a9df
-
SHA1
56f4e81d4663181f139e5b7b165e41611cbcc472
-
SHA256
2b0521e21f41e110682b1871824451a9826a4ff2f5691d4e25186b36b0294146
-
SHA512
c9e0557c3251c7a5d805c6e4047cee99949dab9a702e4e076e4ec0d9f0969b0210f4ca29c36ea7b4e15c43a70c7c076c0718df1b72bac057b2af7f3605f5908d
-
SSDEEP
12288:xE5dY26i2vTGY1Dg6x7L1uq2/OBPQu43D8fPVle8IoaBcHl8ANTSwAlZw:x2r2yAPC8eRBcHl8gTSHXw
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1244807698026070016/Tfzk-_b80yPKERHasgSCWK64Pdjux3P8VTHXs1cSWpKcLSUecUTjKHtLyEEhA8jsiCW-
Extracted
xworm
grand-herbal.gl.at.ply.gg:53590
-
Install_directory
%ProgramData%
-
install_file
Windows32.exe
Signatures
-
Detect Xworm Payload 3 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\CheatHoursEatsArtTool.exe family_xworm behavioral1/memory/2416-20-0x0000000000400000-0x0000000000503000-memory.dmp family_xworm behavioral1/memory/2356-23-0x00000000013B0000-0x00000000013C8000-memory.dmp family_xworm -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
Client.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Windows\\Sub\\xdwdClient.exe" Client.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 1916 powershell.exe 1248 powershell.exe 1016 powershell.exe 1524 powershell.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Drops startup file 2 IoCs
Processes:
CheatHoursEatsArtTool.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows32.lnk CheatHoursEatsArtTool.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows32.lnk CheatHoursEatsArtTool.exe -
Executes dropped EXE 3 IoCs
Processes:
Nursultan Alpha — êîïèÿ.exeCheatHoursEatsArtTool.exeClient.exepid process 2092 Nursultan Alpha — êîïèÿ.exe 2356 CheatHoursEatsArtTool.exe 2916 Client.exe -
Loads dropped DLL 3 IoCs
Processes:
Solara.exepid process 2416 Solara.exe 2416 Solara.exe 2416 Solara.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
CheatHoursEatsArtTool.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows32 = "C:\\ProgramData\\Windows32.exe" CheatHoursEatsArtTool.exe -
Drops file in Windows directory 6 IoCs
Processes:
Client.exedescription ioc process File opened for modification C:\Windows\Sub\xdwdClient.exe Client.exe File opened for modification C:\Windows\Sub Client.exe File created C:\Windows\Sub\xdwdWatchDog.exe Client.exe File opened for modification C:\Windows\Sub\xdwdWatchDog.exe Client.exe File created C:\Windows\xdwd.dll Client.exe File created C:\Windows\Sub\xdwdClient.exe Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Solara.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 44 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2232 schtasks.exe 1212 schtasks.exe 2684 schtasks.exe 2412 schtasks.exe 296 schtasks.exe 2824 schtasks.exe 3060 schtasks.exe 2972 schtasks.exe 2636 schtasks.exe 2104 schtasks.exe 2684 schtasks.exe 1200 schtasks.exe 576 schtasks.exe 2016 schtasks.exe 2680 schtasks.exe 1412 schtasks.exe 2416 schtasks.exe 2324 schtasks.exe 2540 schtasks.exe 2992 schtasks.exe 1772 schtasks.exe 1528 schtasks.exe 1080 schtasks.exe 2784 schtasks.exe 2960 schtasks.exe 1496 schtasks.exe 2512 schtasks.exe 1604 schtasks.exe 876 schtasks.exe 1440 schtasks.exe 2312 schtasks.exe 1856 schtasks.exe 520 schtasks.exe 1772 schtasks.exe 2220 schtasks.exe 2148 schtasks.exe 2464 schtasks.exe 1688 schtasks.exe 2380 schtasks.exe 2272 schtasks.exe 1456 schtasks.exe 2096 schtasks.exe 1556 schtasks.exe 1028 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Nursultan Alpha — êîïèÿ.exepowershell.exepowershell.exepowershell.exepowershell.exeCheatHoursEatsArtTool.exeschtasks.exeClient.exeCMD.exeschtasks.exeCMD.exeschtasks.exeCMD.exeschtasks.exepid process 2092 Nursultan Alpha — êîïèÿ.exe 2092 Nursultan Alpha — êîïèÿ.exe 2092 Nursultan Alpha — êîïèÿ.exe 1916 powershell.exe 1248 powershell.exe 1016 powershell.exe 1524 powershell.exe 2356 CheatHoursEatsArtTool.exe 1456 schtasks.exe 2916 Client.exe 2916 Client.exe 612 CMD.exe 2220 schtasks.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2396 CMD.exe 2972 schtasks.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe 2052 CMD.exe 2096 schtasks.exe 2916 Client.exe 2916 Client.exe 2916 Client.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
