Analysis
-
max time kernel
146s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 17:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/fdev0307/Solara-Executor/releases/download/RelV4/Update.rar
Resource
win10v2004-20240802-en
General
-
Target
https://github.com/fdev0307/Solara-Executor/releases/download/RelV4/Update.rar
Malware Config
Extracted
rhadamanthys
https://135.181.4.162:2423/97e9fc994198e76/khfbwt7l.srg7f
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
aspnet_regiis.exedescription pid process target process PID 1216 created 2540 1216 aspnet_regiis.exe sihost.exe -
Executes dropped EXE 2 IoCs
Processes:
Launch.exeLaunch.exepid process 4420 Launch.exe 3468 Launch.exe -
Loads dropped DLL 2 IoCs
Processes:
Launch.exeLaunch.exepid process 4420 Launch.exe 3468 Launch.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Launch.exeLaunch.exedescription pid process target process PID 4420 set thread context of 1216 4420 Launch.exe aspnet_regiis.exe PID 3468 set thread context of 3144 3468 Launch.exe aspnet_regiis.exe -
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4940 1216 WerFault.exe aspnet_regiis.exe 4864 1216 WerFault.exe aspnet_regiis.exe 3668 3144 WerFault.exe aspnet_regiis.exe 5072 3144 WerFault.exe aspnet_regiis.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Launch.exeaspnet_regiis.exeopenwith.exeLaunch.exeaspnet_regiis.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 3 IoCs
Processes:
msedge.exeOpenWith.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exeaspnet_regiis.exeopenwith.exemsedge.exepid process 5028 msedge.exe 5028 msedge.exe 2484 msedge.exe 2484 msedge.exe 2024 identity_helper.exe 2024 identity_helper.exe 2588 msedge.exe 2588 msedge.exe 1216 aspnet_regiis.exe 1216 aspnet_regiis.exe 5004 openwith.exe 5004 openwith.exe 5004 openwith.exe 5004 openwith.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid process 772 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
7zG.exedescription pid process Token: SeRestorePrivilege 4708 7zG.exe Token: 35 4708 7zG.exe Token: SeSecurityPrivilege 4708 7zG.exe Token: SeSecurityPrivilege 4708 7zG.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
msedge.exepid process 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe -
Suspicious use of SetWindowsHookEx 42 IoCs
Processes:
OpenWith.exeOpenWith.exepid process 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 772 OpenWith.exe 3388 OpenWith.exe 3388 OpenWith.exe 3388 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2484 wrote to memory of 2008 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 2008 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3464 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 5028 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 5028 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3572 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3572 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3572 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3572 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3572 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3572 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3572 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3572 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3572 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3572 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3572 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3572 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3572 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3572 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3572 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3572 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3572 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3572 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3572 2484 msedge.exe msedge.exe PID 2484 wrote to memory of 3572 2484 msedge.exe msedge.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2540
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/fdev0307/Solara-Executor/releases/download/RelV4/Update.rar1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce0eb46f8,0x7ffce0eb4708,0x7ffce0eb47182⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,5366225115224203768,197320427756943736,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,5366225115224203768,197320427756943736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,5366225115224203768,197320427756943736,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5366225115224203768,197320427756943736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5366225115224203768,197320427756943736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,5366225115224203768,197320427756943736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,5366225115224203768,197320427756943736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5366225115224203768,197320427756943736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5366225115224203768,197320427756943736,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5366225115224203768,197320427756943736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5366225115224203768,197320427756943736,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2096,5366225115224203768,197320427756943736,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5788 /prefetch:82⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5366225115224203768,197320427756943736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2096,5366225115224203768,197320427756943736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,5366225115224203768,197320427756943736,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:720
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3900
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:772
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2312
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3388
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Update\" -ad -an -ai#7zMap9246:74:7zEvent224431⤵
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
C:\Users\Admin\Downloads\Update\Update_25_09\Launch.exe"C:\Users\Admin\Downloads\Update\Update_25_09\Launch.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4420 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 5883⤵
- Program crash
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 6043⤵
- Program crash
PID:4864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1216 -ip 12161⤵PID:1664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1216 -ip 12161⤵PID:5016
-
C:\Users\Admin\Downloads\Update\Update_25_09\Launch.exe"C:\Users\Admin\Downloads\Update\Update_25_09\Launch.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3468 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 5763⤵
- Program crash
PID:3668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 6003⤵
- Program crash
PID:5072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3144 -ip 31441⤵PID:2736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3144 -ip 31441⤵PID:3732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
265B
MD5f5cd008cf465804d0e6f39a8d81f9a2d
SHA16b2907356472ed4a719e5675cc08969f30adc855
SHA256fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d
SHA512dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d
-
Filesize
5KB
MD52710d323a90d785ea4e62adedf855c27
SHA1a274501a37323f3a91c460bed915a525b7845752
SHA25626680d2bf66983ead6c551a89f8ca5b4dabfe6149d44fb721e812ceea88b2c8e
SHA512b29de57f54c61d3055eef8afd77ee5190b636d9dd5a38d7fc5465b8f9161c285fa4362bfbb8a02b729a5f4cd147a8c933008c672356e2115a5445f024785e7b9
-
Filesize
6KB
MD50bc7b02cbd0c7ab5d6ebc0d203c6220b
SHA16d1d1c72be83a55f6d878dcc42dfcdd8e67e687b
SHA2562d0e409154f8b26aaede067ed8e0b7229df2e32baaab2a3cc2f55e1632a7b45c
SHA51297c1614e811c5517c44e77f86c01412db323bc8ed2f90afc322cfa055cbf28343931734d6acf5d2ad0c35e21fb221ae89e3dbb22cdd407fb62db3ffbc0aa0943
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD529c3dffba42d70f54d1ee7e684511ebb
SHA100af4b3c352b3f375074c85624af173f51876247
SHA25638ccb03a65c3e6d57331f0b892dbdb31b07d87aef0422bcf515fcbc27929251a
SHA5122075800d1a218cf51c350767324aea40adb9c8c1ff584f58e5f20854b0d83c3de88f11405e8c587e49134831c6c58fc9c5e365a9b68fff9e5d1cf36b9c2103ee
-
Filesize
10KB
MD5bfddcb118d7c5dfd82bf1e2b6f3a13eb
SHA1bd20b56bdbcb9ff3acf0a84f5090b62cec39fa5c
SHA25616af607f84d30cbe8c4d7b1d416f0851a3e56a8656696263654857043ce430ed
SHA512c1eebdede87f791d8add24a5e9f2d2ee90aa433ba97de378ec13809e47acc307c81e874f9cbcf87df337b047801806c7c05cb8198dc3b64b842a47dc6cbebd6d
-
Filesize
668KB
MD5f46bf116677d217ca5819a9f7e1a9483
SHA112f62ddb92151213e0e6f7b2a7ad45b06ed1588a
SHA256fed1c7291e49a20520fb02ddb2fe021052df5058ad086556fed5a454fc5f3834
SHA512b111440816d80f4d3fe1d59d12356e833e1924e7379ebdd03c45b88d1c45ac3a9b44f040fc5e9c75850fd88ed83d87e1a35bb5119dc5dd318256043a185fbe38
-
Filesize
49.6MB
MD5a6fa6b398ceb5b739918d02aaf2dc03f
SHA1f1c4078a137d1f6cac7c620590cea8aac85b2d19
SHA2561f8de3e525a99a48d959fb6a6bc58509ae9872f2a91b66ae93dcb40a823a4049
SHA51215cef048ba90a2aba963731a532744c83105b4bdef3a019d50d0d7c4fac4cc114b8b2ea13089503874ee4e51d110a0be3c0e505e145267a4c78804c14c49340e
-
Filesize
456KB
MD5b0fbf1245c0371cfe882573167e6614c
SHA1b03b075e465809207ec8aa24f4f1d2f499a6a4e2
SHA2566fea8f0cbb1728a04604197ef12c5d8b9f39b7faee57e724b08ce6e7af7de28b
SHA5127fc46e2d75ed08e80c8fbafb511532248a33bc0fda46c4ed2cf3cacc82bb16423f36f4fc6a20c1fd91f006cff2f4012f6901daf76c3d9bde7f8a314b3f78b909
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e