Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
5SilverBull...in.dll
windows7-x64
1SilverBull...in.dll
windows10-2004-x64
1SilverBull...et.exe
windows7-x64
3SilverBull...et.exe
windows10-2004-x64
10SilverBull...rn.dll
windows7-x64
1SilverBull...rn.dll
windows10-2004-x64
1SilverBull...re.dll
windows7-x64
1SilverBull...re.dll
windows10-2004-x64
1SilverBull...ss.exe
windows7-x64
1SilverBull...ss.exe
windows10-2004-x64
1SilverBull...re.dll
windows7-x64
1SilverBull...re.dll
windows10-2004-x64
1SilverBull...pf.dll
windows7-x64
1SilverBull...pf.dll
windows10-2004-x64
1SilverBull...rp.dll
windows7-x64
1SilverBull...rp.dll
windows10-2004-x64
1SilverBull...lf.dll
windows7-x64
1SilverBull...lf.dll
windows10-2004-x64
1SilverBull...47.dll
windows10-2004-x64
1SilverBull...GL.dll
windows7-x64
1SilverBull...GL.dll
windows10-2004-x64
1SilverBull...v2.dll
windows7-x64
1SilverBull...v2.dll
windows10-2004-x64
1SilverBull...ef.dll
windows7-x64
1SilverBull...ef.dll
windows10-2004-x64
1SilverBull...53.dll
windows7-x64
1SilverBull...53.dll
windows10-2004-x64
1SilverBull...52.dll
windows7-x64
1SilverBull...52.dll
windows10-2004-x64
1SilverBull...GL.dll
windows7-x64
1SilverBull...GL.dll
windows10-2004-x64
1SilverBull...re.dll
windows7-x64
3Analysis
-
max time kernel
149s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 21:33
Behavioral task
behavioral1
Sample
SilverBullet/Plugins/SilverBullet.Plugin.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SilverBullet/Plugins/SilverBullet.Plugin.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
SilverBullet/SilverBullet.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
SilverBullet/SilverBullet.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
SilverBullet/dll/x64/OpenCvSharpExtern.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
SilverBullet/dll/x64/OpenCvSharpExtern.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
SilverBullet/x64/CefSharp.BrowserSubprocess.Core.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
SilverBullet/x64/CefSharp.BrowserSubprocess.Core.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral9
Sample
SilverBullet/x64/CefSharp.BrowserSubprocess.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
SilverBullet/x64/CefSharp.BrowserSubprocess.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
SilverBullet/x64/CefSharp.Core.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
SilverBullet/x64/CefSharp.Core.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
SilverBullet/x64/CefSharp.Wpf.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
SilverBullet/x64/CefSharp.Wpf.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral15
Sample
SilverBullet/x64/CefSharp.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
SilverBullet/x64/CefSharp.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
SilverBullet/x64/chrome_elf.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
SilverBullet/x64/chrome_elf.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
SilverBullet/x64/d3dcompiler_47.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
SilverBullet/x64/libEGL.dll
Resource
win7-20240729-en
Behavioral task
behavioral21
Sample
SilverBullet/x64/libEGL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
SilverBullet/x64/libGLESv2.dll
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
