Analysis
-
max time kernel
127s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 04:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://href.li/?https://cdn.discordapp.com/attachments/1287507042008825951/1287658910798577664/LaTeTSeTuPPASoPeN9192.zip?ex=66f2594f&is=66f107cf&hm=cff93ec27dd4e22938b38f1f56fc87dec184619dd036daa3881a0746adef03ba&
Resource
win10v2004-20240802-en
General
Malware Config
Extracted
cryptbot
twovdf2vs.top
-
url_path
/v1/upload.php
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation Set-up.exe -
Executes dropped EXE 5 IoCs
pid Process 3708 Set-up.exe 4300 Set-up.exe 3392 Set-up.exe 720 service123.exe 4536 Set-up.exe -
Loads dropped DLL 1 IoCs
pid Process 720 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 href.li 10 href.li -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set-up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Set-up.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Set-up.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133716259710346925" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 348 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1272 chrome.exe 1272 chrome.exe 3708 Set-up.exe 3708 Set-up.exe 3708 Set-up.exe 3708 Set-up.exe 3708 Set-up.exe 3708 Set-up.exe 3708 Set-up.exe 3708 Set-up.exe 3708 Set-up.exe 3708 Set-up.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeRestorePrivilege 3712 7zG.exe Token: 35 3712 7zG.exe Token: SeSecurityPrivilege 3712 7zG.exe Token: SeSecurityPrivilege 3712 7zG.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 3712 7zG.exe 676 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1272 wrote to memory of 4488 1272 chrome.exe 82 PID 1272 wrote to memory of 4488 1272 chrome.exe 82 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 4364 1272 chrome.exe 83 PID 1272 wrote to memory of 376 1272 chrome.exe 84 PID 1272 wrote to memory of 376 1272 chrome.exe 84 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85 PID 1272 wrote to memory of 3032 1272 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://href.li/?https://cdn.discordapp.com/attachments/1287507042008825951/1287658910798577664/LaTeTSeTuPPASoPeN9192.zip?ex=66f2594f&is=66f107cf&hm=cff93ec27dd4e22938b38f1f56fc87dec184619dd036daa3881a0746adef03ba&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa8b5ccc40,0x7ffa8b5ccc4c,0x7ffa8b5ccc582⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1608,i,15869230023392215663,368734645523172749,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1592 /prefetch:22⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2120,i,15869230023392215663,368734645523172749,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2168 /prefetch:32⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,15869230023392215663,368734645523172749,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2272 /prefetch:82⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,15869230023392215663,368734645523172749,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,15869230023392215663,368734645523172749,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4452,i,15869230023392215663,368734645523172749,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4484 /prefetch:12⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3796,i,15869230023392215663,368734645523172749,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4460 /prefetch:82⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4940,i,15869230023392215663,368734645523172749,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4508 /prefetch:82⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4424,i,15869230023392215663,368734645523172749,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2164 /prefetch:32⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5068,i,15869230023392215663,368734645523172749,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4020
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2024
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4028
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1308
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\LaTeTSeTuPPASoPeN9192\" -spe -an -ai#7zMap6949:104:7zEvent296521⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3712
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\LaTeTSeTuPPASoPeN9192\~△~LaTe$T░SeTuP░PA$S↳oPeN↳9192~△~\" -an -ai#7zMap5560:240:7zEvent263531⤵
- Suspicious use of FindShellTrayWindow
PID:676
-
C:\Users\Admin\Downloads\LaTeTSeTuPPASoPeN9192\~△~LaTe$T░SeTuP░PA$S↳oPeN↳9192~△~\Set-up.exe"C:\Users\Admin\Downloads\LaTeTSeTuPPASoPeN9192\~△~LaTe$T░SeTuP░PA$S↳oPeN↳9192~△~\Set-up.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:720
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:348
-
-
C:\Users\Admin\Downloads\LaTeTSeTuPPASoPeN9192\~△~LaTe$T░SeTuP░PA$S↳oPeN↳9192~△~\Set-up.exe"C:\Users\Admin\Downloads\LaTeTSeTuPPASoPeN9192\~△~LaTe$T░SeTuP░PA$S↳oPeN↳9192~△~\Set-up.exe"1⤵
- Executes dropped EXE
PID:4300
-
C:\Users\Admin\Downloads\LaTeTSeTuPPASoPeN9192\~△~LaTe$T░SeTuP░PA$S↳oPeN↳9192~△~\Set-up.exe"C:\Users\Admin\Downloads\LaTeTSeTuPPASoPeN9192\~△~LaTe$T░SeTuP░PA$S↳oPeN↳9192~△~\Set-up.exe"1⤵
- Executes dropped EXE
PID:3392
-
C:\Users\Admin\Downloads\LaTeTSeTuPPASoPeN9192\~△~LaTe$T░SeTuP░PA$S↳oPeN↳9192~△~\Set-up.exe"C:\Users\Admin\Downloads\LaTeTSeTuPPASoPeN9192\~△~LaTe$T░SeTuP░PA$S↳oPeN↳9192~△~\Set-up.exe"1⤵
- Executes dropped EXE
PID:4536
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5d042e60a65e5864e5c641ddc483112b1
SHA15bd9000329c5fd3ee9c55874c1576d4da1d20446
SHA2561cd3d0345d1edc6754b194f2c5349145b66a6577958c7b7249e9d063f4b7779d
SHA512f3da90f1598d9dbca2334749909e2b1001fc626ffadd0864705fc6564d13ba6400297b3faf15e6abdfae0162c79a60b7487b6e9fbc2b8ccd6224550f109008fb
-
Filesize
44KB
MD517ddca19e7ab480c273630e1a32bd7d7
SHA154f45b44c8c70fb4ca2937d4be795a1341d8b808
SHA2562d53c16eb99d81eeafd9628fdcdb8657bc9ffd3db992fdf1465e8544b8af60c5
