Analysis
-
max time kernel
30s -
max time network
31s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-09-2024 09:18
Static task
static1
Behavioral task
behavioral1
Sample
neverlose crack.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
neverlose crack.exe
Resource
win7-20240705-en
Behavioral task
behavioral3
Sample
neverlose crack.exe
Resource
win10-20240404-en
General
-
Target
neverlose crack.exe
-
Size
295KB
-
MD5
01cc2b2bcef2f12ab9a10905f999027d
-
SHA1
c62bb9b1532dc3f8638cc1ab5eb3b5f5185c2b40
-
SHA256
d51154dab49e7c3199cb9fd75aa5c7f9eb58ed74c8ea5eb40601ee484dc0b578
-
SHA512
025af3ae3fa059e364ef933cff47327436f08fb18379377caf7e71ced86f2c8adb4f56a79a643f3072c21b06e9e9b97f5945b9bdff1d29e798c6d9a5c3360d5c
-
SSDEEP
6144:DVOuy8Et9vsiTzIpoOhYyC8M4i7jyVvdOe4BWH5Y5/zu4cCGb19e:bFigGOTCz17jy9Yer6dzIpi
Malware Config
Extracted
asyncrat
Victim
127.0.0.1:1504
127.0.0.1:44256
meeting-compound.gl.at.ply.gg:1504
meeting-compound.gl.at.ply.gg:44256
-
delay
1
-
install
true
-
install_file
System.exe
-
install_folder
%AppData%
Extracted
xworm
meeting-compound.gl.at.ply.gg:44256
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
umbral
https://discord.com/api/webhooks/1273828074898718851/qR9eE6omxJxFL_jVry1J18IsVQ6bHhsk5rGr5VLxyO-92VJHyGPK43BBNMWtaUG56gE2
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
Victim
meeting-compound.gl.at.ply.gg:1504
f8ff2d3def0ea5927a14148fb1c0ef4a
-
reg_key
f8ff2d3def0ea5927a14148fb1c0ef4a
-
splitter
Y262SUCZ4UJJ
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral5/memory/2716-48-0x000001D3AF870000-0x000001D3AF8B0000-memory.dmp family_umbral behavioral5/files/0x000200000002ab53-47.dat family_umbral -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral5/files/0x000400000002ab02-4.dat family_xworm behavioral5/memory/1312-40-0x00000000007C0000-0x00000000007D6000-memory.dmp family_xworm -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Async RAT payload 1 IoCs
resource yara_rule behavioral5/files/0x000600000002ab4a-16.dat family_asyncrat -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3192 powershell.exe 4620 powershell.exe 3688 powershell.exe 4056 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts Umbral.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4700 attrib.exe 3176 attrib.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WizClient.lnk WizClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WizClient.lnk WizClient.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f8ff2d3def0ea5927a14148fb1c0ef4a.exe dllhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f8ff2d3def0ea5927a14148fb1c0ef4a.exe dllhost.exe -
Executes dropped EXE 8 IoCs
pid Process 1312 WizClient.exe 1044 INSTALLER1.exe 2716 Umbral.exe 4192 WmZWbh4b.exe 4104 Payload.exe 1552 System.exe 72 dllhost.exe 4672 $77svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Users\\Admin\\Exec\\$77svchost.exe\"" WmZWbh4b.exe Set value (str) \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000\Software\Microsoft\Windows\CurrentVersion\Run\WizClient = "C:\\Users\\Admin\\AppData\\Roaming\\WizClient.exe" WizClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000\Software\Microsoft\Windows\CurrentVersion\Run\f8ff2d3def0ea5927a14148fb1c0ef4a = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\dllhost.exe\" .." dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\f8ff2d3def0ea5927a14148fb1c0ef4a = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\dllhost.exe\" .." dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 discord.com 1 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neverlose crack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4812 cmd.exe 4164 PING.EXE -