SilverBullet/x64/libGLESv2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
SilverBullet/x64/libcef.dll
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
SilverBullet/x64/libcef.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
SilverBullet/x64/liblept1753.dll
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
SilverBullet/x64/liblept1753.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
SilverBullet/x64/libtesseract3052.dll
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
SilverBullet/x64/libtesseract3052.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
SilverBullet/x64/swiftshader/libEGL.dll
Resource
win7-20240704-en
Behavioral task
behavioral31
Sample
SilverBullet/x64/swiftshader/libEGL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
SilverBullet/x86/CefSharp.BrowserSubprocess.Core.dll
Resource
win7-20240903-en
General
-
Target
SilverBullet/SilverBullet.exe
-
Size
177KB
-
MD5
f5727612b5895d4002600521c57ddc8c
-
SHA1
795a6467fc1acbd7fac964870e40bb6cc39e4bf7
-
SHA256
cb63ac36d78c499e62c3778649a6032e4b0908a64e70282fc3ff27ff8ce281ac
-
SHA512
06f7ef882bfb818dfa0181fc4fad40269e129bcd262243bf2fdb50fa190369408dbbae6bead4bdced9df77576602d0a10ee47ba4ef4011c0103577ac5bf9048d
-
SSDEEP
3072:IbsSD+btEtcju69GGe3pv8zcLJc9Qe+L5tOd+0/qY:IbsSD+byYu6Te3V8zcLO9QRL5tM+iq
Malware Config
Extracted
remcos
SilverBullet
185.81.157.223:1010
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-8HUY6L
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3584 powershell.exe 1120 powershell.exe 1640 powershell.exe 1404 powershell.exe 2968 powershell.exe 852 powershell.exe 1280 powershell.exe 528 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation SilverBullet.exe -
Executes dropped EXE 4 IoCs
pid Process 4912 SilverBullet.exe 4484 SyncAppvPublishingServer.exe 1140 GatherNetworkInfo.exe 1720 GatherNetworkInfo.exe -
Loads dropped DLL 60 IoCs
pid Process 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe 4912 SilverBullet.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 21 raw.githubusercontent.com 22 raw.githubusercontent.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1140 set thread context of 1104 1140 GatherNetworkInfo.exe 109 PID 1720 set thread context of 1280 1720 GatherNetworkInfo.exe 111 -
resource yara_rule behavioral4/memory/2716-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral4/memory/2716-892-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral4/memory/2716-933-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SilverBullet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GatherNetworkInfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SyncAppvPublishingServer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SilverBullet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GatherNetworkInfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language assem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1892 schtasks.exe 2992 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3584 powershell.exe 3584 powershell.exe 1120 powershell.exe 1120 powershell.exe 1640 powershell.exe 1640 powershell.exe 1404 powershell.exe 1404 powershell.exe 2968 powershell.exe 2968 powershell.exe 852 powershell.exe 852 powershell.exe 1280 powershell.exe 1280 powershell.exe 528 powershell.exe 528 powershell.exe 1140 GatherNetworkInfo.exe 1140 GatherNetworkInfo.