Client.exeCheatHoursEatsArtTool.exeNursultan Alpha — êîïèÿ.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2916 Client.exe Token: SeDebugPrivilege 2356 CheatHoursEatsArtTool.exe Token: SeDebugPrivilege 2092 Nursultan Alpha — êîïèÿ.exe Token: SeDebugPrivilege 1916 powershell.exe Token: SeDebugPrivilege 1248 powershell.exe Token: SeDebugPrivilege 1016 powershell.exe Token: SeDebugPrivilege 1524 powershell.exe Token: SeDebugPrivilege 2356 CheatHoursEatsArtTool.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
CheatHoursEatsArtTool.exepid process 2356 CheatHoursEatsArtTool.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Solara.exeNursultan Alpha — êîïèÿ.exeCheatHoursEatsArtTool.exeClient.exeCMD.exeCMD.exeCMD.exeCMD.exeCMD.exeCMD.exedescription pid process target process PID 2416 wrote to memory of 2092 2416 Solara.exe Nursultan Alpha — êîïèÿ.exe PID 2416 wrote to memory of 2092 2416 Solara.exe Nursultan Alpha — êîïèÿ.exe PID 2416 wrote to memory of 2092 2416 Solara.exe Nursultan Alpha — êîïèÿ.exe PID 2416 wrote to memory of 2092 2416 Solara.exe Nursultan Alpha — êîïèÿ.exe PID 2416 wrote to memory of 2356 2416 Solara.exe CheatHoursEatsArtTool.exe PID 2416 wrote to memory of 2356 2416 Solara.exe CheatHoursEatsArtTool.exe PID 2416 wrote to memory of 2356 2416 Solara.exe CheatHoursEatsArtTool.exe PID 2416 wrote to memory of 2356 2416 Solara.exe CheatHoursEatsArtTool.exe PID 2416 wrote to memory of 2916 2416 Solara.exe Client.exe PID 2416 wrote to memory of 2916 2416 Solara.exe Client.exe PID 2416 wrote to memory of 2916 2416 Solara.exe Client.exe PID 2416 wrote to memory of 2916 2416 Solara.exe Client.exe PID 2092 wrote to memory of 2896 2092 Nursultan Alpha — êîïèÿ.exe WerFault.exe PID 2092 wrote to memory of 2896 2092 Nursultan Alpha — êîïèÿ.exe WerFault.exe PID 2092 wrote to memory of 2896 2092 Nursultan Alpha — êîïèÿ.exe WerFault.exe PID 2356 wrote to memory of 1916 2356 CheatHoursEatsArtTool.exe powershell.exe PID 2356 wrote to memory of 1916 2356 CheatHoursEatsArtTool.exe powershell.exe PID 2356 wrote to memory of 1916 2356 CheatHoursEatsArtTool.exe powershell.exe PID 2356 wrote to memory of 1248 2356 CheatHoursEatsArtTool.exe powershell.exe PID 2356 wrote to memory of 1248 2356 CheatHoursEatsArtTool.exe powershell.exe PID 2356 wrote to memory of 1248 2356 CheatHoursEatsArtTool.exe powershell.exe PID 2356 wrote to memory of 1016 2356 CheatHoursEatsArtTool.exe powershell.exe PID 2356 wrote to memory of 1016 2356 CheatHoursEatsArtTool.exe powershell.exe PID 2356 wrote to memory of 1016 2356 CheatHoursEatsArtTool.exe powershell.exe PID 2356 wrote to memory of 1524 2356 CheatHoursEatsArtTool.exe powershell.exe PID 2356 wrote to memory of 1524 2356 CheatHoursEatsArtTool.exe powershell.exe PID 2356 wrote to memory of 1524 2356 CheatHoursEatsArtTool.exe powershell.exe PID 2916 wrote to memory of 2464 2916 Client.exe CMD.exe PID 2916 wrote to memory of 2464 2916 Client.exe CMD.exe PID 2916 wrote to memory of 2464 2916 Client.exe CMD.exe PID 2464 wrote to memory of 2992 2464 CMD.exe schtasks.exe PID 2464 wrote to memory of 2992 2464 CMD.exe schtasks.exe PID 2464 wrote to memory of 2992 2464 CMD.exe schtasks.exe PID 2916 wrote to memory of 1268 2916 Client.exe CMD.exe PID 2916 wrote to memory of 1268 2916 Client.exe CMD.exe PID 2916 wrote to memory of 1268 2916 Client.exe CMD.exe PID 1268 wrote to memory of 2016 1268 CMD.exe schtasks.exe PID 1268 wrote to memory of 2016 1268 CMD.exe schtasks.exe PID 1268 wrote to memory of 2016 1268 CMD.exe schtasks.exe PID 2916 wrote to memory of 2000 2916 Client.exe CMD.exe PID 2916 wrote to memory of 2000 2916 Client.exe CMD.exe PID 2916 wrote to memory of 2000 2916 Client.exe CMD.exe PID 2000 wrote to memory of 1456 2000 CMD.exe schtasks.exe PID 2000 wrote to memory of 1456 2000 CMD.exe schtasks.exe PID 2000 wrote to memory of 1456 2000 CMD.exe schtasks.exe PID 2916 wrote to memory of 612 2916 Client.exe CMD.exe PID 2916 wrote to memory of 612 2916 Client.exe CMD.exe PID 2916 wrote