Analysis
-
max time kernel
116s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 22:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/waxnet/NetWare
Resource
win10v2004-20240802-en
General
-
Target
https://github.com/waxnet/NetWare
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 32 camo.githubusercontent.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\.cs OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\힟耀 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\힟耀\ = "cs_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\cs_auto_file\shell\Read OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\cs_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\cs_auto_file OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\.cs\ = "cs_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\cs_auto_file\shell\Read\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\cs_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe\" \"%1\"" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1744 msedge.exe 1744 msedge.exe 2864 msedge.exe 2864 msedge.exe 1636 identity_helper.exe 1636 identity_helper.exe 4904 msedge.exe 4904 msedge.exe 3596 mspaint.exe 3596 mspaint.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2024 OpenWith.exe 1948 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe -
Suspicious use of SetWindowsHookEx 42 IoCs
pid Process 2024 OpenWith.exe 2024 OpenWith.exe 2024 OpenWith.exe 2024 OpenWith.exe 2024 OpenWith.exe 2024 OpenWith.exe 2024 OpenWith.exe 2024 OpenWith.exe 2024 OpenWith.exe 2024 OpenWith.exe 2024 OpenWith.exe 2024 OpenWith.exe 2024 OpenWith.exe 2024 OpenWith.exe 2024 OpenWith.exe 700 AcroRd32.exe 700 AcroRd32.exe 700 AcroRd32.exe 700 AcroRd32.exe 1948 OpenWith.exe 1948 OpenWith.exe 1948 OpenWith.exe 1948 OpenWith.exe 1948 OpenWith.exe 1948 OpenWith.exe 1948 OpenWith.exe 1948 OpenWith.exe 1948 OpenWith.exe 1948 OpenWith.exe 1948 OpenWith.exe 1948 OpenWith.exe 1948 OpenWith.exe 1948 OpenWith.exe 1948 OpenWith.exe 3700 AcroRd32.exe 3700 AcroRd32.exe 3700 AcroRd32.exe 3700 AcroRd32.exe 3596 mspaint.exe 3596 mspaint.exe 3596 mspaint.exe 3596 mspaint.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2864 wrote to memory of 4184 2864 msedge.exe 84 PID 2864 wrote to memory of 4184 2864 msedge.exe 84 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 2384 2864 msedge.exe 85 PID 2864 wrote to memory of 1744 2864 msedge.exe 86 PID 2864 wrote to memory of 1744 2864 msedge.exe 86 PID 2864 wrote to memory of 4628 2864 msedge.exe 87 PID 2864 wrote to memory of 4628 2864 msedge.exe 87 PID 2864 wrote to memory of 4628 2864 msedge.exe 87 PID 2864 wrote to memory of 4628 2864 msedge.exe 87 PID 2864 wrote to memory of 4628 2864 msedge.exe 87 PID 2864 wrote to memory of 4628 2864 msedge.exe 87 PID 2864 wrote to memory of 4628 2864 msedge.exe 87 PID 2864 wrote to memory of 4628 2864 msedge.exe 87 PID 2864 wrote to memory of 4628 2864 msedge.exe 87 PID 2864 wrote to memory of 4628 2864 msedge.exe 87 PID 2864 wrote to memory of 4628 2864 msedge.exe 87 PID 2864 wrote to memory of 4628 2864 msedge.exe 87 PID 2864 wrote to memory of 4628 2864 msedge.exe 87 PID 2864 wrote to memory of 4628 2864 msedge.exe 87 PID 2864 wrote to memory of 4628 2864 msedge.exe 87 PID 2864 wrote to memory of 4628 2864 msedge.exe 87 PID 2864 wrote to memory of 4628 2864 msedge.exe 87 PID 2864 wrote to memory of 4628 2864 msedge.exe 87 PID 2864 wrote to memory of 4628 2864 msedge.exe 87 PID 2864 wrote to memory of 4628 2864 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/waxnet/NetWare1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa4b2446f8,0x7ffa4b244708,0x7ffa4b2447182⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,7936493087961906501,12879891987932913986,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,7936493087961906501,12879891987932913986,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,7936493087961906501,12879891987932913986,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7936493087961906501,12879891987932913986,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7936493087961906501,12879891987932913986,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,7936493087961906501,12879891987932913986,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4160 /prefetch:82⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,7936493087961906501,12879891987932913986,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,7936493087961906501,12879891987932913986,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5344 /prefetch:82⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7936493087961906501,12879891987932913986,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,7936493087961906501,12879891987932913986,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7936493087961906501,12879891987932913986,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7936493087961906501,12879891987932913986,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3828 /prefetch:12⤵PID:1772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:872
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2092
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2024 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\NetWare-main\NetWare-main\loader\Libraries\SharpMonoInjector\Injector.cs"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:700 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6284338E45588599EAE2B315F610FA51 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:3776
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7F93A6673AEA764B86C8C3C418C9219F --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7F93A6673AEA764B86C8C3C418C9219F --renderer-client-id=2 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:1864
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8C0BB4D451BB00E5BE96EABB279A68A0 --mojo-platform-channel-handle=2320 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4856
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1616
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1948
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\NetWare-main\NetWare-main\loader\Program.cs"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3700 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- System Location Discovery: System Language Discovery
PID:4572 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E3ACF28ABD9FB1FA91DFBA7103757832 --mojo-platform-channel-handle=1724 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:4688
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C4C009EDA2F6187FE5BA4EAD4C5521FC --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C4C009EDA2F6187FE5BA4EAD4C5521FC --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:1832
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FA2E9F973D71CE5C98EA5A938287134A --mojo-platform-channel-handle=2328 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:968
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F50C3DA5A34F88099E6B1BB54DA7666E --mojo-platform-channel-handle=2516 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:3320
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D54823B8EEC861AAC4AD6B0A05A33CDD --mojo-platform-channel-handle=1704 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:1564
-
-
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\NetWare-main\NetWare-main\loader\Assets\icon.ico"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3596
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5e62042348fc45bc723e8c7cd4b897107
SHA1066f6eedf9dc766c7c4370d79cea07745813ee24
SHA2562f7ce483c2f28b9985f369e4fe285227a775d5703fc1b7a67b9b15b80384d80a
SHA512f9103c12ad312b565bd5890008639476c85be46d50fe57fc264b8e41383dc417129a714dc4d4ed453557c4e09a7a6efb72adc8785f768b38b9c6766b01bc0428
-
Filesize
128KB
MD5735667f88c4637da5629972516f1d562
SHA1971e5ab835739b6452f7d12568bfb62735782e31
