Analysis
-
max time kernel
245s -
max time network
246s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
xeno.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
xeno.html
Resource
win10v2004-20240802-en
General
-
Target
xeno.html
-
Size
2KB
-
MD5
b760d4655d59be17228ff870af42fe6f
-
SHA1
d37d5e2e9b5bf5a28c7e31f2dc5b889735ae6c35
-
SHA256
7078ac5f2c491c8a4aec2a530272678dce8bf2f2c300ed351822212b15bf971f
-
SHA512
7f2f5867f9b920eccf836614fff3b789f5335c66b3fc62566dcabe76f84411f4f8a2040009db442b65882bc7451910a171331564ef385e347d84b141b134fb22
Malware Config
Extracted
redline
185.196.9.26:6302
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/3880-208-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 64 set thread context of 3880 64 Bootstrapper 1.07.exe 122 PID 4884 set thread context of 3624 4884 Bootstrapper 1.07.exe 127 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper 1.07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper 1.07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 884 msedge.exe 884 msedge.exe 940 msedge.exe 940 msedge.exe 2348 identity_helper.exe 2348 identity_helper.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 2004 msedge.exe 2004 msedge.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3880 RegAsm.exe 3624 RegAsm.exe 3624 RegAsm.exe 3624 RegAsm.exe 3624 RegAsm.exe 3624 RegAsm.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3880 RegAsm.exe Token: SeDebugPrivilege 3624 RegAsm.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 940 wrote to memory of 4864 940 msedge.exe 82 PID 940 wrote to memory of 4864 940 msedge.exe 82 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 4468 940 msedge.exe 83 PID 940 wrote to memory of 884 940 msedge.exe 84 PID 940 wrote to memory of 884 940 msedge.exe 84 PID 940 wrote to memory of 3044 940 msedge.exe 85 PID 940 wrote to memory of 3044 940 msedge.exe 85 PID 940 wrote to memory of 3044 940 msedge.exe 85 PID 940 wrote to memory of 3044 940 msedge.exe 85 PID 940 wrote to memory of 3044 940 msedge.exe 85 PID 940 wrote to memory of 3044 940 msedge.exe 85 PID 940 wrote to memory of 3044 940 msedge.exe 85 PID 940 wrote to memory of 3044 940 msedge.exe 85 PID 940 wrote to memory of 3044 940 msedge.exe 85 PID 940 wrote to memory of 3044 940 msedge.exe 85 PID 940 wrote to memory of 3044 940 msedge.exe 85 PID 940 wrote to memory of 3044 940 msedge.exe 85 PID 940 wrote to memory of 3044 940 msedge.exe 85 PID 940 wrote to memory of 3044 940 msedge.exe 85 PID 940 wrote to memory of 3044 940 msedge.exe 85 PID 940 wrote to memory of 3044 940 msedge.exe 85 PID 940 wrote to memory of 3044 940 msedge.exe 85 PID 940 wrote to memory of 3044 940 msedge.exe 85 PID 940 wrote to memory of 3044 940 msedge.exe 85 PID 940 wrote to memory of 3044 940 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\xeno.html1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa928946f8,0x7ffa92894708,0x7ffa928947182⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,3499592282064163206,17570056813036352687,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,3499592282064163206,17570056813036352687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1776 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,3499592282064163206,17570056813036352687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,3499592282064163206,17570056813036352687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,3499592282064163206,17570056813036352687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,3499592282064163206,17570056813036352687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,3499592282064163206,17570056813036352687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,3499592282064163206,17570056813036352687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,3499592282064163206,17570056813036352687,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,3499592282064163206,17570056813036352687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,3499592282064163206,17570056813036352687,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,3499592282064163206,17570056813036352687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,3499592282064163206,17570056813036352687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1268 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2200,3499592282064163206,17570056813036352687,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5456 /prefetch:82⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,3499592282064163206,17570056813036352687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,3499592282064163206,17570056813036352687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,3499592282064163206,17570056813036352687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,3499592282064163206,17570056813036352687,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5428 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2200,3499592282064163206,17570056813036352687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3620
