Analysis
-
max time kernel
572s -
max time network
573s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2024, 21:34
Static task
static1
Behavioral task
behavioral1
Sample
SolaraLauncher.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
SolaraLauncher.exe
-
Size
260KB
-
MD5
ac3903005056433da36fafc44fa89888
-
SHA1
21ee3fdfbecc401c987054b65f1f186067aa26e8
-
SHA256
a0e45f967f2d4e41f7501b02b7792b8b69e5726b491595d17fb58fea18caa5f1
-
SHA512
caf46189157197f8e2440cb361a7dc124bda54569cf2fa00015ad81698d5fe20ba115601c174068456b79508d293a63d52779e0fa2809682a8b787d966034d80
-
SSDEEP
6144:djXgCAH7cEnaBaVoWv3ji8Nylh7r+SesepRTcq6tOQgBZQD:djX98cOVoely/uHp2q6s6
Malware Config
Extracted
xworm
5.0
127.0.0.1:13970
accessories-retrieve.gl.at.ply.gg:13970
nipMTFYV6XUBvXZW
-
Install_directory
%AppData%
-
install_file
Loader.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000700000002344e-21.dat family_xworm behavioral1/memory/2180-25-0x0000000000F40000-0x0000000000F5E000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 880 powershell.exe 5028 powershell.exe 920 powershell.exe 3940 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation SolaraLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Solara.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Loader.lnk Solara.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Loader.lnk Solara.exe -
Executes dropped EXE 11 IoCs
pid Process 4500 Bootstrapper.exe 2180 Solara.exe 1200 Loader.exe 928 Loader.exe 4112 Loader.exe 1448 Loader.exe 1736 Loader.exe 2724 Loader.exe 876 Loader.exe 4852 Loader.exe 3516 Loader.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Loader = "C:\\Users\\Admin\\AppData\\Roaming\\Loader.exe" Solara.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\XBackground.bmp" Solara.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "91" LogonUI.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3556 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 880 powershell.exe 880 powershell.exe 5028 powershell.exe 5028 powershell.exe 920 powershell.exe 920 powershell.exe 3940 powershell.exe 3940 powershell.exe 2180 Solara.exe 4344 msedge.exe 4344 msedge.exe 388 msedge.exe 388 msedge.exe 4216 identity_helper.exe 4216 identity_helper.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 2180 Solara.exe Token: SeDebugPrivilege 880 powershell.exe Token: SeDebugPrivilege 5028 powershell.exe Token: SeDebugPrivilege 920 powershell.exe Token: SeDebugPrivilege 3940 powershell.exe Token: SeDebugPrivilege 2180 Solara.exe Token: SeDebugPrivilege 1200 Loader.exe Token: SeDebugPrivilege 928 Loader.exe Token: SeDebugPrivilege 4112 Loader.exe Token: SeDebugPrivilege 1448 Loader.exe Token: SeDebugPrivilege 1736 Loader.exe Token: SeDebugPrivilege 2724 Loader.exe Token: SeDebugPrivilege 876 Loader.exe Token: SeDebugPrivilege 4852 Loader.exe Token: SeDebugPrivilege 3516 Loader.exe Token: SeShutdownPrivilege 392 shutdown.exe Token: SeRemoteShutdownPrivilege 392 shutdown.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2180 Solara.exe 4804 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 712 wrote to memory of 4500 712 SolaraLauncher.exe 82 PID 712 wrote to memory of 4500 712 SolaraLauncher.exe 82 PID 712 wrote to memory of 4500 712 SolaraLauncher.exe 82 PID 712 wrote to memory of 2180 712 SolaraLauncher.exe 83 PID 712 wrote to memory of 2180 712 SolaraLauncher.exe 83 PID 2180 wrote to memory of 880 2180 Solara.exe 86 PID 2180 wrote to memory of 880 2180 Solara.exe 86 PID 2180 wrote to memory of 5028 2180 Solara.exe 90 PID 2180 wrote to memory of 5028 2180 Solara.exe 90 PID 2180 wrote to memory of 920 2180 Solara.exe 92 PID 2180 wrote to memory of 920 2180 Solara.exe 92 PID 2180 wrote to memory of 3940 2180 Solara.exe 94 PID 2180 wrote to memory of 3940 2180 Solara.exe 94 PID 2180 wrote to memory of 3556 2180 Solara.exe 96 PID 2180 wrote to memory of 3556 2180 Solara.exe 96 PID 2180 wrote to memory of 388 2180 Solara.exe 104 PID 2180 wrote to memory of 388 2180 Solara.exe 104 PID 388 wrote to memory of 4860 388 msedge.exe 105 PID 388 wrote to memory of 4860 388 msedge.exe 105 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 2820 388 msedge.exe 106 PID 388 wrote to memory of 4344 388 msedge.exe 107 PID 388 wrote to memory of 4344 388 msedge.exe 107 PID 388 wrote to memory of 924 388 msedge.exe 108 PID 388 wrote to memory of 924 388 msedge.exe 108 PID 388 wrote to memory of 924 388 msedge.