SHA2563b80f53c9a6968db72a4e4b17d653dbfa11515327c036759b3b4440a98cc40f8
SHA51279a7aec59f29257156b73ca0ac63957ab8d7264631f5c6056f74dc943f7654ac222fe4465d3b6e2370d7d4575684e52364532c9180fd985ae9292db4f32f4207
-
Filesize
149KB
MD5f62edd5887c482511420e8dad3449aae
SHA10ede20f2673120cd3c123421a5b1b8b4ac9d7048
SHA25606e8a904b64f6a6a791c3fa8082118b1075ff318e0eb289652f2690eeb57d398
SHA51283218075529a5643a75234e9c4ed87b7228c025dbef5ce30a15c4f04d077185b9d575a8c726309c8c4fc00450413a6a78c048042c812ed6fd5cc02b76e94351d
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\46f66eb9-0c1a-4217-9bf8-f6ce4c4bb858.tmp
Filesize5KB
MD59249160ac92a529b1fea058294c9f22d
SHA1c5eb296ef71a6899096a179e25507ca6c57faf45
SHA256b6d07470b2069de24b1de23f83cdf49ce6bf0c522754294b4a84d9f29b08093a
SHA5120e93bf814a2236f4cd41a8854e90540855d443ada82daaceee123cf4ea04e1b177bdce044b392062489be0c17b9655ba48572ab8831376710ace7c5930a39fe2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD56e348b353249c0c27e35bf568332d35b
SHA160f22425a148899b23f80182c11684cde49e73ab
SHA256b99aaf6aa05f323ad5e672b835a05d88d3e275f0dd11967f89b1c22eafdffba2
SHA5123123394f95968b69fbcfacfacbad451e80e7b970eaa96eb491f49045c759f3ade141c653c979eaca702ca8899b124b9e2f51d368e602854b53d1dacffd486ac2
-
Filesize
573B
MD5a6d346f58cbec0a6e4015327b25f1537
SHA1750056e65a8b1c20b1a6051f5adcdf35821a6ac1
SHA2561a715b1b5b62ef83ca8c62a18eddb3b5b6b738be2c654ab7a38cf22fdc8bea56
SHA51274e563217a28cd6427739731f51ba2e35ee060c8ae6959d458d06a0416e17ffc6a49f8d0bbcb8d17cef144a45c36eb9f3b92305389ab0cfc5043f530d9f28d89
-
Filesize
6KB
MD5dc4b5a7641a61d8c075aa57c12c6e0a9
SHA17d4f83abc3a3fe142cd2f8dcc9712737e4940124
SHA2568c20f34f3731ea5b1a319ea8b942f4f5715ae214c41fe03550bd76dd5ca77dca
SHA512baf283c579caefe4db18d27201eae463ebe8d31a2bbe7a903953480a7a9092a0cd5bc50b084de6f0c59b728920f321ebc3a4b4e128058f6b76acef06e5c56607
-
Filesize
1KB
MD5f242ff54f02bec7c5166edf55215b2fe
SHA12ac4188be04ade5be9066c8c1964985b40774c10
SHA256915725c2f24fd29f524798b10ca4aa3a1d2a46157b6fe4e355fff13a7cc6eb5c
SHA5123907fc4ebf502a28335296cd038df2c8c4a844982ff442c85b12a4608e7316b8dbb85d3766efbc41cbd9f38733ec6242ad9457638fa2f555ab7a468e55370655
-
Filesize
1KB
MD5ae6ce4108a0922eb99abb1e83b6c4741
SHA1bfcdc6304d69838ba7712d172101fa1dd56fa5de
SHA2560d1994a7f34daa512cddfaf12994d6d2755bc30f2b06c49e5c1a5e2f23ae6487
SHA5123a9d5ce6ae71f3678f71f332aab87151b9a9c567954bb3792c3acf39d649592bdb8ce9882b9913c68839349e650dfb50869012f5ea567cedc9192bfe2749b8f1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55e2e31f481a62a18454bddfad7b7d83e
SHA138b4685b161e78a37d520036f26ee282e8e8067f
SHA256c6a8bf2fefbabca7b59f8e5c978d97c64bdbbe8accffe9a8153cface5859190d
SHA5125ada9193f4bc4649f66de4eed283dc3901f051932cf3250b53e9abdbe245433763bb4c6bdd344c629e8d7cba4ee5780f80e8533af48c3ada1bde1dc2aeb9dd8a
-
Filesize
10KB
MD5672f417a4659744c012a563ab31a47ec
SHA1b4f8fd80b88d1059bb4cd20623926db44a9cd18b
SHA256d7c390e3a4fe47c562966ab66040cc43f2792bea27c1c5981fddbed98ef0e26e
SHA512d835a8468af465a2f7ec0193ac3067e14ddf1a92cfa919f858675e231fbf6f1aae4ba407436071391af4b870fe6516eb46e8fcdd82245ad81283b7145240969b
-
Filesize
10KB
MD5613b0a8b6520beda659dcff20a9ffa86
SHA1ede22d98326c7ccd714c0bbf9afaecf3a5bf71ef
SHA2561d6838f0c9a3b76875042e8f496a86e2998dd95d3fe3ed95b225f6e2ae412ddf
SHA512cfe2911a3968d3228c16e8f448c0f370a7f42996728ea0822ae9ce585ec9cad2a1f38e2a7a28e220d20e4b5fbbf0a60bb4a5db1e93e119c1d25d0eed0426d4d4
-
Filesize
23KB
MD50e8439b31700a13fd428c9d3e37021bf
SHA13200352c490d0d4997ba7a34f7eb3099fb571c2f
SHA25682e80a1818a6959cfd9c6046d9f1a8b089503bcc5ef7e2e38afea3fb59c52867
SHA512e19ea3b0fe76da7e6d11a8d7a8805590aa9ae7d069994a8dacc9ee2c52bb9beb80fd31d272b2a7d47a74cb2b16e02a3d2f7ac4e6eb00257965b70757639861cc
-
Filesize
381KB
MD5560dca688a71f706a505c59738d1a171
SHA10c1692255dd2bb4ce89ac36ade729b94f0c5faa6
SHA25697cbf19c20d7168406b86a94417086ab6ca98b1af494270f02c9364b62b7a728
SHA512045e80c6072bca2a6afea1c50f513a00b240cd7ef46ee75ad7d68dfe94e20baa5615084dbc1b4dddc6611acf202a5a6ad926008fd14218e6e22faf53c4c92bfe