to memory of 612 2916 Client.exe CMD.exe PID 612 wrote to memory of 2220 612 CMD.exe schtasks.exe PID 612 wrote to memory of 2220 612 CMD.exe schtasks.exe PID 612 wrote to memory of 2220 612 CMD.exe schtasks.exe PID 2916 wrote to memory of 2396 2916 Client.exe CMD.exe PID 2916 wrote to memory of 2396 2916 Client.exe CMD.exe PID 2916 wrote to memory of 2396 2916 Client.exe CMD.exe PID 2396 wrote to memory of 2972 2396 CMD.exe schtasks.exe PID 2396 wrote to memory of 2972 2396 CMD.exe schtasks.exe PID 2396 wrote to memory of 2972 2396 CMD.exe schtasks.exe PID 2916 wrote to memory of 2052 2916 Client.exe CMD.exe PID 2916 wrote to memory of 2052 2916 Client.exe CMD.exe PID 2916 wrote to memory of 2052 2916 Client.exe CMD.exe PID 2052 wrote to memory of 2096 2052 CMD.exe schtasks.exe PID 2052 wrote to memory of 2096 2052 CMD.exe schtasks.exe PID 2052 wrote to memory of 2096 2052 CMD.exe schtasks.exe PID 2916 wrote to memory of 2484 2916 Client.exe CMD.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Nursultan Alpha — êîïèÿ.exe"C:\Users\Admin\AppData\Local\Temp\Nursultan Alpha — êîïèÿ.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2092 -s 11963⤵PID:2896
-
-
-
C:\Users\Admin\AppData\Local\Temp\CheatHoursEatsArtTool.exe"C:\Users\Admin\AppData\Local\Temp\CheatHoursEatsArtTool.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\CheatHoursEatsArtTool.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'CheatHoursEatsArtTool.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Windows32.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows32.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\system32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "USER OOBE BROKER" /tr "C:\Windows\Sub\xdwdClient.exe" & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "USER OOBE BROKER" /tr "C:\Windows\Sub\xdwdClient.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2992
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2016
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows32" /tr "C:\Windows\Sub\xdwdWatchDog.exe" /RL HIGHEST & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo 5 /tn "Windows32" /tr "C:\Windows\Sub\xdwdWatchDog.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:2484
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2636
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:1972
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2512
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:1828
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:1604
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:1900
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2148
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:960
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2464
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:792
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:1688
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:1076
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:1772
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:1412
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:1556
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:2008
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2104
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:2832
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2684
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:1664
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:1200
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:2032
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2680
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:2200
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2232
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:1860
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:1528
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:1452
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:296
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:844
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2380
