Analysis
-
max time kernel
46s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2024 14:11
Static task
static1
General
-
Target
portmapper-2.2.3.exe
-
Size
5.2MB
-
MD5
9f14a0573f96ce3c3374044e585f7eb0
-
SHA1
88247dac3c2a4e5a760c215436a99afe9ad5577f
-
SHA256
e5f62be708a0caa8b4e5dfcf07127eabc49a8a61a300f434367718b7e7c2e7e3
-
SHA512
f1e5af30c5c251a294998eb15cef22d22c6e30c900e08d86721ad3bfe400b86b8866c8ec66082014f3f3da2fb576a4cf35f1ff9e1f36d1dad26403fa96f9f91b
-
SSDEEP
98304:rqw3fQlyOEaEyr9QsYhzAkSuwnu0J74Ijb4eDaJo99AXvhdkfx5:rqw3fsVPYa7J7zjxae7iZdK
Malware Config
Extracted
xworm
127.0.0.1:3232
l838.ddns.net:3232
0x365c3e6EeF15a2938FC7267D5A3386c8e23aBc5F:123
-
Install_directory
%ProgramData%
-
install_file
Windows Security Wrapper.exe
Extracted
asyncrat
L838 RAT v1.0.0
Default
127.0.0.1:54984
l838.ddns.net:54984
kswxiqghhjgkjqpqzz
-
delay
3
-
install
true
-
install_file
Windows Service Wrapper.exe
-
install_folder
%programdata%
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000700000002358c-41.dat family_xworm behavioral1/memory/4804-73-0x00000000006E0000-0x00000000006F8000-memory.dmp family_xworm -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000700000002358d-44.dat family_asyncrat -
pid Process 4960 powershell.exe 3720 powershell.exe 4012 powershell.exe 412 powershell.exe 3608 powershell.exe 4716 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation portmapper-2.2.3.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation PortServices.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation WindowsSmartScreen.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Security Wrapper.lnk WindowsSmartScreen.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Security Wrapper.lnk WindowsSmartScreen.exe -
Executes dropped EXE 4 IoCs
pid Process 3188 PortServices.exe 4804 WindowsSmartScreen.exe 1560 WindowsDriverFoundation.exe 3624 trellrt.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemUpdateWindowsSmartScreen = "C:\\Users\\Admin\\WindowsSmartScreen.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemUpdateWindowsDriverFoundation = "C:\\Users\\Admin\\WindowsDriverFoundation.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Security Wrapper = "C:\\ProgramData\\Windows Security Wrapper.exe" WindowsSmartScreen.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA trellrt.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PortServices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trellrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings portmapper-2.2.3.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4144 schtasks.exe 3256 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4804 WindowsSmartScreen.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 4292 powershell.exe 4292 powershell.exe 4960 powershell.exe 4960 powershell.exe 4960 powershell.exe 4292 powershell.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3720 powershell.exe 3720 powershell.exe 3720 powershell.exe 4012 powershell.exe 4012 powershell.exe 4012 powershell.exe 412 powershell.exe 412 powershell.exe 412 powershell.exe 3608 powershell.exe 3608 powershell.exe 3608 powershell.exe 4716 powershell.exe 4716 powershell.exe 4716 powershell.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe 3624 trellrt.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3624 trellrt.exe -
Suspicious use of AdjustPrivilegeToken 53 IoCs
description pid Process Token: SeDebugPrivilege 4804 WindowsSmartScreen.exe Token: SeDebugPrivilege 1560 WindowsDriverFoundation.exe Token: SeDebugPrivilege 4960 powershell.exe Token: SeDebugPrivilege 4292 powershell.exe Token: SeDebugPrivilege 3624 trellrt.exe Token: SeIncreaseQuotaPrivilege 1560 WindowsDriverFoundation.exe Token: SeSecurityPrivilege 1560 WindowsDriverFoundation.exe Token: SeTakeOwnershipPrivilege 1560 WindowsDriverFoundation.exe Token: SeLoadDriverPrivilege 1560 WindowsDriverFoundation.exe Token: SeSystemProfilePrivilege 1560 WindowsDriverFoundation.exe Token: SeSystemtimePrivilege 1560 