Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 13:30
Static task
static1
Behavioral task
behavioral1
Sample
ed96deb2efe2997cc93edd758ef59a00N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed96deb2efe2997cc93edd758ef59a00N.exe
Resource
win10v2004-20240802-en
General
-
Target
ed96deb2efe2997cc93edd758ef59a00N.exe
-
Size
411KB
-
MD5
ed96deb2efe2997cc93edd758ef59a00
-
SHA1
29f5e5f308841e1195ac771af9cbd3257ed65062
-
SHA256
150e3d4357346ca552b55feb1cc2a1a3bccf900a843755bb24eb2e312182bca9
-
SHA512
73b66ca0e6c5a7bb8be02a9968cfd9f6d07e97e2ce8dafc0d1a8a91828acaed5328a11dd5d24678735255139d6711b0d069a43f20b34bfbd2f7f197401aeb168
-
SSDEEP
6144:93uBhcMltKAu2znCXPHfTEAy8gjTs5DWgxsryq:QBy8KYCfHfTEAy/MWgxIy
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
185.252.232.158:7812
64.23.232.116:7812
vsvf
-
delay
1
-
install
true
-
install_file
Windows Security Health Service.exe
-
install_folder
%AppData%
Extracted
xworm
5.0
185.252.232.158:7812
b0c5WZixE6SqaTDD
-
Install_directory
%AppData%
-
install_file
Windows Defender Security Service.exe
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7308504158:AAGvjg5ZWkkItSzfmQZs_qu73xKZ_gWVkJI/sendMessage?chat_id=6291749148
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000700000002347a-26.dat family_xworm behavioral2/memory/2232-44-0x0000000000E10000-0x0000000000E20000-memory.dmp family_xworm -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023479-16.dat family_stormkitty behavioral2/memory/3760-51-0x0000000000080000-0x00000000000B0000-memory.dmp family_stormkitty -
resource yara_rule behavioral2/files/0x000700000002347b-38.dat VenomRAT behavioral2/memory/3948-48-0x0000000000EB0000-0x0000000000EC8000-memory.dmp VenomRAT -
Async RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023479-16.dat family_asyncrat behavioral2/files/0x000700000002347b-38.dat family_asyncrat -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation ed96deb2efe2997cc93edd758ef59a00N.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation Cracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation Windows Defender Security Service.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender Security Service.lnk Windows Defender Security Service.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender Security Service.lnk Windows Defender Security Service.exe -
Executes dropped EXE 7 IoCs
pid Process 3380 crack.exe 3760 Windows Security Service.exe 2232 Windows Defender Security Service.exe 3948 Cracked.exe 2188 Windows Security Health Service.exe 4512 Windows Defender Security Service.exe 372 Windows Defender Security Service.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender Security Service = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Defender Security Service.exe" Windows Defender Security Service.exe -
Drops desktop.ini file(s) 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\0993adca3a05158d4947d12883e78d74\Admin@HVDPCYGS_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini Windows Security Service.exe File created C:\Users\Admin\AppData\Local\0993adca3a05158d4947d12883e78d74\Admin@HVDPCYGS_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini Windows Security Service.exe File created C:\Users\Admin\AppData\Local\0993adca3a05158d4947d12883e78d74\Admin@HVDPCYGS_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini Windows Security Service.exe File created C:\Users\Admin\AppData\Local\0993adca3a05158d4947d12883e78d74\Admin@HVDPCYGS_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini Windows Security Service.exe File opened for modification C:\Users\Admin\AppData\Local\0993adca3a05158d4947d12883e78d74\Admin@HVDPCYGS_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini Windows Security Service.exe File created C:\Users\Admin\AppData\Local\0993adca3a05158d4947d12883e78d74\Admin@HVDPCYGS_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini Windows Security Service.exe File opened for modification C:\Users\Admin\AppData\Local\0993adca3a05158d4947d12883e78d74\Admin@HVDPCYGS_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini Windows Security Service.exe File created C:\Users\Admin\AppData\Local\0993adca3a05158d4947d12883e78d74\Admin@HVDPCYGS_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini Windows Security Service.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Security Service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4260 cmd.exe 4092 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Windows Security Service.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Windows Security Service.