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:1556
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:1412
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:2408
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2824
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:2484
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:876
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:1612
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:1440
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:2844
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2312
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:2996
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:1212
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:1608
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:1856
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:2492
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:520
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:1112
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:1772
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:2144
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2960
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:2116
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2416
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:2648
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2684
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:828
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:1080
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:1612
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:1028
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:2308
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2784
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:2928
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2324
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:2188
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:3060
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:1568
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:1496
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:3028
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2272
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:2396
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:576
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:2080
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2412
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit3⤵PID:3052
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:2540
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
622KB
MD50c60ae033287897dee241499959d6f9b
SHA11aa25223f25e9bde0a7972e00de2e4156d9a2644
SHA256d89ffad749623a054365e9ed891a4518baa785b639e334e6064c7a2d510e5705
SHA512cf0e2e22a3126c37a78a0037508a89d5365c50959237a426ffe49b85077e15642fe9b51dc4b63efab9d2c7958d57da5dd6467b2c548a26321f12104ca71766f5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5ac8fdd27bb6babd9568bc51d67fdbbf4
SHA12f0190e06c1327d41bc8cffb9fbfc874a3f693cf
SHA256e3a801a259496324efb87ed55da15b8411df217072cc1b7a46c6e4e02305f133
SHA512a9020cf0da804cae0fb5a4548a8540b4dfcbf031f3acae2612986476d5bcce8d74d51ecd4cfa81850a31265c50f155e6f8d6ece3212c3fe3650b59330646f713
-
Filesize
136KB
MD516e5a492c9c6ae34c59683be9c51fa31
SHA197031b41f5c56f371c28ae0d62a2df7d585adaba
SHA25635c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66
SHA51220fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
68KB
MD5c7b96361f8ba66866dc0163b3e9c5b95
SHA1f3281a8ae74fe88a204c4ccc06b15f9aa8883b81
SHA25635c7b404d93b655e448ce97ea69022e79f2c61cda09810323405f7050b11f42a
SHA512d9f49b8a8d8e92e7c6b6cd291f0eb53d81a8708711609f3fd2efdae8e378b4356003c21081d980f34b4332c0e8a04bd38783d1ef966dd8232f386ab748aef404
-
Filesize
303KB
MD50411aedeb5cb378230fc4736877290ff
SHA1cbfd99434251f2aceb5e5a9f998a4a170878169a
SHA256abf52b82f58ff179a83ab0c0dd6762a5512a7d25c126fccb58f8b4628c661b10
SHA51271c671f4c043aca897b2041ce3709a59cbc2900096d5625081bb029f070f7129d309d8e38ee6cd11b7268e6fbf9a444ee600177ac72c962d849932d9234ff64e