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3584 powershell.exe Token: SeDebugPrivilege 4912 SilverBullet.exe Token: SeDebugPrivilege 1120 powershell.exe Token: SeDebugPrivilege 1640 powershell.exe Token: SeDebugPrivilege 1404 powershell.exe Token: SeDebugPrivilege 2968 powershell.exe Token: SeDebugPrivilege 852 powershell.exe Token: SeDebugPrivilege 1280 powershell.exe Token: SeDebugPrivilege 528 powershell.exe Token: SeDebugPrivilege 1140 GatherNetworkInfo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4584 wrote to memory of 2716 4584 SilverBullet.exe 81 PID 4584 wrote to memory of 2716 4584 SilverBullet.exe 81 PID 4584 wrote to memory of 2716 4584 SilverBullet.exe 81 PID 4584 wrote to memory of 1208 4584 SilverBullet.exe 86 PID 4584 wrote to memory of 1208 4584 SilverBullet.exe 86 PID 4584 wrote to memory of 1208 4584 SilverBullet.exe 86 PID 4584 wrote to memory of 4912 4584 SilverBullet.exe 88 PID 4584 wrote to memory of 4912 4584 SilverBullet.exe 88 PID 4584 wrote to memory of 4912 4584 SilverBullet.exe 88 PID 1208 wrote to memory of 3584 1208 cmd.exe 90 PID 1208 wrote to memory of 3584 1208 cmd.exe 90 PID 1208 wrote to memory of 3584 1208 cmd.exe 90 PID 4584 wrote to memory of 3148 4584 SilverBullet.exe 93 PID 4584 wrote to memory of 3148 4584 SilverBullet.exe 93 PID 4584 wrote to memory of 3148 4584 SilverBullet.exe 93 PID 3148 wrote to memory of 1892 3148 cmd.exe 95 PID 3148 wrote to memory of 1892 3148 cmd.exe 95 PID 3148 wrote to memory of 1892 3148 cmd.exe 95 PID 1208 wrote to memory of 1120 1208 cmd.exe 96 PID 1208 wrote to memory of 1120 1208 cmd.exe 96 PID 1208 wrote to memory of 1120 1208 cmd.exe 96 PID 3148 wrote to memory of 2992 3148 cmd.exe 97 PID 3148 wrote to memory of 2992 3148 cmd.exe 97 PID 3148 wrote to memory of 2992 3148 cmd.exe 97 PID 1208 wrote to memory of 1640 1208 cmd.exe 98 PID 1208 wrote to memory of 1640 1208 cmd.exe 98 PID 1208 wrote to memory of 1640 1208 cmd.exe 98 PID 1208 wrote to memory of 1404 1208 cmd.exe 99 PID 1208 wrote to memory of 1404 1208 cmd.exe 99 PID 1208 wrote to memory of 1404 1208 cmd.exe 99 PID 1208 wrote to memory of 2968 1208 cmd.exe 100 PID 1208 wrote to memory of 2968 1208 cmd.exe 100 PID 1208 wrote to memory of 2968 1208 cmd.exe 100 PID 1208 wrote to memory of 852 1208 cmd.exe 101 PID 1208 wrote to memory of 852 1208 cmd.exe 101 PID 1208 wrote to memory of 852 1208 cmd.exe 101 PID 1208 wrote to memory of 1280 1208 cmd.exe 103 PID 1208 wrote to memory of 1280 1208 cmd.exe 103 PID 1208 wrote to memory of 1280 1208 cmd.exe 103 PID 1208 wrote to memory of 528 1208 cmd.exe 104 PID 1208 wrote to memory of 528 1208 cmd.exe 104 PID 1208 wrote to memory of 528 1208 cmd.exe 104 PID 1140 wrote to memory of 4336 1140 GatherNetworkInfo.exe 108 PID 1140 wrote to memory of 4336 1140 GatherNetworkInfo.exe 108 PID 1140 wrote to memory of 4336 1140 GatherNetworkInfo.exe 108 PID 1140 wrote to memory of 1104 1140 GatherNetworkInfo.exe 109 PID 1140 wrote to memory of 1104 1140 GatherNetworkInfo.exe 109 PID 1140 wrote to memory of 1104 1140 GatherNetworkInfo.exe 109 PID 1140 wrote to memory of 1104 1140 GatherNetworkInfo.exe 109 PID 1140 wrote to memory of 1104 1140 GatherNetworkInfo.exe 109 PID 1140 wrote to memory of 1104 1140 GatherNetworkInfo.exe 109 PID 1140 wrote to memory of 1104 1140 GatherNetworkInfo.exe 109 PID 1140 wrote to memory of 1104 1140 GatherNetworkInfo.exe 109 PID 1140 wrote