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2584 timeout.exe 432 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4308 schtasks.exe 1928 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2232 Windows Defender Security Service.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 3948 Cracked.exe 2232 Windows Defender Security Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 3760 Windows Security Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 3760 Windows Security Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe 2188 Windows Security Health Service.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2232 Windows Defender Security Service.exe Token: SeDebugPrivilege 3948 Cracked.exe Token: SeDebugPrivilege 3760 Windows Security Service.exe Token: SeDebugPrivilege 3948 Cracked.exe Token: SeDebugPrivilege 3380 crack.exe Token: SeDebugPrivilege 2188 Windows Security Health Service.exe Token: SeDebugPrivilege 2188 Windows Security Health Service.exe Token: SeDebugPrivilege 4512 Windows Defender Security Service.exe Token: SeDebugPrivilege 372 Windows Defender Security Service.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2232 Windows Defender Security Service.exe 2188 Windows Security Health Service.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 232 wrote to memory of 3380 232 ed96deb2efe2997cc93edd758ef59a00N.exe 83 PID 232 wrote to memory of 3380 232 ed96deb2efe2997cc93edd758ef59a00N.exe 83 PID 232 wrote to memory of 3380 232 ed96deb2efe2997cc93edd758ef59a00N.exe 83 PID 232 wrote to memory of 3760 232 ed96deb2efe2997cc93edd758ef59a00N.exe 84 PID 232 wrote to memory of 3760 232 ed96deb2efe2997cc93edd758ef59a00N.exe 84 PID 232 wrote to memory of 3760 232 ed96deb2efe2997cc93edd758ef59a00N.exe 84 PID 232 wrote to memory of 2232 232 ed96deb2efe2997cc93edd758ef59a00N.exe 85 PID 232 wrote to memory of 2232 232 ed96deb2efe2997cc93edd758ef59a00N.exe 85 PID 232 wrote to memory of 3948 232 ed96deb2efe2997cc93edd758ef59a00N.exe 86 PID 232 wrote to memory of 3948 232 ed96deb2efe2997cc93edd758ef59a00N.exe 86 PID 3948 wrote to memory of 2660 3948 Cracked.exe 91 PID 3948 wrote to memory of 2660 3948 Cracked.exe 91 PID 3948 wrote to memory of 3244 3948 Cracked.exe 93 PID 3948 wrote to memory of 3244 3948 Cracked.exe 93 PID 3244 wrote to memory of 2584 3244 cmd.exe 95 PID 3244 wrote to memory of 2584 3244 cmd.exe 95 PID 2660 wrote to memory of 4308 2660 cmd.exe 96 PID 2660 wrote to memory of 4308 2660 cmd.exe 96 PID 2232 wrote to memory of 1928 2232 Windows Defender Security Service.exe 97 PID 2232 wrote to memory of 1928 2232 Windows Defender Security Service.exe 97 PID 3244 wrote to memory of 2188 3244 cmd.exe 100 PID 3244 wrote to memory of 2188 3244 cmd.exe 100 PID 3760 wrote to memory of 4260 3760 Windows Security Service.exe 101 PID 3760 wrote to memory of 4260 3760 Windows Security Service.exe 101 PID 3760 wrote to memory of 4260 3760 Windows Security Service.exe 101 PID 4260 wrote to memory of 4844 4260 cmd.exe 103 PID 4260 wrote to memory of 4844 4260 cmd.exe 103 PID 4260 wrote to memory of 4844 4260 cmd.exe 103 PID 4260 wrote to memory of 4092 4260 cmd.exe 104 PID 4260 wrote to memory of 4092 4260 cmd.exe 104 PID 4260 wrote to memory of 4092 4260 cmd.exe 104 PID 4260 wrote to memory of 2164 4260 cmd.exe 105 PID 4260 wrote to memory of 2164 4260 cmd.exe 105 PID 4260 wrote to memory of 2164 4260 cmd.exe 105 PID 3760 wrote to memory of 1956 3760 Windows Security Service.exe 106 PID 3760 wrote to memory of 1956 3760 Windows Security Service.exe 106 PID 3760 wrote to memory of 1956 3760 Windows Security Service.exe 106 PID 1956 wrote to memory of 2456 1956 cmd.exe 108 PID 1956 wrote to memory of 2456 1956 cmd.exe 108 PID 1956 wrote to memory of 2456 1956 cmd.exe 108 PID 1956 wrote to memory of 2660 1956 cmd.exe 109 PID 1956 wrote to memory of 2660 1956 cmd.exe 109 PID 1956 wrote to memory of 2660 1956 cmd.exe 109 PID 3380 wrote to memory of 2816 3380 crack.exe 110 PID 3380 wrote to memory of 2816 3380 crack.exe 110 PID 3380 wrote to memory of 2816 3380 crack.exe 110 PID 2816 wrote to memory of 432 2816 cmd.exe 112 PID 2816 wrote to memory of 432 2816 cmd.exe 112 PID 2816 wrote to memory of 432 2816 cmd.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed96deb2efe2997cc93edd758ef59a00N.exe"C:\Users\Admin\AppData\Local\Temp\ed96deb2efe2997cc93edd758ef59a00N.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Roaming\crack.exe"C:\Users\Admin\AppData\Roaming\crack.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpDD60.tmp.cmd""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\timeout.exetimeout 44⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:432
