Analysis
-
max time kernel
117s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
59997df83c0441bbf006f018ae2d8637a9aa27fbb563cd6ae7873843db1b6810N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
59997df83c0441bbf006f018ae2d8637a9aa27fbb563cd6ae7873843db1b6810N.exe
Resource
win10v2004-20240802-en
General
-
Target
59997df83c0441bbf006f018ae2d8637a9aa27fbb563cd6ae7873843db1b6810N.exe
-
Size
2.6MB
-
MD5
07916535045b76a5bc3e64ef51897d00
-
SHA1
bcd3ebe4ad104bdeb0186cb5ffff3b41151aa01b
-
SHA256
59997df83c0441bbf006f018ae2d8637a9aa27fbb563cd6ae7873843db1b6810
-
SHA512
8de96e1eb3d2b6c9fc6c0ce749873a67ad80b1385ec3e8f01ba5d0ce3eaadbb340808ca16fb8199bc655c759924f043209a4695e7d29e5a1d264c04c0030004f
-
SSDEEP
24576:ObCj2sObHtqQ4QEfCr7w7yvuqqNq8FroaSaPXRackmrM4Biq7MhLv9GImmVfq4ea:ObCjPKNqQEfsw43qtmVfq4n
Malware Config
Extracted
Protocol: smtp- Host:
smtp.mail.me.com - Port:
587 - Username:
[email protected] - Password:
RICHARD205lord
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2256 jhdfkldfhndfkjdfnbfklfnf.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts cvtres.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jhdfkldfhndfkjdfnbfklfnf = "C:\\ProgramData\\jhdfkldfhndfkjdfnbfklfnf.exe" 59997df83c0441bbf006f018ae2d8637a9aa27fbb563cd6ae7873843db1b6810N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jhdfkldfhndfkjdfnbfklfnf = "C:\\ProgramData\\jhdfkldfhndfkjdfnbfklfnf.exe" jhdfkldfhndfkjdfnbfklfnf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 icanhazip.com 30 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x00070000000234fa-3.dat autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2256 set thread context of 2676 2256 jhdfkldfhndfkjdfnbfklfnf.exe 90 PID 2676 set thread context of 1628 2676 RegAsm.exe 93 PID 2676 set thread context of 3320 2676 RegAsm.exe 95 PID 2676 set thread context of 444 2676 RegAsm.exe 97 -
resource yara_rule behavioral2/memory/1628-15-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/1628-17-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/1628-16-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/1628-22-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/3320-26-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3320-28-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3320-30-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3320-27-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\59997df83c0441bbf006f018ae2d8637a9aa27fbb563cd6ae7873843db1b6810N.exe:Zone.Identifier:$DATA 59997df83c0441bbf006f018ae2d8637a9aa27fbb563cd6ae7873843db1b6810N.exe File created C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe:Zone.Identifier:$DATA jhdfkldfhndfkjdfnbfklfnf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59997df83c0441bbf006f018ae2d8637a9aa27fbb563cd6ae7873843db1b6810N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhdfkldfhndfkjdfnbfklfnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\59997df83c0441bbf006f018ae2d8637a9aa27fbb563cd6ae7873843db1b6810N.exe:Zone.Identifier:$DATA 59997df83c0441bbf006f018ae2d8637a9aa27fbb563cd6ae7873843db1b6810N.exe File created C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe:Zone.Identifier:$DATA jhdfkldfhndfkjdfnbfklfnf.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 19 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4868 schtasks.exe 4868 schtasks.exe 1252 schtasks.exe 2336 schtasks.exe 4852 schtasks.exe 4956 schtasks.exe 4652 schtasks.exe 3612 schtasks.exe 4472 schtasks.exe 3532 schtasks.exe 4508 schtasks.exe 2720 schtasks.exe 2688 schtasks.exe 872 schtasks.exe 2940 schtasks.exe 4876 schtasks.exe 368 schtasks.exe 1596 schtasks.exe 3112 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 4952 59997df83c0441bbf006f018ae2d8637a9aa27fbb563cd6ae7873843db1b6810N.exe 4952 59997df83c0441bbf006f018ae2d8637a9aa27fbb563cd6ae7873843db1b6810N.