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SolaraLauncher.exe"C:\Users\Admin\AppData\Local\Temp\SolaraLauncher.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Users\Admin\AppData\Roaming\Bootstrapper.exe"C:\Users\Admin\AppData\Roaming\Bootstrapper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4500
-
-
C:\Users\Admin\AppData\Roaming\Solara.exe"C:\Users\Admin\AppData\Roaming\Solara.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Solara.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Solara.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Loader.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Loader.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Loader" /tr "C:\Users\Admin\AppData\Roaming\Loader.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\How To Decrypt My Files.html3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff827b946f8,0x7ff827b94708,0x7ff827b947184⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,15602329104764776194,9466034629984864295,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:24⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,15602329104764776194,9466034629984864295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,15602329104764776194,9466034629984864295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:84⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15602329104764776194,9466034629984864295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:14⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15602329104764776194,9466034629984864295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:14⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,15602329104764776194,9466034629984864295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:84⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,15602329104764776194,9466034629984864295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15602329104764776194,9466034629984864295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:14⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15602329104764776194,9466034629984864295,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:14⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15602329104764776194,9466034629984864295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:14⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15602329104764776194,9466034629984864295,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:14⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,15602329104764776194,9466034629984864295,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5296 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15602329104764776194,9466034629984864295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:14⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15602329104764776194,9466034629984864295,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1532 /prefetch:14⤵PID:3828
-
-
-
C:\Windows\SYSTEM32\shutdown.exeshutdown.exe /f /r /t 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:392
-
-
-
C:\Users\Admin\AppData\Roaming\Loader.exeC:\Users\Admin\AppData\Roaming\Loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1736
-
C:\Users\Admin\AppData\Roaming\Loader.exeC:\Users\Admin\AppData\Roaming\Loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:928
-