WindowsDriverFoundation.exe Token: SeProfSingleProcessPrivilege 1560 WindowsDriverFoundation.exe Token: SeIncBasePriorityPrivilege 1560 WindowsDriverFoundation.exe Token: SeCreatePagefilePrivilege 1560 WindowsDriverFoundation.exe Token: SeBackupPrivilege 1560 WindowsDriverFoundation.exe Token: SeRestorePrivilege 1560 WindowsDriverFoundation.exe Token: SeShutdownPrivilege 1560 WindowsDriverFoundation.exe Token: SeDebugPrivilege 1560 WindowsDriverFoundation.exe Token: SeSystemEnvironmentPrivilege 1560 WindowsDriverFoundation.exe Token: SeRemoteShutdownPrivilege 1560 WindowsDriverFoundation.exe Token: SeUndockPrivilege 1560 WindowsDriverFoundation.exe Token: SeManageVolumePrivilege 1560 WindowsDriverFoundation.exe Token: 33 1560 WindowsDriverFoundation.exe Token: 34 1560 WindowsDriverFoundation.exe Token: 35 1560 WindowsDriverFoundation.exe Token: 36 1560 WindowsDriverFoundation.exe Token: SeIncreaseQuotaPrivilege 1560 WindowsDriverFoundation.exe Token: SeSecurityPrivilege 1560 WindowsDriverFoundation.exe Token: SeTakeOwnershipPrivilege 1560 WindowsDriverFoundation.exe Token: SeLoadDriverPrivilege 1560 WindowsDriverFoundation.exe Token: SeSystemProfilePrivilege 1560 WindowsDriverFoundation.exe Token: SeSystemtimePrivilege 1560 WindowsDriverFoundation.exe Token: SeProfSingleProcessPrivilege 1560 WindowsDriverFoundation.exe Token: SeIncBasePriorityPrivilege 1560 WindowsDriverFoundation.exe Token: SeCreatePagefilePrivilege 1560 WindowsDriverFoundation.exe Token: SeBackupPrivilege 1560 WindowsDriverFoundation.exe Token: SeRestorePrivilege 1560 WindowsDriverFoundation.exe Token: SeShutdownPrivilege 1560 WindowsDriverFoundation.exe Token: SeDebugPrivilege 1560 WindowsDriverFoundation.exe Token: SeSystemEnvironmentPrivilege 1560 WindowsDriverFoundation.exe Token: SeRemoteShutdownPrivilege 1560 WindowsDriverFoundation.exe Token: SeUndockPrivilege 1560 WindowsDriverFoundation.exe Token: SeManageVolumePrivilege 1560 WindowsDriverFoundation.exe Token: 33 1560 WindowsDriverFoundation.exe Token: 34 1560 WindowsDriverFoundation.exe Token: 35 1560 WindowsDriverFoundation.exe Token: 36 1560 WindowsDriverFoundation.exe Token: SeDebugPrivilege 3720 powershell.exe Token: SeDebugPrivilege 4012 powershell.exe Token: SeDebugPrivilege 412 powershell.exe Token: SeDebugPrivilege 3608 powershell.exe Token: SeDebugPrivilege 4716 powershell.exe Token: SeDebugPrivilege 4804 WindowsSmartScreen.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3188 PortServices.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 2980 wrote to memory of 3188 2980 portmapper-2.2.3.exe 89 PID 2980 wrote to memory of 3188 2980 portmapper-2.2.3.exe 89 PID 2980 wrote to memory of 3188 2980 portmapper-2.2.3.exe 89 PID 3188 wrote to memory of 4292 3188 PortServices.exe 91 PID 3188 wrote to memory of 4292 3188 PortServices.exe 91 PID 3188 wrote to memory of 4292 3188 PortServices.exe 91 PID 3188 wrote to memory of 4804 3188 PortServices.exe 93 PID 3188 wrote to memory of 4804 3188 PortServices.exe 93 PID 3188 wrote to memory of 1560 3188 PortServices.exe 94 PID 3188 wrote to memory of 1560 3188 PortServices.exe 94 PID 3188 wrote to memory of 3776 3188 PortServices.exe 95 PID 3188 wrote to memory of 3776 3188 PortServices.exe 95 PID 3188 wrote to memory of 3776 3188 PortServices.exe 95 PID 3188 wrote to memory of 3624 3188 PortServices.exe 97 PID 3188 wrote to memory of 3624 3188 PortServices.exe 97 PID 3188 wrote to memory of 3624 3188 PortServices.exe 97 PID 2980 wrote to memory of 5116 2980 portmapper-2.2.3.exe 98 PID 2980 wrote to memory of 5116 2980 portmapper-2.2.3.exe 98 PID 3776 wrote to memory of 4960 3776 cmd.exe 99 PID 3776 wrote to memory of 4960 3776 cmd.exe 99 PID 3776 wrote to memory of 4960 3776 cmd.exe 99 PID 3624 wrote to memory of 4144 3624 trellrt.exe 112 PID 3624 wrote to memory of 4144 3624 trellrt.exe 112 PID 3624 wrote to memory of 4144 3624 trellrt.exe 112 PID 3776 wrote to memory of 3720 3776 cmd.exe 108 PID 3776 wrote to memory of 3720 3776 cmd.exe 108 PID 3776 wrote to