SHA512653c6a687447cb21be221a7bb7188cd13fd4990424550935f8800cca54ebe2aaa658a0e46f1bf9f80cf74eb9790a25bcfc653260ebf440a8a7089030c1c13e65
-
Filesize
264KB
MD5fcb27d0a18b24e8ff5fede9a9b7d1a40
SHA1bc147ce0d56ecca25fbd3e8d6c830dcfe27de863
SHA256376f4e1b42555a4e5dcd057f93a90bc7d4372012985b5537910c1f8cf6eb3a3b
SHA512a219b0257b4df4bc1b4891700c25391e4ebef14afd8a748f525a8b49daa5e608456a0d749f2357301b25c324029064a57dbf9f941f59d3dd312d7041c1cc026d
-
Filesize
1.0MB
MD537ea73f68d297ebdf71d6e39b44749f2
SHA11dfee56d8d8c8e965225bc8c63903fb1f0634fab
SHA256272738c4af02583bed21ca523e2c882439112faf18e086db84c3a83068bff9e0
SHA5126b21251fc1512987a1371868b47ce14e5246808799c8db5bfc5b08b66ad4be109dd68bf893dec50de01fe49298f6e84e35f584a39727245fef837ca8f3c0f361
-
Filesize
4.0MB
MD53c74352ef3d075b24d9366ee5d26b587
SHA13e243767862c74d9745175663c55407b213d9891
SHA2561b07306d1f4623f6d370abce5a627da2620aa55ad63de4e312bd0dcc560091dd
SHA51212bfaf71c489563d14040c9aeb0e1abdbe692bbb3f46df255b512b0a22a4ce16ab90bd1b2f42c62ba273e4ffe0f0c3610129960d40246a4059531ce58e5329c4
-
Filesize
20KB
MD53fb96ea75c2d18bf13f789a5e06636f1
SHA1aa6c72f5af0a32d0c7474aff1bfe31859bfe36e3
SHA256d385566d354bf8c89b1c5862685895586dea159086db03ba5338cdf254021dd0
SHA512e19bda46ee08036806bff22c16bb0318531323b725537916f58aa2bb1569ec028457b2121bb7f7415a0072bb87901335415332c15120c4fc624caed341c99789
-
Filesize
36KB
MD5329da4054c7de722db480282341ffdd3
SHA174e2af48f1d7df822e875cdfee8a21c565398c28
SHA256cfa91bac1d90c1efa3e83ea28d46658b8e3470c942192b08f3b08629c5fc90c9
SHA512cd1ef25d6aa44dc6bd7e990981bcfc6df9708e5308566dfafb22822ae08d05a2ab51cfdf5cdd10ba1e4fec0efc967c2e061647dd88d805cb636ca755758fbed4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
522B
MD57fdbe1ac674c5f0bd251ee734ebded25
SHA1c29a70ddf59f5cf59bf88084eda43a1357512da2
SHA256a9797b4cd02258ff18693193bdf62a08dcb8501918b0d215008fc471daaf1138
SHA512338ce78af091c8d56dd84295429a8be60b1b58ce56d9915526b62d50b2c009125cf8267d2170e9ee2be96fa785a2a7cba882b6bffb2fe3fe63d130f62a363b29
-
Filesize
9KB
MD57b45914f8b784fbac4955b8995e4d042
SHA18b339d12068162433c8c04aa3f37518d6f82025f
SHA256f9bccd973bb1178654b6077320333cce1a1140785c3bf96ffed42c9d339ae082
SHA512183d740073e794b5476dd5fa448f2fd0556213bbf5da14c16fbd6b38745fca6bbe676433f05cdc37b23afb72387a64fea62ddfe02fef7faf891bacb0dc285e2a
-
Filesize
9KB
MD55a2335845d522de6b43f08f600689620
SHA1bbf2340c316cb54f311e4a0ab94a49d2700f60e1
SHA2562d585d893039bb6ea3ce22590f8e5602ff0bda31de72cecb7d0d8d410d61e07f
SHA5128a923852dbcf07650d6b8e72b1f66c7c2122ebe6cb723197ee49348fa91301fdde75e7085df286192cfcb1147a37c187425e9f26aba2a3c600d2171c920edf80
-
Filesize
9KB
MD5033ec45fba6d2ad6bdaae331c2dc5903
SHA15ec848af1f0ce0edc14110a6813fa29c367a1184
SHA256ec41ad9283d894f98a65781ff4533c4f0630f0192e3f9f96d857a5fb63d3d078
SHA51245e0950649f412fac5135940889a7deb8dd5ff0c527d2956b7a46d604be68b6f1240b52240c6385ee206df2c39cb54a8953b695a53eb4e03a62dc60abb13f304
-
Filesize
9KB
MD55b792a7e01faac9e2cf3b5e755842353
SHA1a755f4ff95691cd1000f8338f09988ecafd61dab
SHA256487fa9e9aa56e96b0320cba4414882f10c741b57ae95ad1cbcce0bd1ffae39f0