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2676 RegAsm.exe 2676 RegAsm.exe 2676 RegAsm.exe 2676 RegAsm.exe 2676 RegAsm.exe 2676 RegAsm.exe 2676 RegAsm.exe 2676 RegAsm.exe 2676 RegAsm.exe 2676 RegAsm.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe 2256 jhdfkldfhndfkjdfnbfklfnf.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2676 RegAsm.exe Token: SeDebugPrivilege 1628 cvtres.exe Token: SeDebugPrivilege 3320 cvtres.exe Token: SeDebugPrivilege 444 cvtres.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2676 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4952 wrote to memory of 2256 4952 59997df83c0441bbf006f018ae2d8637a9aa27fbb563cd6ae7873843db1b6810N.exe 89 PID 4952 wrote to memory of 2256 4952 59997df83c0441bbf006f018ae2d8637a9aa27fbb563cd6ae7873843db1b6810N.exe 89 PID 4952 wrote to memory of 2256 4952 59997df83c0441bbf006f018ae2d8637a9aa27fbb563cd6ae7873843db1b6810N.exe 89 PID 2256 wrote to memory of 2676 2256 jhdfkldfhndfkjdfnbfklfnf.exe 90 PID 2256 wrote to memory of 2676 2256 jhdfkldfhndfkjdfnbfklfnf.exe 90 PID 2256 wrote to memory of 2676 2256 jhdfkldfhndfkjdfnbfklfnf.exe 90 PID 2256 wrote to memory of 2676 2256 jhdfkldfhndfkjdfnbfklfnf.exe 90 PID 2256 wrote to memory of 2676 2256 jhdfkldfhndfkjdfnbfklfnf.exe 90 PID 2256 wrote to memory of 4868 2256 jhdfkldfhndfkjdfnbfklfnf.exe 91 PID 2256 wrote to memory of 4868 2256 jhdfkldfhndfkjdfnbfklfnf.exe 91 PID 2256 wrote to memory of 4868 2256 jhdfkldfhndfkjdfnbfklfnf.exe 91 PID 2676 wrote to memory of 1628 2676 RegAsm.exe 93 PID 2676 wrote to memory of 1628 2676 RegAsm.exe 93 PID 2676 wrote to memory of 1628 2676 RegAsm.exe 93 PID 2676 wrote to memory of 1628 2676 RegAsm.exe 93 PID 2676 wrote to memory of 1628 2676 RegAsm.exe 93 PID 2676 wrote to memory of 1628 2676 RegAsm.exe 93 PID 2676 wrote to memory of 1628 2676 RegAsm.exe 93 PID 2676 wrote to memory of 3320 2676 RegAsm.exe 95 PID 2676 wrote to memory of 3320 2676 RegAsm.exe 95 PID 2676 wrote to memory of 3320 2676 RegAsm.exe 95 PID 2676 wrote to memory of 3320 2676 RegAsm.exe 95 PID 2676 wrote to memory of 3320 2676 RegAsm.exe 95 PID 2676 wrote to memory of 3320 2676 RegAsm.exe 95 PID 2676 wrote to memory of 3320 2676 RegAsm.exe 95 PID 2676 wrote to memory of 444 2676 RegAsm.exe 97 PID 2676 wrote to memory of 444 2676 RegAsm.exe 97 PID 2676 wrote to memory of 444 2676 RegAsm.exe 97 PID 2676 wrote to memory of 444 2676 RegAsm.exe 97 PID 2676 wrote to memory of 444 2676 RegAsm.exe 97 PID 2676 wrote to memory of 444 2676 RegAsm.exe 97 PID 2256 wrote to memory of 368 2256 jhdfkldfhndfkjdfnbfklfnf.exe 101 PID 2256 wrote to memory of 368 2256 jhdfkldfhndfkjdfnbfklfnf.exe 101 PID 2256 wrote to memory of 368 2256 jhdfkldfhndfkjdfnbfklfnf.exe 101 PID 2256 wrote to memory of 1596 2256 jhdfkldfhndfkjdfnbfklfnf.exe 103 PID 2256 wrote to memory of 1596 2256 jhdfkldfhndfkjdfnbfklfnf.exe 103 PID 2256 wrote to memory of 1596 2256 jhdfkldfhndfkjdfnbfklfnf.exe 103 PID 2256 wrote to memory of 3112 2256 jhdfkldfhndfkjdfnbfklfnf.exe 105 PID 2256 wrote to memory of 3112 2256 jhdfkldfhndfkjdfnbfklfnf.exe 105 PID 2256 wrote to memory of 3112 2256 jhdfkldfhndfkjdfnbfklfnf.exe 105 PID 2256 wrote to memory of 872 2256 jhdfkldfhndfkjdfnbfklfnf.exe 107 PID 2256 wrote to memory of 872 2256 jhdfkldfhndfkjdfnbfklfnf.exe 107 PID 2256 wrote to memory of 872 2256 jhdfkldfhndfkjdfnbfklfnf.exe 107 PID 2256 wrote to memory of 2940 2256 jhdfkldfhndfkjdfnbfklfnf.exe 109 PID 2256 wrote to memory of 2940 2256 jhdfkldfhndfkjdfnbfklfnf.exe 109 PID 2256 wrote to memory of 2940 2256 jhdfkldfhndfkjdfnbfklfnf.exe 109 PID 2256 wrote to memory of 4508 2256 jhdfkldfhndfkjdfnbfklfnf.exe 111 PID 2256 wrote to memory of 4508 2256 jhdfkldfhndfkjdfnbfklfnf.exe 111 PID 2256 wrote to memory of 4508 2256 jhdfkldfhndfkjdfnbfklfnf.exe 111 PID 2256 wrote to memory of 3612 2256 jhdfkldfhndfkjdfnbfklfnf.exe 113 PID 2256 wrote to memory of 3612 2256 jhdfkldfhndfkjdfnbfklfnf.exe 113 PID 2256 wrote to memory of 3612 2256 jhdfkldfhndfkjdfnbfklfnf.exe 