memory of 3720 3776 cmd.exe 108 PID 4804 wrote to memory of 4012 4804 WindowsSmartScreen.exe 109 PID 4804 wrote to memory of 4012 4804 WindowsSmartScreen.exe 109 PID 4804 wrote to memory of 412 4804 WindowsSmartScreen.exe 113 PID 4804 wrote to memory of 412 4804 WindowsSmartScreen.exe 113 PID 3776 wrote to memory of 4556 3776 cmd.exe 115 PID 3776 wrote to memory of 4556 3776 cmd.exe 115 PID 3776 wrote to memory of 4556 3776 cmd.exe 115 PID 3776 wrote to memory of 1988 3776 cmd.exe 116 PID 3776 wrote to memory of 1988 3776 cmd.exe 116 PID 3776 wrote to memory of 1988 3776 cmd.exe 116 PID 3776 wrote to memory of 3836 3776 cmd.exe 117 PID 3776 wrote to memory of 3836 3776 cmd.exe 117 PID 3776 wrote to memory of 3836 3776 cmd.exe 117 PID 3776 wrote to memory of 2960 3776 cmd.exe 118 PID 3776 wrote to memory of 2960 3776 cmd.exe 118 PID 3776 wrote to memory of 2960 3776 cmd.exe 118 PID 3776 wrote to memory of 2592 3776 cmd.exe 119 PID 3776 wrote to memory of 2592 3776 cmd.exe 119 PID 3776 wrote to memory of 2592 3776 cmd.exe 119 PID 3776 wrote to memory of 760 3776 cmd.exe 130 PID 3776 wrote to memory of 760 3776 cmd.exe 130 PID 3776 wrote to memory of 760 3776 cmd.exe 130 PID 4804 wrote to memory of 3608 4804 WindowsSmartScreen.exe 121 PID 4804 wrote to memory of 3608 4804 WindowsSmartScreen.exe 121 PID 4804 wrote to memory of 4716 4804 WindowsSmartScreen.exe 124 PID 4804 wrote to memory of 4716 4804 WindowsSmartScreen.exe 124 PID 4804 wrote to memory of 3256 4804 WindowsSmartScreen.exe 126 PID 4804 wrote to memory of 3256 4804 WindowsSmartScreen.exe 126 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\portmapper-2.2.3.exe"C:\Users\Admin\AppData\Local\Temp\portmapper-2.2.3.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\PortServices.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PortServices.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHUAegBjACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGMAcQBnACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGUAdAB1ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGcAYwBoACMAPgA="3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
C:\Users\Admin\WindowsSmartScreen.exe"C:\Users\Admin\WindowsSmartScreen.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\WindowsSmartScreen.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4012
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WindowsSmartScreen.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Windows Security Wrapper.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Security Wrapper.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Security Wrapper" /tr "C:\ProgramData\Windows Security Wrapper.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:3256
-
-
-
C:\Users\Admin\WindowsDriverFoundation.exe"C:\Users\Admin\WindowsDriverFoundation.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\STEALER.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Disabling-WindowsRecoveryEnvironment"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\WindowsExecutables'"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Run"4⤵
- System Location Discovery: System Language Discovery
PID:4556
-
-
C:\Windows\SysWOW64\find.exefind /i "SystemUpdateWindowsSmartScreen"4⤵
- System Location Discovery: System Language Discovery
PID:1988
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "SystemUpdateWindowsSmartScreen" /t REG_SZ /d "C:\Users\Admin\WindowsSmartScreen.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3836
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Run"4⤵
- System Location Discovery: System Language Discovery
PID:2960
-
-
C:\Windows\SysWOW64\find.exefind /i "SystemUpdateWindowsDriverFoundation"4⤵
- System Location Discovery: System Language Discovery
PID:2592
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "SystemUpdateWindowsDriverFoundation" /t REG_SZ /d "C:\Users\Admin\WindowsDriverFoundation.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:760
-
-
-