C:\Users\Admin\AppData\Roaming\Loader.exeC:\Users\Admin\AppData\Roaming\Loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
C:\Users\Admin\AppData\Roaming\Loader.exeC:\Users\Admin\AppData\Roaming\Loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
C:\Users\Admin\AppData\Roaming\Loader.exeC:\Users\Admin\AppData\Roaming\Loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
C:\Users\Admin\AppData\Roaming\Loader.exeC:\Users\Admin\AppData\Roaming\Loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
C:\Users\Admin\AppData\Roaming\Loader.exeC:\Users\Admin\AppData\Roaming\Loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:876
-
C:\Users\Admin\AppData\Roaming\Loader.exeC:\Users\Admin\AppData\Roaming\Loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
C:\Users\Admin\AppData\Roaming\Loader.exeC:\Users\Admin\AppData\Roaming\Loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3949855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4804
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
5KB
MD52b7cb4b884685bbbbdca7cfce844cc9b
SHA157cee58e5127e72bf340594d16855ac2ce1cad5d
SHA256ffac6dff5678edd76aef7628563281148cd6b6afb089d494c50726a8f7bf0433
SHA512b438f73ce5a912729fb878b0d9332283c7fc7d635bff8f3ad6aae972c68694ef0cb08fea0105f1bb3f5a534aa01e96f901fc3ca0c6fd73a739e241e655334888
-
Filesize
6KB
MD5ff10c297e1fa03e74d77a0a2d5f06755
SHA17dc9f2aea23641980be0a3b1525262217b6927ee
SHA25652e2db88f9df029851f1759eb22879a1de92b70c63073272e6bc7e374b39b984
SHA5125d12cb704d7767911e203052507700783b629a36e86e011471d0f5906613bf08ebbd3bdb84a0ffad4c2d4ea65c04387a6e611152fe0c57898988226ab0b1cc41
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD544141cc5b4a5ea15f0fcf09bb4935447
SHA18ef26a8adefd851e34129c9ba205ee445caff4a1
SHA25690df9bfb6871f1a28c4bfd0d2d75c7a72308c3d5143381e3f98aa24a980703f9
SHA512ae2b7645012747c3dd6d5c92f43257ae5eb24fb2fb540e7502b8fd300aad8640a3ad10ce958fbe4bbe1b5ae3da342a5e0ecd3bb968bf900e9e5cc0374dbb2c7e
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
944B
MD598baf5117c4fcec1692067d200c58ab3
SHA15b33a57b72141e7508b615e17fb621612cb8e390
SHA25630bf8496e9a08f4fdfe4767abcd565f92b6da06ca1c7823a70cb7cab16262e51
SHA512344a70bfc037d54176f12db91f05bf4295bb587a5062fd1febe6f52853571170bd8ef6042cb87b893185bbae1937cf77b679d7970f8cc1c2666b0b7c1b32987d
-
Filesize
944B
MD510890cda4b6eab618e926c4118ab0647
SHA11e1d63b73a0e6c7575f458b3c7917a9ce5ba776d
SHA25600f8a035324d39bd62e6dee5e1b480069015471c487ebee4479e6990ea9ddb14
SHA512a2ee84006c24a36f25e0bca0772430d64e3791f233da916aecdeae6712763e77d55bbbd00dc8f6b2b3887f3c26ab3980b96c5f46cc823e81e28abbbc5fc78221
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
104KB
MD57776882352548456cfc6f9827572d724
SHA122785b7dac19933527255ef7a96fb331f7a455a5
SHA2566a850e209de722ad4f57dd68f8af405d62ad6557772717bbd86052d1fe43910f
SHA5129d0cdc083f75bf524484c231a69e5179bdcc6a6b4ab845ede88aa9ef0f336b0d3d67e90752c545272958f82d8f4fdd1293bd070bd56a3cadaa252d2b53e864e2
-
Filesize
91KB
MD5b4be3f19527e6c2b0065e742f9c1f838
SHA157156feb7c069cd31c939a8a0540e7d46e0c5427
SHA2568f24c89391201e63ac570b9ace47eac4cac06157890056d7c09ac762d4c27cc1
SHA512cbaaedd1ea1da87e86144058894e47b91a59c518e4a23c40d928d64f7fd542070c58d552e5e19e8640796967b4b4eb4106c11e6336f020f82ef90296861f327e
-
Filesize
639B
MD5d2dbbc3383add4cbd9ba8e1e35872552
SHA1020abbc821b2fe22c4b2a89d413d382e48770b6f
SHA2565ca82cbc4d582a4a425ae328ad12fd198095e2854f4f87b27a4b09e91173a3be
SHA512bb5e1bbf28c10c077644136b98d8d02bfec3b3e49c0829b4d4570b30e0aea0276eb748f749a491587a5e70141a7653be1d03c463a22e44efecde2e5a6c6e5e66
-
C:\Users\Admin\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000001.regtrans-ms.ENC
Filesize16B
MD54de28eded9283b587467d5d77401d381
SHA13b62291b67804983683699a06ae01f270270852a
SHA256ea808a41b2fb9932cd5d811da5eac6661fde81c4ec93c9d05e87977c5ac4190f
SHA512335c310b6109fcb1dc46e7835f9073db64d28689f43b9113a15df7492c4f53a97389657b919fe8250970a5167f4f71d620c53687d515f6574b8348bcf6853714