to memory of 1104 1140 GatherNetworkInfo.exe 109 PID 1140 wrote to memory of 1104 1140 GatherNetworkInfo.exe 109 PID 1140 wrote to memory of 1104 1140 GatherNetworkInfo.exe 109 PID 1140 wrote to memory of 1104 1140 GatherNetworkInfo.exe 109 PID 1720 wrote to memory of 1280 1720 GatherNetworkInfo.exe 111 PID 1720 wrote to memory of 1280 1720 GatherNetworkInfo.exe 111 PID 1720 wrote to memory of 1280 1720 GatherNetworkInfo.exe 111 PID 1720 wrote to memory of 1280 1720 GatherNetworkInfo.exe 111 PID 1720 wrote to memory of 1280 1720 GatherNetworkInfo.exe 111 PID 1720 wrote to memory of 1280 1720 GatherNetworkInfo.exe 111 PID 1720 wrote to memory of 1280 1720 GatherNetworkInfo.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\SilverBullet\SilverBullet.exe"C:\Users\Admin\AppData\Local\Temp\SilverBullet\SilverBullet.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\SilverBullet\assem.exe"C:\Users\Admin\AppData\Local\Temp\SilverBullet\assem.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\DynamicUserFolder\Exclusion.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3584
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath "C:" -force3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath "C:\Users" -force3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Public"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath "C:\Users\Public" -force3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Public\DynamicUserFolder"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath "C:\Users\Public\DynamicUserFolder" -force3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:528
-
-
-
C:\Users\Public\DynamicUserFolder\SilverBullet.exe"C:\Users\Public\DynamicUserFolder\SilverBullet.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\DynamicUserFolder\TaskSch.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "SyncAppvPublishingServer" /tr "C:\Users\Public\DynamicUserFolder\SyncAppvPublishingServer.exe" /RL HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1892
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "GatherNetworkInfo" /TR "C:\Users\Public\DynamicUserFolder\GatherNetworkInfo.exe" /RL HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2992
-
-
-
C:\Users\Public\DynamicUserFolder\SyncAppvPublishingServer.exeC:\Users\Public\DynamicUserFolder\SyncAppvPublishingServer.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4484
-
C:\Users\Public\DynamicUserFolder\GatherNetworkInfo.exeC:\Users\Public\DynamicUserFolder\GatherNetworkInfo.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵PID:4336
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1104
-
-
C:\Users\Public\DynamicUserFolder\GatherNetworkInfo.exeC:\Users\Public\DynamicUserFolder\GatherNetworkInfo.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5d32be9fe5317d25cf5d630ee8266fa45
SHA1fd243380826972faee8879d26581d97494e29f01
SHA256108b6f6b20a55005343b0c8b68337301d645e3f8048fc845735d088e375a069c
SHA512694d5198094dbb69c42f791aaac0ef3d18c4351b167e41d88b412f8314a41ed28a22a92f5f48031196a323bd7d254fb1b71eff25bfc65b136354a3d657575ea5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
833B
MD54e8a985958177a96c5a3b23daf6eebbc
SHA1c3c45716355f397ac6c862cfdf08c4d9514c0bdf
SHA256a84a589ec6386427037f45a87b07b8dba789da804547d68ed7048de5ce4c2c2e
SHA512ad755edccd13a49e5b9e3c9b0b07c20cebb4711b27347987747b1d5a264081c0b6c153185c63d8f5ade8f67e64c23063c50424f84b8354d480120ca1744149bb