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:60
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_devًexec (1).zip\ReadMe.txt1⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\Temp1_devexec.zip\Bootstrapper 1.07.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_devexec.zip\Bootstrapper 1.07.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:64 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3880
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_devexec.zip\Bootstrapper 1.07.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_devexec.zip\Bootstrapper 1.07.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4884 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4292
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
2KB
MD50afd29b928418e48de93ad4cd299d9e9
SHA1464949aeb08839bbc5c9bba1e65bcaf18e1763ea
SHA25629680de75e55d9b01e021bb387065d3085d0ee422d8ad2d53cd38074b98276c8
SHA512a2b9683cc2450449874617fcc36af6779fe3e8bcdffa7c1f31be0189dbaeb1597330a5996dfd40a46e54dd6fe1ec162fe37160858941d41b518b7325e0ac212f
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
20KB
MD5a652c1f6926fbd2f0880bed6e9895ba2
SHA1c41ab44b718d9da7ce889a5432a9b88a3a56dc08
SHA256d0d80d5666003cbb2f2be48892cf8466942f8a1d2a81c04c1cdf3a00582e7c12
SHA512ad26e570e252ac9debe599bac54a33515ad7ec3ef9f07d9be7c651f967edc9b96fec61141753c73e42a61565010a2ee25cadffc6a3d63be05544ad04ef87c1b6
-
Filesize
457B
MD5b0f89407b3170caafb6314b7c6485a87
SHA1a237dba60832cc2f07ec9844b34689e55ce24f7d
SHA256904f445a652bfcca5500f3369148ce05614cb92089e7eff82092f1cbd20db893
SHA512f093774d256bfef85200aed1aee71870b3876c821b1d805190396079be8ccbec8616ce1abc046cfbfdff3ebc45271b63c7c007d3e081521348c5ace1da1cde5e
-
Filesize
382B
MD5a3ecb690e2cf3d46b872f8b4f275a309
SHA1a90b5912d990cec2bf99447e562088c2483d32d7
SHA256472f15c1e4d3f8bd8247c43cf126816f9d15f2ef6753c2cba98d4e7791cd8efb
SHA512cff159e8ce0be3f1c4edd285af305a5c48fae4e676c2b7c78a463b7d5d45cf1bfa9ad6b208376f2e3a3b9c068c0ee92045170559ee989b642e77b1d1be1929f8
-
Filesize
6KB
MD569c2e19f61ba82268a2429a56ea94c4f
SHA1455cd6db80e270f064d40602c1b0ffd57bad817c
SHA2564d214b2f05bee8bda7b5da5778e80bc209c2d1f247bdc8c815c8efea7837e38a
SHA512a7c039ce8af408023768daecf943233d35e33c15acf35c2877f65990d4a532301715406bc03369447d694ac90b470425f9474301400ed52bbc18e3eaefca6b5a
-
Filesize
5KB
MD591fe3346266db3d1b1a2ee24f8bfbe02
SHA1a9d127a494612be99652c7d0b123a2465441dc2c
SHA256cbb2f2e26715fb7391db9a21a2b7f2d6a95f308ad4f185e2a674b08145814f1e
SHA51211729125d9a16516054c22de79943988508daaa2749e4e31af5e1e1e09a04aa8f2bdd42772bb87d7061b866d077b03db54f56bf93988653b96a855dc758bfb81
-
Filesize
6KB
MD5533f9e51e8e3d2177c8a55acb0bd82c3
SHA15203d42c74fe89db4eb6d73868687906945643a1
SHA25658e8310819e4c7ea0b75ee2bcac5071d4863246219342fed02f16d52104852bd
SHA51224e275f5657d903c89adf333921458c41f390bf8aefc5e224f02cd5a0ffbe3e17a5f1aa75d6b1f2e25dcb6abc8d0b10e3a31ca5a9880238fc6cab69add83b5ab
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e513cd69-0737-4f73-b872-ca556691ea88.tmp
Filesize371B
MD56c0daf107a65459cb75cbe0b22c1ad9c
SHA13e38c7f2379ef7fd96a191857293fff2646258f7
SHA2567f255ecd49e7e23408500b153705f239a5120de53efb251f8bb33502c43bdd80
SHA512244ed38e98c0b8b7b8b259d1e51cd098153571a29cbb3354d7e917ade5e9fe1a3ad05e9a6c3443059fe6a3799076e4acbd38561feddd989cb98172e50095901b
-
Filesize
11KB
MD52a6a68fc3be0eb2b94fde8c403bfaa73
SHA1dfe325b6d97f266d7350d1073ff63abd3e5500e8
SHA25686d32f8f3189d258c20087fe81c45ab9fcc1573bfe17739793e32c075b7bbeed
SHA51230c2285aa10ad30edab3d39a74c1a6e92526774600b77efd2eeb3b835548abb3038133fc8ca8670d3b5a4d47f634885f1e2ff12b92f7564ff9cf4f9a326fd3ec
-
Filesize
10KB
MD546408487bba23bca9ab86a9dcbad7d30
SHA1d1fcb0ecf0f658d446111a6062a18b32e7199604
SHA25645ea27317184b1605ac9f014edb49fdf3f4467acc3769ec0890815d618a99b93
SHA512005f52165feec78974d73098c00be718fcaf20ad42788d0ac4a4d3d1860e9d63005a9eaa539b97dffa7a70a144acd5af8c90cdcdc36d3f0e6d03882a55fefa7b
-
Filesize
24.6MB
MD5a549447c5472c8f96a435baef5a62630
SHA1c524acf430141074cc9c7b774ef242e4327acfa7
SHA256a9bedbc31f1c800346a40460665d77e696b2d0bc9428db42f8412f8da7a09129
SHA5124f92a94c91c2efdc970459a60579e8e2bbfc77297d70e8f30995f28a2937149476f1cd6097cb0ce62a577b524e621b5156bac87a1587f232415a5e57626b7b46