Analysis
-
max time kernel
150s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 17:26
Behavioral task
behavioral1
Sample
c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe
Resource
win10v2004-20240802-en
General
-
Target
c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe
-
Size
74KB
-
MD5
38f581a49b8c5b0934119cf5452ecdee
-
SHA1
df9ecdbc834d20b0089a337faa6cffeedb13ce16
-
SHA256
c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f
-
SHA512
96d79cc4e4193b76f770469a0938f8e16e86163dbbc7372288f1c1a0879d8fcd618b32ac949788a06ea763ab038369d6176ccc16d71d3c00bcb8418829fea229
-
SSDEEP
1536:2de5KBqfBlTytHtMFyMQUZDB3af1pHfLjva+x9rru4zppUcS:2dewBltcyMQUZDB3anjjvaO9rzppUt
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Client.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe -
Executes dropped EXE 3 IoCs
pid Process 2404 Client.exe 3664 Client.exe 832 Client.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Client.exe\" .." Client.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Client.exe\" .." Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 28 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Kills process with taskkill 8 IoCs
pid Process 4636 TASKKILL.exe 2408 TASKKILL.exe 5108 TASKKILL.exe 3276 TASKKILL.exe 5108 TASKKILL.exe 1840 TASKKILL.exe 4088 TASKKILL.exe 2892 TASKKILL.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2192 schtasks.exe 1924 schtasks.exe 3036 schtasks.exe 2572 schtasks.exe 4948 schtasks.exe 2948 schtasks.exe 3532 schtasks.exe 2056 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeDebugPrivilege 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe Token: SeDebugPrivilege 1840 TASKKILL.exe Token: SeDebugPrivilege 5108 TASKKILL.exe Token: SeDebugPrivilege 2404 Client.exe Token: SeDebugPrivilege 2892 TASKKILL.exe Token: SeDebugPrivilege 4088 TASKKILL.exe Token: SeDebugPrivilege 4636 TASKKILL.exe Token: SeDebugPrivilege 2408 TASKKILL.exe Token: SeDebugPrivilege 3664 Client.exe Token: 33 2404 Client.exe Token: SeIncBasePriorityPrivilege 2404 Client.exe Token: 33 2404 Client.exe Token: SeIncBasePriorityPrivilege 2404 Client.exe Token: 33 2404 Client.exe Token: SeIncBasePriorityPrivilege 2404 Client.exe Token: 33 2404 Client.exe Token: SeIncBasePriorityPrivilege 2404 Client.exe Token: 33 2404 Client.exe Token: SeIncBasePriorityPrivilege 2404 Client.exe Token: 33 2404 Client.exe Token: SeIncBasePriorityPrivilege 2404 Client.exe Token: 33 2404 Client.exe Token: SeIncBasePriorityPrivilege 2404 Client.exe Token: SeDebugPrivilege 5108 TASKKILL.exe Token: SeDebugPrivilege 3276 TASKKILL.exe Token: SeDebugPrivilege 832 Client.exe Token: 33 2404 Client.exe Token: SeIncBasePriorityPrivilege 2404 Client.exe Token: 33 2404 Client.exe Token: SeIncBasePriorityPrivilege 2404 Client.exe Token: 33 2404 Client.exe Token: SeIncBasePriorityPrivilege 2404 Client.exe Token: 33 2404 Client.exe Token: SeIncBasePriorityPrivilege 2404 Client.exe Token: 33 2404 Client.exe Token: SeIncBasePriorityPrivilege 2404 Client.exe Token: 33 2404 Client.exe Token: SeIncBasePriorityPrivilege 2404 Client.exe Token: 33 2404 Client.exe Token: SeIncBasePriorityPrivilege 2404 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2192 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 82 PID 2976 wrote to memory of 2192 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 82 PID 2976 wrote to memory of 2192 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 82 PID 2976 wrote to memory of 3036 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 84 PID 2976 wrote to memory of 3036 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 84 PID 2976 wrote to memory of 3036 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 84 PID 2976 wrote to memory of 5108 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 86 PID 2976 wrote to memory of 5108 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 86 PID 2976 wrote to memory of 5108 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 86 PID 2976 wrote to memory of 1840 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 87 PID 2976 wrote to memory of 1840 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 87 PID 2976 wrote to memory of 1840 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 87 PID 2976 wrote to memory of 4640 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 91 PID 2976 wrote to memory of 4640 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 91 PID 2976 wrote to memory of 4640 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 91 PID 2976 wrote to memory of 2572 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 93 PID 2976 wrote to memory of 2572 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 93 PID 2976 wrote to memory of 2572 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 93 PID 2976 wrote to memory of 2404 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 99 PID 2976 wrote to memory of 2404 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 99 PID 2976 wrote to memory of 2404 2976 c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe 99 PID 2404 wrote to memory of 1128 2404 Client.exe 100 PID 2404 wrote to memory of 1128 2404 Client.exe 