-
-
-
-
C:\Users\Admin\AppData\Roaming\Windows Security Service.exe"C:\Users\Admin\AppData\Roaming\Windows Security Service.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:4844
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4092
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵
- System Location Discovery: System Language Discovery
PID:2164
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:2456
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2660
-
-
-
-
C:\Users\Admin\AppData\Roaming\Windows Defender Security Service.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Security Service.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Defender Security Service" /tr "C:\Users\Admin\AppData\Roaming\Windows Defender Security Service.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1928
-
-
-
C:\Users\Admin\AppData\Roaming\Cracked.exe"C:\Users\Admin\AppData\Roaming\Cracked.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows Security Health Service" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows Security Health Service" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:4308
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB5F2.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:2584
-
-
C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2188
-
-
-
-
C:\Users\Admin\AppData\Roaming\Windows Defender Security Service.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Security Service.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
C:\Users\Admin\AppData\Roaming\Windows Defender Security Service.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Security Service.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:372
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\0993adca3a05158d4947d12883e78d74\Admin@HVDPCYGS_en-US\Browsers\Firefox\Bookmarks.txt
Filesize105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
C:\Users\Admin\AppData\Local\0993adca3a05158d4947d12883e78d74\Admin@HVDPCYGS_en-US\System\Process.txt
Filesize4KB
MD51ca086549f3e7d33dacece2c27b7f9dc
SHA1ac62be7bce90cdecc22ad1933b668c2b1caf05df
SHA25628890ccce285c5648126715395befa1b2fcafa631bf08c3de6f0707cd50df5cd
SHA51232608af9a1359f95a13cdffcc211073c6eedd6522254e65a26dc3d2f7cc7a8cdb92bf0b8f3d5e52a14c8f0be1a05f9e811ebaeba95617e601f62faea64784228
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
175B
MD5bbad05d57ce46c06885dc460eddcf7aa
SHA14a0549c8e8704859404dfdc46cc888f8af0b3131
SHA2564f8322b1fe37c8dabdb0570bdedcbbc7b1ce93f4bca24a0ae6f6e6b2bf1c4c9c
SHA51260a2468745db9269fdf238cb7a34851a1c949284726fa6c96c72c8b7a1cb72c57b0ebe8586fbfa2fbf743227d1c60cc9deffc6ba306cd636ea7d797e153ff9d3
-
Filesize
151B
MD59fba22b9a1ee5342e83ceb650e4cf2a5
SHA132d68c8fcb19d9cdc9ac2fb496bc5fb0860ec17f
SHA256db666fb879d2f4241ff3cb27f6fbd0647a8e08634cbb90e3bab7441b756f9148
SHA5126ceb3106656a9f0ec99588b6d346d243692d8e4b7363c48dfae324c42f04ca831fd53a456e57c71fe23898f55731c350b33c5d20f853880b8d94b1f98fb07ebb
-
Filesize
5B
MD533acaba956e30e1494c5b84d48694e0e
SHA1413b6dcaba4bccddec4d166720084ac85cbcd838
SHA2569a7eb42450001c5e446387426a1623c044159789d9531c28ac858f09af8fa887
SHA51200c397634b93c175640d53e37a1ee81b2347f97617aed68b94992940fd58c952c346f26208eef7121ea5a7a5db4379dcf9dae9a8d27ed3ccb54110c61d036320
-
Filesize
74KB
MD50dfa83a82f6418c73406d78296de61be
SHA1dd7eceef8a434c43e0751e180bf714e08771d336
SHA2568d27369ffa8b29d561fa9daf485be14d2fc00287bb1c69d4c84d514891c8db5e
SHA5129a4b026250b18c29ab7dd48203f321c2ef2f12695bd2dcb52ebbc15001c8ddf019d5a7e04da056c50c1881ce269d1810259bf6d04b61f471e8751b7192fc73d4
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
42KB
MD57a5ea6a11fdb03f789a2246aa8ff1501
SHA15e1289096418c7f8b5901963c34c89f9902cbbba
SHA256bde45f854d6c434717ea7b59587e020c2403123728c49deb56cba8132de5e96a
SHA512cfca94f3d78675bbe56f02119e3943f7067898d7b7d14e91bca7220a235665363f69930acdeb9f7df388a49a6b62812bcf74bbffad20a96915257b54c4e78a73
-
Filesize
170KB
MD56cbe3de085baa7ffcc6194a34746538a
SHA1986e6523294c5d3835af38a56c03239ca0f3a007
SHA2561aad9660ae1dcfada6ea39fc441f1b06fdab9b7fd71b71342f006e2d779cdf8b
SHA51250d73b171adb7dbf12f00267ea3501a676f757980a0ab6ba3ae64f7ca1666394dbb008b80faa51beecd9546e224425df4c48d08c0dbf69915ed07eda04e8aeeb
-
Filesize
8KB
MD59215015740c937980b6b53cee5087769
SHA1a0bfe95486944f1548620d4de472c3758e95d36a
SHA256a5390a297f14ef8f5be308009ec436d2a58598188dbb92d7299795a10ba1c541
SHA5125b9bbf1836466d803d3e160a38e10c8397aa3966c120ab6435a52b7d0a09eb664ef2172bf0e7e2de1cc3eae261167c9355fa7ac3b1b7e4504a7e07b82c4b90e2