Delays execution with timeout.exe 2 IoCs
pid Process 924 timeout.exe 960 timeout.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2728 wmic.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2136 reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4164 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1780 schtasks.exe 876 schtasks.exe 1092 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2716 Umbral.exe 3192 powershell.exe 3192 powershell.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 4620 powershell.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 4620 powershell.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 1044 INSTALLER1.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 1564 powershell.exe 1564 powershell.exe 1564 powershell.exe 4192 WmZWbh4b.exe 4192 WmZWbh4b.exe 4192 WmZWbh4b.exe 4192 WmZWbh4b.exe 4192 WmZWbh4b.exe 4192 WmZWbh4b.exe 4192 WmZWbh4b.exe 4192 WmZWbh4b.exe 4192 WmZWbh4b.exe 4192 WmZWbh4b.exe 4192 WmZWbh4b.exe 4192 WmZWbh4b.exe 4192 WmZWbh4b.exe 4192 WmZWbh4b.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1312 WizClient.exe Token: SeDebugPrivilege 2716 Umbral.exe Token: SeIncreaseQuotaPrivilege 3604 wmic.exe Token: SeSecurityPrivilege 3604 wmic.exe Token: SeTakeOwnershipPrivilege 3604 wmic.exe Token: SeLoadDriverPrivilege 3604 wmic.exe Token: SeSystemProfilePrivilege 3604 wmic.exe Token: SeSystemtimePrivilege 3604 wmic.exe Token: SeProfSingleProcessPrivilege 3604 wmic.exe Token: SeIncBasePriorityPrivilege 3604 wmic.exe Token: SeCreatePagefilePrivilege 3604 wmic.exe Token: SeBackupPrivilege 3604 wmic.exe Token: SeRestorePrivilege 3604 wmic.exe Token: SeShutdownPrivilege 3604 wmic.exe Token: SeDebugPrivilege 3604 wmic.exe Token: SeSystemEnvironmentPrivilege 3604 wmic.exe Token: SeRemoteShutdownPrivilege 3604 wmic.exe Token: SeUndockPrivilege 3604 wmic.exe Token: SeManageVolumePrivilege 3604 wmic.exe Token: 33 3604 wmic.exe Token: 34 3604 wmic.exe Token: 35 3604 wmic.exe Token: 36 3604 wmic.exe Token: SeIncreaseQuotaPrivilege 3604 wmic.exe Token: SeSecurityPrivilege 3604 wmic.exe Token: SeTakeOwnershipPrivilege 3604 wmic.exe Token: SeLoadDriverPrivilege 3604 wmic.exe Token: SeSystemProfilePrivilege 3604 wmic.exe Token: SeSystemtimePrivilege 3604 wmic.exe Token: SeProfSingleProcessPrivilege 3604 wmic.exe Token: SeIncBasePriorityPrivilege 3604 wmic.exe Token: SeCreatePagefilePrivilege 3604 wmic.exe Token: SeBackupPrivilege 3604 wmic.exe Token: SeRestorePrivilege 3604 wmic.exe Token: SeShutdownPrivilege 3604 wmic.exe Token: SeDebugPrivilege 3604 wmic.exe Token: SeSystemEnvironmentPrivilege 3604 wmic.exe Token: SeRemoteShutdownPrivilege 3604 wmic.exe Token: SeUndockPrivilege 3604 wmic.exe Token: SeManageVolumePrivilege 3604 wmic.exe Token: 33 3604 wmic.exe Token: 34 3604 wmic.exe Token: 35 3604 wmic.exe Token: 36 3604 wmic.exe Token: SeDebugPrivilege 3192 powershell.exe Token: SeDebugPrivilege 1044 INSTALLER1.exe Token: SeDebugPrivilege 1044 INSTALLER1.exe Token: SeDebugPrivilege 4620 powershell.exe Token: SeDebugPrivilege 3688 powershell.exe Token: SeDebugPrivilege 1564 powershell.exe Token: SeBackupPrivilege 884 vssvc.exe Token: SeRestorePrivilege 884 vssvc.exe Token: SeAuditPrivilege 884 vssvc.exe Token: SeIncreaseQuotaPrivilege 2500 wmic.exe Token: SeSecurityPrivilege 2500 wmic.exe Token: SeTakeOwnershipPrivilege 2500 wmic.exe Token: SeLoadDriverPrivilege 2500 wmic.exe Token: SeSystemProfilePrivilege 2500 wmic.exe Token: SeSystemtimePrivilege 2500 wmic.exe Token: SeProfSingleProcessPrivilege 2500 wmic.exe Token: SeIncBasePriorityPrivilege 2500 wmic.exe Token: SeCreatePagefilePrivilege 2500 wmic.exe Token: SeBackupPrivilege 2500 wmic.exe Token: SeRestorePrivilege 2500 wmic.