C:\Users\Admin\AppData\Roaming\trellrt.exe"C:\Users\Admin\AppData\Roaming\trellrt.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "WPA Monitor" /xml "C:\Users\Admin\AppData\Local\Temp\tmp72B2.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4144
-
-
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\RarSFX0\portmapper-2.2.3.jar"2⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4512,i,16315016104747277319,5510969007830467313,262144 --variations-seed-version --mojo-platform-channel-handle=4628 /prefetch:81⤵PID:3864
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4144
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵PID:760
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4352
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD53dfd6c7e53479c05747c05093809673a
SHA16e70274ac6c8d83d0d509813e20d7151bb002e30
SHA256e65b11c2a3d1d6edf90a766e765699ac25dc659262094930999303ca654cb137
SHA512df65d74acfeed671b5b25fe4016f8d2509d4113657a506fbd59518bd9656f6a629f6a48b00bb3e77fc95292745f81270f27a6e2fa71cfec4c2bbe2d2f12be82a
-
Filesize
18KB
MD5e922db9741aa037f641f215941c4a04a
SHA16c67f2f9212024a1a4ae36011b93fef22fbdc404
SHA256f2a873fd782bebd291cdad42777f3b2c75005e82bdccf91877e27ffb2ae802de
SHA512d6a69ad325740341fd9be44f645da9d731a8b77e01476753dffb7886644ca7dc2dbbcc03761f19d7da324ac5ddda7142f71210b85118f8b90b2d0a55e31b99ad
-
Filesize
944B
MD59b80cd7a712469a4c45fec564313d9eb
SHA16125c01bc10d204ca36ad1110afe714678655f2d
SHA2565a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d
SHA512ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584
-
Filesize
944B
MD54920f7bec7cdb8ac44637a6af9d2fc6f
SHA1d4c5e3c9397926ec9bdaccdd955e89f5138b1816
SHA2568cc607eab702c5690ee5d64f5d34add46b7093c23751506dad728853a434a277
SHA512321e8178ebd08d680c6d1af467ab73e3055af8c8bb06ee81b1af46bd6718e5a060c339da5a281028c2557ab8d85172921e10363ccd8d411aa0e75f62119838d7
-
Filesize
353KB
MD5565ab186944e5842406ab4f9d74f46f5
SHA1224bd1ca4711683c583945b3d6ecab5e5c639470
SHA256679d4c6a8111b4948639cc03794708f234501e052b2ebe0451a3d8bcbc379328
SHA51214b493887904eedcc55e2acf48196f4299a3e88a458ba75477a96796d644f5b11245f038cc0479d44bf58ea071c6a383a90c494654f775de4810ab2bb8129de8
-
Filesize
5.0MB
MD5df6057d0eeba1ab4266dd271536f1298
SHA18be95aa1a26c4c4328ca6c5a98ba34766f748102
SHA256aa5f3fb51ff107a38aaf07537e79754d94855fbe62f95a8cb702d7eeed928b6e
SHA512f291051434229931681a55afb313f0f595de52c0d176155343c3e05fa73a5378451a203be061265cf696a5f334190a1a8060b513ee6bc9e838efda5b26c06795
-
Filesize
1KB
MD51f69a22a7a1b2d2fd521ce21eb188c8f
SHA1e966e6e359bb9e7b77ed74e77375145e5cd21fdd
SHA25654585cad234b01400a62516b60260366f8bf29fde4aaebd81cb6b1d4bfe0cce7
SHA512905699190d5ee151ce34900920720e955a328a4d5012542529c8e22ccebcf96d0ab18f4b3977e3f1b65a41c52a7f2ede61ceff4eb07a9a66f8bf41ac7002d755
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5c959800473a9762a191d5458383878a6
SHA1b4e211472e313711cd59ada511b0d9ad38ed7ff3
SHA256de79f0647decf1c96baa7c71f984a23f651745a047cc5d979f42824efc3ce701
SHA512239dd7b34a46fd5abb06d81a979b0586e9a129293248df0afdc403e3be22671df0a1d422e5e9270d8fbe5faae415b4fff9fa747aa32ef695177c4ced38688128
-
Filesize
203KB
MD540b631e57ce22a4b52cb382cc44204c9
SHA158f46159e4cd20044d60c2572b91f6d48e9afafd
SHA256338c3e0d6dc067eb96eba389e63f60621bcd5b3573bf0e6fd73dced54fe55d7a
SHA512060d1c6e2a706bf3f375eb50647ba4820ac0c9f2d34838bda5f0303f1ef14e75e83d9167e9f50a19d72bfe4bb55fc28b7e64aa650e379f5dd2077b9e3ebbbdba
-
Filesize
74KB
MD5e40cf402a05b77c43a1934802059a39d
SHA1126f95a2d81c7007214be6933862485292fab294
SHA256edcae846e567107bdc6a741cdda70b82cd2526829899bc16ba4651f68e76a16c
SHA512ded21984cf2d95b9cab4b677f2c58cadd914f3b5b63ecae056bcfd55bfd43c03433dbef73156aaa99c4a1fd47a8e32e0371f49ae5113beca31a47dd8221f1259
-
Filesize
69KB
MD5603b4a00b2f8cb021066710cc002e323
SHA18d8b2f0e16de8c3e40485f608405bce07a31b49b
SHA2565e380cae6f287ef4a209916f2e0f86e1511bec721fe85ddbab2bcb30255ad9a2
SHA5120beefc1647b5e4cdd058c0a0d1e7c739297733f4d4dbf4cf5f2588b2c1c23049376c392150a375df855a27e4c99cf05f2c924427bc457bbe7ca53e58d8958956