-
Filesize
2.1MB
MD5c38513df845b3fcb4f964b7e23c9811a
SHA1b013a1b935d9473bff96c02477fd051eaadca80e
SHA2563b724600e027320ed262572604bc31f213bc0e233a52de368d4a8a493f68ec8b
SHA5124f7364adddfbdf76efbe7345921339b65083fe75c1ad1e4db7e42f1d87e8c432fcaaebfb512232e661ae39a651b7a23ae76bc6f968371376b5149da188225ba8
-
Filesize
3KB
MD5a68ee3d8a0764470073484ec28ec8e91
SHA149ccefd629233d46635f1d6b8764c0677f368307
SHA256296ac5cc7f45e3c0c08e0d35846263cff5b33cc9c9614a0508ddb91b353d52d0
SHA512095321a6d4cc8e1179113d958a001bb77c094585033bf78703eb7afac3766b135bb6593ec52889a3c136f72277324b6c299361217d4efbe52b0fec3425c87a1b
-
Filesize
95KB
MD5de9dbbe708a35baa84dddb61066a68a7
SHA116cc77bf5a0709b2343d7d4a68791c21a48b0e5c
SHA25672e5f45ff10cf78298be28a706214e8af96f5165294aa1db77820a27fa85143a
SHA51270579920debbe302b96058ad1c79a595b63af6ed369385a210b91bf7f3220d92f93a2bbf3e25d28a6d783ccda007df9ae6364671c0fc7778564ae71bbeac1031
-
Filesize
121KB
MD501fb96e4876441feaedf92a5cbe8bb0b
SHA1faae8c94055f8311293c8a00b9b9cf53cd5a17bb
SHA256eb1b67954ac21c77eb4086939ac4e895cac5bd4425fb6964ac56e3298a392d74
SHA5121820760f46e38ba95d75fe516934aedac8102517f203f7f2b1be6e994f9f285b728036be8e94445993c0c1247dd5d9e1eb4ee0cd7ada7a029f6863af00a3a124
-
Filesize
604KB
MD5ecd9c594b35bead0588818206428ab49
SHA165694ab8bfda267bf3a066e1823d837dcca10f95
SHA25686ff97015da0c2802b1c1c35d4e9c3c21cb024258557eff9cade16a9d58bd34b
SHA512c9740b397ab68406a0a8f6a334631484c4daf61968bb9a1ececb9f797d63d0da5a32956fc9186cad3474d6543171dee01cdd93c077d2563ae99b836b3a44bf3e
-
Filesize
347KB
MD525b242d00c6c32e1f437eb2064ea2e29
SHA13712bd78c80a237dd804ec77c64498defde12e94
SHA256e72acddf47586bc0999d598e3bd125a254bb6f4ae151c076993304f6e31fbbed
SHA512f1ca54008290f67825f4aa0c8f78476d0e4ebb3b7f50c338f51c87a96b0d25457496fe6062aa57e401c444f5aa80df8e6b97c2e681e699905f3dc39200d235d7
-
Filesize
18KB
MD5d8d0b8d00506ecc95640b7e9cbcb3b8a
SHA1a009862a014c4ef067f8c3312fe6015efc04f858
SHA2560d814872af90f2f4d956b699f9eb1637de7fa32988773fd939756bb43e8c3d7f
SHA51267537e9f5696c8658881fb068bd4a5c130de242567b1ab57bc957d0340aca80ab499d019918ccfa4c6d06abe7a53f15891cad75b41f3c89032a7d361c80276c5
-
Filesize
2.2MB
MD5fa6ad992cc5d3ec9008c5912e92f443d
SHA1300ab64ae847abe68fee18ddfa72870357c957e5
SHA256ff5c33dc3dfd1f1bf5e44438bcb29caf7a7c3b49f214ae7ba69bc2f5346486e5
SHA512e1c129c2560475e6334a8b12a4502d0055bad5558ef6045d0d79e4be6db793c92117da6c2ff8c3f90d1219d0bbef3786a8c0515cafda061e970a348281435e9e
-
Filesize
809KB
MD58124689c2181e16039e960892b478d30
SHA1791a3dab60bbf8ca69d352e1e7cce6b61162661c
SHA256a63470d3a200f55ab1a05071ace9937d347e51b4bcbad1118eb5ab54225e37f1
SHA5121da1feb4c1f7fa89d177e18ab040a848562e48072ade0566bf1c7332f4600aca6cae6f12c74e2ab29376f387d0765cbcec2cf922162bac2877279bb18d050fae
-
Filesize
4.0MB
MD5b1434e6f03143c0fdea98c0a2a7d69a7
SHA1a3fb3aba0df7fbf80c4a56273cde461c0aeff41f
SHA2561e181cf16e93382399fdc7224000259b178ffce6c6dce5ab791e318634520ca4
SHA5129784e9c9cb58e8b9ca914b06ac2dcbececf4783fa4897ace016d0a1140e9f79671b324ca20b506c1e4aaa695470a4a9a50d8c47e01108bcca17b001bd5677ed5
-
Filesize
295KB
MD50b3fa388485ac78ef83d1221ba6693b7
SHA119c8555dbe8566b91a0344658422bac8f5933e6b
SHA2569fa38197eed5ca1fac2d056fcfd2767a74648bc836725d255477b251567badb6
SHA5124969bd704128cbc091bb40f8575690c7479fe2b54048009c6eeb91c1f1a0100d58195d62243712f6fc1d4dcbb4d227596e09e81c45de0b1c7d656ccba65a2d5e