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1312 WizClient.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3700 wrote to memory of 1312 3700 neverlose crack.exe 82 PID 3700 wrote to memory of 1312 3700 neverlose crack.exe 82 PID 3700 wrote to memory of 1044 3700 neverlose crack.exe 83 PID 3700 wrote to memory of 1044 3700 neverlose crack.exe 83 PID 3700 wrote to memory of 2716 3700 neverlose crack.exe 84 PID 3700 wrote to memory of 2716 3700 neverlose crack.exe 84 PID 3700 wrote to memory of 4192 3700 neverlose crack.exe 85 PID 3700 wrote to memory of 4192 3700 neverlose crack.exe 85 PID 3700 wrote to memory of 4104 3700 neverlose crack.exe 86 PID 3700 wrote to memory of 4104 3700 neverlose crack.exe 86 PID 3700 wrote to memory of 4104 3700 neverlose crack.exe 86 PID 2716 wrote to memory of 3604 2716 Umbral.exe 87 PID 2716 wrote to memory of 3604 2716 Umbral.exe 87 PID 2716 wrote to memory of 432 2716 Umbral.exe 90 PID 2716 wrote to memory of 432 2716 Umbral.exe 90 PID 2716 wrote to memory of 3192 2716 Umbral.exe 92 PID 2716 wrote to memory of 3192 2716 Umbral.exe 92 PID 2716 wrote to memory of 4620 2716 Umbral.exe 94 PID 2716 wrote to memory of 4620 2716 Umbral.exe 94 PID 2716 wrote to memory of 3688 2716 Umbral.exe 96 PID 2716 wrote to memory of 3688 2716 Umbral.exe 96 PID 1044 wrote to memory of 2676 1044 INSTALLER1.exe 98 PID 1044 wrote to memory of 2676 1044 INSTALLER1.exe 98 PID 1044 wrote to memory of 2916 1044 INSTALLER1.exe 99 PID 1044 wrote to memory of 2916 1044 INSTALLER1.exe 99 PID 2916 wrote to memory of 924 2916 cmd.exe 102 PID 2916 wrote to memory of 924 2916 cmd.exe 102 PID 2676 wrote to memory of 1092 2676 cmd.exe 103 PID 2676 wrote to memory of 1092 2676 cmd.exe 103 PID 2716 wrote to memory of 1564 2716 Umbral.exe 104 PID 2716 wrote to memory of 1564 2716 Umbral.exe 104 PID 1312 wrote to memory of 1780 1312 WizClient.exe 106 PID 1312 wrote to memory of 1780 1312 WizClient.exe 106 PID 2716 wrote to memory of 2500 2716 Umbral.exe 110 PID 2716 wrote to memory of 2500 2716 Umbral.exe 110 PID 2716 wrote to memory of 848 2716 Umbral.exe 113 PID 2716 wrote to memory of 848 2716 Umbral.exe 113 PID 2716 wrote to memory of 1012 2716 Umbral.exe 115 PID 2716 wrote to memory of 1012 2716 Umbral.exe 115 PID 2716 wrote to memory of 4056 2716 Umbral.exe 117 PID 2716 wrote to memory of 4056 2716 Umbral.exe 117 PID 2716 wrote to memory of 2728 2716 Umbral.exe 119 PID 2716 wrote to memory of 2728 2716 Umbral.exe 119 PID 4192 wrote to memory of 4700 4192 WmZWbh4b.exe 121 PID 4192 wrote to memory of 4700 4192 WmZWbh4b.exe 121 PID 4192 wrote to memory of 3176 4192 WmZWbh4b.exe 123 PID 4192 wrote to memory of 3176 4192 WmZWbh4b.exe 123 PID 2716 wrote to memory of 4812 2716 Umbral.exe 125 PID 2716 wrote to memory of 4812 2716 Umbral.exe 125 PID 4812 wrote to memory of 4164 4812 cmd.exe 127 PID 4812 wrote to memory of 4164 4812 cmd.exe 127 PID 2916 wrote to memory of 1552 2916 cmd.exe 128 PID 2916 wrote to memory of 1552 2916 cmd.exe 128 PID 4104 wrote to memory of 72 4104 Payload.exe 129 PID 4104 wrote to memory of 72 4104 Payload.exe 129 PID 4104 wrote to memory of 72 4104 Payload.exe 129 PID 72 wrote to memory of 296 72 dllhost.exe 130 PID 72 wrote to memory of 296 72 dllhost.exe 130 PID 72 wrote to memory of 296 72 dllhost.exe 130 PID 72 wrote to memory of 2240 72 dllhost.exe 132 PID 72 wrote to memory of 2240 72 dllhost.exe 132 PID 72 wrote to memory of 2240 72 dllhost.exe 132 PID 72 wrote to memory of 876 72 dllhost.exe 134 PID 72 wrote to memory of 876 72 dllhost.exe 134 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 432 attrib.exe 4700 attrib.exe 3176 attrib.exe 296 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\neverlose crack.exe"C:\Users\Admin\AppData\Local\Temp\neverlose crack.