SHA5122d59d0dae694eed9f579efd9d4fc1ce3b7e92c0a885749949f49774c4175b41afcd0999aeabc23bce9f24cc112f7286470bed4ced277ec920d944eb285ee773f
-
Filesize
9KB
MD5ed7ab57a398ee0849c27f9e256c52913
SHA1b4007c9078b3d6205887b0d080bf62b77b274da0
SHA256a01c6a3b203c0c512e1118929a910070dbbc2490d8348646345e11e2c428d013
SHA51257b40ec66c2280bfcfe2fe445513da9ce50a8bcfa1d1fdce2f64b69a1855ac3756a1a3da731a9a7afda11ece231ca945fefa85c0e3cb33bc842060f7ae487b40
-
Filesize
9KB
MD5deec8d3b21d37ea885c7175f148396a8
SHA142467ddbfbfcf8971ffacdc66928cc760da69c4c
SHA256b8a411cbbdd0755a06c0e5e4b6e0eed3f6b72e5f24ac3663c93f562902f269d4
SHA5123b52807ee0a5953314297a640781a14231ddfe673c6030126c2f1ce6628b1a2b8a448cf15eccf0091b2cce6ae53af6cb408c49835efc743cd2ed306574182bfa
-
Filesize
9KB
MD5243eee688ba117416e3ec019e5b8d311
SHA19b7b653de38406ebdba1f1daa8f5b663ae9fe72c
SHA25644dc684e25264300684c718f74582757ec9fa4617ac028e241773f077b96744b
SHA512955d733484dda0d068c3a7f3fbe70cec9397244564034afa76b5b99b709a9dc5809e6522b446140f2ced3b40d010b3fc452c17a526462f55d347426bf54fd7c8
-
Filesize
9KB
MD554f83e1dc92500cc65bdf2dc1d9980d1
SHA14c4e83bf943d4225f1cd81efb753efe86fe2884f
SHA256e993ec58a88b9bde6eb677948f454c013024e3a523e29370555e6b3a5c0d4a97
SHA512e3f6fb8d00ce3e759132f8bbacfada9769892b53d4ef41ef7384713f4b3a232b6c143cd634b0590c00bbd0c8c36d6b1cde4a7aad8c643dd3deb003e014c7ce01
-
Filesize
99KB
MD564db955dfc40bf5c276bedc5e37ea0f0
SHA1acc9a93264fc2e1faca7ebcd583b5d4cd8e2a99f
SHA256461a98b12e045ce458c42d067a874d2c035b3f767d9f1c286ba241ad1cc2731b
SHA5121d7242bc176afd33d9c0ee55b7f14d563c7063ce28bca758340cb1fa9af42932a063a738f9dd41e8d2ed8ee319d1ba943fa2d80b1f32d5b6df752bb6e56be54d
-
Filesize
99KB
MD5301f1925af943771ce5c5954ba50d29b
SHA1e4433640985711c3e8fc6ceb968094bda02bc144
SHA2562462b03b5166965f621e9840f442a6fc4136cfb18d3263be64b930b372123e50
SHA512e5c01e6f108c4b2099c3bec065ea8c7a104fc1238a0b47c72460189bca88472b333e8f65b1d548abb7c60c110c9cb09928a6bbf3918c2dd1aaa88114e5911b8f
-
Filesize
21.6MB
MD578df1e75d0b8c039cb5032fde7025921
SHA19a0bd2ae450891a99f2f6bec25406f496ec84be4
SHA2564e37f43c5e04c5a5b270ff0bf9124ba9456f0e89ecca0a4a47117478ee54ba85
SHA512f9a335ce937f42f46098dccbb3f4307939142a82674620d1a04b9bb405860caa4bee6875ddc5fc94657390698a6fe0fa6a70ba9fae4baedbbb28d4c22b944508
-
Filesize
6.3MB
MD5f052e60f6435b39774b80595194ca1b3
SHA153b7d902e28b7f2c52079c8f49053a79939571a1
SHA256217440cefcf2bdb40cc0df4117dc63f6b405282d98fc1a203d6e7b5b6acd232a
SHA5127a0f635b7812873e92d6cbcd792e16740d1860e5f41ae12b60047abbe0a23758e9f222efa7006a99abc2788b0f40cb602cb6c5df9165417d0136bea909be0bb9
-
C:\Users\Admin\Downloads\LaTeTSeTuPPASoPeN9192\~△~LaTe$T░SeTuP░PA$S↳oPeN↳9192~△~\~△~LaTe$T░SeTuP░PA$S↳oPeN↳9192~△~.rar
Filesize21.6MB
MD5edc975e597e9b5323e6591963f460a43
SHA1c4b5d4b931b0faf20cda30db3043656533f5494d
SHA2564e31650af4153fbbca66ad76252790f932886b6333f94287f678812e5f2709c1
SHA5126b8ee1fbcf21ff20ff9544261c81bd10a9956c06ac941c0e0a8d9ecae1695dfc3576336eda1bd33adc66154c5f3326698f951af6cdd6c5c678577c596e222ac9