113 PID 2256 wrote to memory of 4472 2256 jhdfkldfhndfkjdfnbfklfnf.exe 115 PID 2256 wrote to memory of 4472 2256 jhdfkldfhndfkjdfnbfklfnf.exe 115 PID 2256 wrote to memory of 4472 2256 jhdfkldfhndfkjdfnbfklfnf.exe 115 PID 2256 wrote to memory of 3532 2256 jhdfkldfhndfkjdfnbfklfnf.exe 117 PID 2256 wrote to memory of 3532 2256 jhdfkldfhndfkjdfnbfklfnf.exe 117 PID 2256 wrote to memory of 3532 2256 jhdfkldfhndfkjdfnbfklfnf.exe 117 PID 2256 wrote to memory of 2336 2256 jhdfkldfhndfkjdfnbfklfnf.exe 119 PID 2256 wrote to memory of 2336 2256 jhdfkldfhndfkjdfnbfklfnf.exe 119 PID 2256 wrote to memory of 2336 2256 jhdfkldfhndfkjdfnbfklfnf.exe 119 PID 2256 wrote to memory of 2720 2256 jhdfkldfhndfkjdfnbfklfnf.exe 121 PID 2256 wrote to memory of 2720 2256 jhdfkldfhndfkjdfnbfklfnf.exe 121 PID 2256 wrote to memory of 2720 2256 jhdfkldfhndfkjdfnbfklfnf.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\59997df83c0441bbf006f018ae2d8637a9aa27fbb563cd6ae7873843db1b6810N.exe"C:\Users\Admin\AppData\Local\Temp\59997df83c0441bbf006f018ae2d8637a9aa27fbb563cd6ae7873843db1b6810N.exe"1⤵
- Adds Run key to start application
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exeC:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe03⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp1F89.tmp"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp221A.tmp"4⤵
- Accesses Microsoft Outlook accounts
- Suspicious use of AdjustPrivilegeToken
PID:3320
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp2289.tmp"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:444
-
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4868
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:368
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1596
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3112
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:872
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2940
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4508
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3612
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4472
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3532
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2336
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2720
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4852
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2688
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4868
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1252
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4876
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4956
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4652
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5581203107b70663cb5ff293f7718a32c
SHA178ee8c2dd7004dca9274a022d7d4ae4a3853ad28
SHA25683cf216fc3794e284a2f3d007534efae2dceb0a5a002f2805be8748387781611
SHA512fbc76913f3698aa4dcb4b32d4b345528c3272d70485604e10fbe443f3f6f71170f03e6ae0b26de49644c27553755d8a148355b7d61047f0a40c579339dfc8c13
-
Filesize
1KB
MD5b0cc2e6f2d8036c9b5fef218736fa9c9
SHA164fd3017625979c95ba09d7cbea201010a82f73f
SHA256997aceeb78143e057d4ea0ed699db3cc1c723f699b4532663b7b85c83baa5c50
SHA512a1fe80b2971c4d1141a594f27eaea61500bf701cd1b8fbdb5ac2204a63c8ef862344f8c30f65ce769f0acf2b0718ed33a02744dd1a152c4a62a5318333d29b9b
-
Filesize
400B
MD5de4e5ff058882957cf8a3b5f839a031f
SHA10b3d8279120fb5fa27efbd9eee89695aa040fc24
SHA256ef54f46b9f1e342fc12e035ae94f57c61ea4e8be4e116f0a1c6f86310f400f49
SHA512a6b0d557e9eec4e56630e5ba64495df318f4fd959fffbdcbf77831185b067906917c9117a0ecd6ac817c7860d5d831cce15820d715657d81e2d817d9fab9fb72
-
Filesize
391B
MD53525ea58bba48993ea0d01b65ea71381
SHA11b917678fdd969e5ee5916e5899e7c75a979cf4d
SHA256681bcee53cf679ac674e700136f9229b9184fe60ed6410dbd7a33d462ed13ae2
SHA5125aad8dca43ec85882daf50c469bd04dcf0b62affc8bc605b3e289496a2679d4d548fea8bb0aea7080bbfbcdcab9d275fc6797b9c95b64f9f97ecf79583a83986