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\WizClient.exe"C:\Users\Admin\AppData\Local\Temp\WizClient.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "WizClient" /tr "C:\Users\Admin\AppData\Roaming\WizClient.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1780
-
-
-
C:\Users\Admin\AppData\Local\Temp\INSTALLER1.exe"C:\Users\Admin\AppData\Local\Temp\INSTALLER1.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "System" /tr '"C:\Users\Admin\AppData\Roaming\System.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "System" /tr '"C:\Users\Admin\AppData\Roaming\System.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:1092
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA345.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:924
-
-
C:\Users\Admin\AppData\Roaming\System.exe"C:\Users\Admin\AppData\Roaming\System.exe"4⤵
- Executes dropped EXE
PID:1552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Umbral.exe"C:\Users\Admin\AppData\Local\Temp\Umbral.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
C:\Windows\SYSTEM32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"3⤵
- Views/modifies file attributes
PID:432
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Umbral.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3192
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵PID:848
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:1012
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Command and Scripting Interpreter: PowerShell
PID:4056
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:2728
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Umbral.exe" && pause3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\system32\PING.EXEping localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4164
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\WmZWbh4b.exe"C:\Users\Admin\AppData\Local\Temp\WmZWbh4b.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\Exec"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4700
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\Exec\$77svchost.exe"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3176
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpFB09.tmp.bat""3⤵PID:1044
-
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:960
-
-
C:\Users\Admin\Exec\$77svchost.exe"C:\Users\Admin\Exec\$77svchost.exe"4⤵
- Executes dropped EXE
PID:4672
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\dllhost.exe"C:\Users\Admin\AppData\Local\Temp\dllhost.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:72 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\dllhost.exe"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:296
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn CleanSweepCheck /f4⤵
- System Location Discovery: System Language Discovery
PID:2240
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn CleanSweepCheck /tr C:\Users\Admin\AppData\Local\Temp\dllhost.exe4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:876