100 PID 2404 wrote to memory of 1128 2404 Client.exe 100 PID 2404 wrote to memory of 4948 2404 Client.exe 102 PID 2404 wrote to memory of 4948 2404 Client.exe 102 PID 2404 wrote to memory of 4948 2404 Client.exe 102 PID 2404 wrote to memory of 2892 2404 Client.exe 103 PID 2404 wrote to memory of 2892 2404 Client.exe 103 PID 2404 wrote to memory of 2892 2404 Client.exe 103 PID 2404 wrote to memory of 4088 2404 Client.exe 104 PID 2404 wrote to memory of 4088 2404 Client.exe 104 PID 2404 wrote to memory of 4088 2404 Client.exe 104 PID 2404 wrote to memory of 5088 2404 Client.exe 111 PID 2404 wrote to memory of 5088 2404 Client.exe 111 PID 2404 wrote to memory of 5088 2404 Client.exe 111 PID 2404 wrote to memory of 2948 2404 Client.exe 113 PID 2404 wrote to memory of 2948 2404 Client.exe 113 PID 2404 wrote to memory of 2948 2404 Client.exe 113 PID 3664 wrote to memory of 1432 3664 Client.exe 116 PID 3664 wrote to memory of 1432 3664 Client.exe 116 PID 3664 wrote to memory of 1432 3664 Client.exe 116 PID 3664 wrote to memory of 3532 3664 Client.exe 118 PID 3664 wrote to memory of 3532 3664 Client.exe 118 PID 3664 wrote to memory of 3532 3664 Client.exe 118 PID 3664 wrote to memory of 4636 3664 Client.exe 120 PID 3664 wrote to memory of 4636 3664 Client.exe 120 PID 3664 wrote to memory of 4636 3664 Client.exe 120 PID 3664 wrote to memory of 2408 3664 Client.exe 122 PID 3664 wrote to memory of 2408 3664 Client.exe 122 PID 3664 wrote to memory of 2408 3664 Client.exe 122 PID 3664 wrote to memory of 3824 3664 Client.exe 125 PID 3664 wrote to memory of 3824 3664 Client.exe 125 PID 3664 wrote to memory of 3824 3664 Client.exe 125 PID 3664 wrote to memory of 2056 3664 Client.exe 127 PID 3664 wrote to memory of 2056 3664 Client.exe 127 PID 3664 wrote to memory of 2056 3664 Client.exe 127 PID 832 wrote to memory of 1184 832 Client.exe 130 PID 832 wrote to memory of 1184 832 Client.exe 130 PID 832 wrote to memory of 1184 832 Client.exe 130 PID 832 wrote to memory of 2192 832 Client.exe 132 PID 832 wrote to memory of 2192 832 Client.exe 132 PID 832 wrote to memory of 2192 832 Client.exe 132 PID 832 wrote to memory of 5108 832 Client.exe 134
Processes
-
C:\Users\Admin\AppData\Local\Temp\c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe"C:\Users\Admin\AppData\Local\Temp\c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe"1⤵
- Checks computer location settings
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYANP /F2⤵
- System Location Discovery: System Language Discovery
PID:2192
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe" /sc minute /mo 52⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3036
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵
- System Location Discovery: System Language Discovery
PID:4640
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f.exe" /sc minute /mo 12⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYANP /F3⤵
- System Location Discovery: System Language Discovery
PID:1128
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 53⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4948
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵
- System Location Discovery: System Language Discovery
PID:5088
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 13⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2948
-
-
-
C:\Users\Admin\AppData\Local\Temp\Client.exeC:\Users\Admin\AppData\Local\Temp\Client.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYANP /F2⤵
- System Location Discovery: System Language Discovery
PID:1432
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 52⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3532
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵
- System Location Discovery: System Language Discovery
PID:3824
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 12⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2056
-
-
C:\Users\Admin\AppData\Local\Temp\Client.exeC:\Users\Admin\AppData\Local\Temp\Client.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYANP /F2⤵
- System Location Discovery: System Language Discovery
PID:1184
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 52⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2192
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3276
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵
- System Location Discovery: System Language Discovery
PID:4536
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 12⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1924
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD5661cab77d3b907e8057f2e689e995af3
SHA15d1a0ee9c5ee7a7a90d56d00c10dc0e679bee01c
SHA2568f27f95ad7c09f2e05d7960e78ef8cd935c1262e9657883a75d70dcb877592d2
SHA5122523b316bd79fed0e9b3d73f46959f3dfe270cf950f34bd9d49fe4113a2ae46d0cd00224d848bc40c0d8c55449e2dccc4b4278ba4809c0ca9ede1ac75673fc67
-
Filesize
74KB
MD538f581a49b8c5b0934119cf5452ecdee
SHA1df9ecdbc834d20b0089a337faa6cffeedb13ce16
SHA256c59de4c104876a3bf2c0450ad7fb3b981ad5053260d950e5eb651a930de2520f
SHA51296d79cc4e4193b76f770469a0938f8e16e86163dbbc7372288f1c1a0879d8fcd618b32ac949788a06ea763ab038369d6176ccc16d71d3c00bcb8418829fea229