-
Filesize
7.8MB
MD55cea9e8224b3b065bd872e6a319c4afc
SHA1ff39e380d646042bb2dcb3f00b753532a5a327de
SHA2569b24e7377cf03ed93cd76c4e11330e2c67cc42e2875a97fa50b9a036a005f75d
SHA5127ac8e8f4c5de5b6b376315960235fab7199da8118cadf5d49adb03ce22c891311a0e614cb037c2282161ae33257fb460e0bc51deb4468f5d2f2a028274fa832f
-
Filesize
685KB
MD5081d9558bbb7adce142da153b2d5577a
SHA17d0ad03fbda1c24f883116b940717e596073ae96
SHA256b624949df8b0e3a6153fdfb730a7c6f4990b6592ee0d922e1788433d276610f3
SHA5122fdf035661f349206f58ea1feed8805b7f9517a21f9c113e7301c69de160f184c774350a12a710046e3ff6baa37345d319b6f47fd24fbba4e042d54014bee511
-
Filesize
5KB
MD5df520b7aee6267a76741fca02e9318e7
SHA116e7ba66e219808c9d29713386c6f68b97a4b77e
SHA256b06a99e6984844d94870f0dfdb1884314ae69d9ac08ab6a08a80d4ef64da298d
SHA512265bf5f715d380d60400014f54ecba4788ec6274a3cbf3cc70c69301a4e47ece2cd4056ba21f203179c9780187a3bc41fb329ad96f36993a70afc2d8c89838a0
-
Filesize
420KB
MD5fe77bc0bb856f5718aa2b1b758737ebd
SHA17343cacea90cb4e32aa5461db2976d22938146f3
SHA25675698a172910c48dee7373e51d3161553ebbe51af4b603e3e3083c0de5ab7f4c
SHA51217ea624ea3e7ce1fa6e57a13ac560616c6587799262deadf154468d5485c32387eb5ddbf82d50ba01e715a3019980d08e0ca264924efad877ba60129e139e390
-
Filesize
6KB
MD5042a3933a857f459845a2368c5b144b4
SHA18a0604bce7bf17622c32235461c1e4d5dd806155
SHA2565884e69c2fe1421470dc841d03fb981385eea77d22f9ba4b92fe144024fbbc2f
SHA512e8074f4200b86d94f558eb0698c2094e4b974d795bf26b85914e2a431663bc80fab45b6f925c9bbb76ece5efb93a2473b5f88963e03b29bf5e5e6d0ab4d04657
-
Filesize
106KB
MD59722713e648f42b57299e9d2cf3d5c1a
SHA1a4d0dc4f09ce84a33f1aa3e0c5cb4ae131f9fb0c
SHA256bc3a78eb4df2fd5b39244fa0586cc0a82fe3d0e185d151e6c340c53072a61872
SHA512f6bb5724dfc46476e94448ecb4650ad23197ca21965edf923e5d8bf51a31a707c058bca6cbac8e40e324bb54944da4129659dc2d2fc965e260bd40123a8aeebb
-
Filesize
92KB
MD522d9d032858972b8ee628fa818ab04db
SHA16eeae133e394292c6c349f838114c2a39dfe8357
SHA256e3d7f794442d9dbe99f5d578c0bc8d9e3198fe4055cf5581fc1de78085967c50
SHA5126899b2650aafd1e88049303c7ee26ff7e0dfe201d8a7188386ef2354deeb32f611bb4b73a02be9127fc96d5b4d37cab9bdbec3cfcb3bf4cada43170ac4349e0f
-
Filesize
191KB
MD5a8c46978a7a24944f1e12f768481986d
SHA1812c33e4e3d4a6489ab35635627231efa3fd4698
SHA2565e31e7ab6b95656744525008f0cc576e3900904e789238d712c131101b6211d4
SHA5121a23a6d16ca97196fa388221b713eda4b0cf8d3a351c0e39c957903b79b1a2750f8f38ba5beff283c47d4a2ba16060829961ad24d9e7986375c0f82b3708de49
-
Filesize
123KB
MD5775a4ada74364a22cf340d1d82334f77
SHA1912456f65d4ecfa9a0094b386d8dd8fb06f9c41f
SHA2567936fc54786e8370c37cd89117545d8901a4bcd6c06e2a192db8abb4ddb087ec
SHA5120e55ea07b0482af8db29686495a5b5f3c0a3c1c05343f73bb02dd38c0f89999a1d7fe74864b8fcac1da7daa4b18848bdf6ba4a1fe31baff01620f59933c6f692
-
Filesize
456KB
MD5195ed09e0b4f3b09ea4a3b67a0d3f396
SHA101a250631397c93c4aab9a777a86e39fd8d84f09
SHA256aef9fcbb874fc82e151e32279330061f8f22a77c05f583a0cb5e5696654ac456
SHA512b801c03efa3e8079366a7782d2634a3686d88f64c3c31a03aa5ce71b7bf472766724d209290c231d55da89dd4f03bd1c0153ffeb514e1d5d408cc2c713cd4098
-
Filesize
244KB
MD57379936cac71973885587a3bc6fbb70b
SHA1e72fec39314d7eb75f13c1ff0459515d95dd910c
SHA256fb06ffceb4f8789c893d2f292e5810927dd7266d3bad68df2cedb8775500e8be
SHA512d9da358bcc134232f6418d49fe98c427ad49fe8a212a2f166fcbf1718d0a8f8b0fa055caec30b267c6e4b1b4d687f08394830e3fadbae812c4b255abdf8c7b7a