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- System Location Discovery: System Language Discovery
PID:872 -
C:\Windows\SysWOW64\reg.exereg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2136
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:884
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
948B
MD56bddc96a32b9ed8fc70b141ccf4a39b2
SHA10f33c0699da40a5eadcec646791cf21cdb0dd7c6
SHA256cb3853abe77eb0da8a1caccb49e97a573b6f35570722eb759116a645d724c132
SHA512e41f1597b4129b759e4199db195df1c24e47cc47dc9850fab2d48e44bc3d37dc3658fbfbb62332a0b93c552587d7fab09de1634f605faa2209b8470c2a6eaca6
-
Filesize
1KB
MD557083a8e45ebe4fd84c7c0f137ec3e21
SHA1857b5ea57f7bcf03cadee122106c6e58792a9b84
SHA256f20102c4dc409cad3cdaf7a330c3a18a730a9d7d902b9fbee2a84186cba93d40
SHA5124bbc21c07c05ee1f783242f0fb59324d5ff9ae18bdf892f02980d582fed83380888eeba58e1a6a321507cfd5d4fe82a328a0d3482b29633be4e3ebbeac636f87
-
Filesize
1KB
MD538ecc5b95c11e5a77558753102979c51
SHA1c0759b08ef377df9979d8835d8a7e464cd8eaf6b
SHA2562eb69abe0af5a2fb5bb313533cef641e25016876b874353f7d737c7ad672c79e
SHA5129bf4ce3bc097bdd0242bd105c936a9c9403d5ac83ec99e6a310591a7b8d26309485f3e0cdc4cba67c322f834c325a2b63a008adb078f3a3307094c4b68a48686
-
Filesize
944B
MD51a9fa92a4f2e2ec9e244d43a6a4f8fb9
SHA19910190edfaccece1dfcc1d92e357772f5dae8f7
SHA2560ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888
SHA5125d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64
-
Filesize
63KB
MD56c575ec28ef4f6108f2acf9775938100
SHA1c3b5d9f59b53768817d3c6dd93a49cef5a40a9e2
SHA256609d9f9c8da8f777e17ff1a716c07e39e3b2d7fd76086436cf2e2383fe8bcd8c
SHA512950f48b90492b7f0ac702c2cfd8822eab510819024fbcba2407217280e9d069c39aeae27f4bd6e6ce37efc9de52fad52ad15a07b8ce43c58f43bb5926278ddd5
-
Filesize
54KB
MD529527eb6dd3c1e2b8dbc17d70ad1fb20
SHA18fafd2e9914b32797c957f58a1254afc7dccf5af
SHA256dafc09f9798d4c1134845b08749c514a3478ed4a45837e12fd717012ec27c694
SHA51252e315cd12482d8a147e5d810e7fbb116cc15b4163e3015f5d579b0621980a15195a4354528bce24a3aff1e47766d95dea71f09563da8e43c781020006bb0e00
-
Filesize
229KB
MD562099472f40d33f1caf73e36e866b9e7
SHA19d1e27b780ba14d0e41d366d79b0f42d4a782e7e
SHA256f343ca46350a3c48f888be39bf1247fcab2bcd731889fc16828aac5f681edebc
SHA5123356bd93afdff76dfc995b8bba3fc96d772e371c3ae6f289cbdb58cffef4906a5f8c2755152765c8cc96b5fc61e97186e42eceaa5e8619d15e172441c95f9764
-
Filesize
61KB
MD5d63d40b2af636f58cfbabe878e42f0a7
SHA13f97fb34eceff4e64cd3adb6f5cb4f1fabaf06ed
SHA256536699ce7a068f324c719b4f429bf0aefb82602fcc18ca4d99d76aa53fbdb19a
SHA512e8d771744ad9b2fc85b6f7c655f0e24bd0e42fa4a6575ed4e3301c325750c6e52dbc0b8565b30adf1303986d026d9a4d6a936a9093be8707a8ddbac7933242b4
-
Filesize
40KB
MD547f267290124f530b9c04563b533db83
SHA1fccb81909c612554fce4303daeffc750a71ee44e
SHA256479db498a032418957c1616b13187402d7f626afa32dd4fcf56313d78ec23eeb
SHA512a81b1ca99fec7a536eabc62f57668e46b832e534ccba43f3ab25a9d33d394745d24bad5f72225244f20be5ddcb44529d72efa31b92bc9e03f34e3b9ddb4f9e3a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
150B
MD5a7288abf9b20c1862d3113f70b8c02fd
SHA18dce22a3bfc1ef6837a983ca3241782c90ddc673
SHA256721542429a4ec6889c7b9e650ac7b40e745308f74738d828edc3bd14741b65b2
SHA512ab7955d80fd5a67ba2fd377d2692b3a48c663494674f77ec263d774a232c86eda020cbb7e5dd9fbcafcf4bcc92078f22537803a2bccf5522e6e7a2bc65d3ac7f
-
Filesize
143B
MD50ebf5006907faa4e0081f3d70fb27e85
SHA1ee790e8339d8239715e54de68c07a941f9831d49
SHA256d473cb09afce6d879e91048776031f610b19f4273fceadac2b175ee6afc04d63
SHA5122c66529959d63f126a2e0f2838319691a7634650a575f9179b1659fcf4397c06b7d0fef2523e9593be959c278cab76c7514ceeeb9be5c39219400474fc3e829d