Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 22:25
Behavioral task
behavioral1
Sample
Dehasher.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Dehasher.exe
Resource
win10v2004-20240802-en
General
-
Target
Dehasher.exe
-
Size
1.1MB
-
MD5
be43176a494e84f0beb04cdd86efd67d
-
SHA1
09e738c02dfe2e8664d7072ee2d9df3fea7e2079
-
SHA256
76a429a6968d22df6339119f21f83ad0337ad9d60be818b328dbdc8cacfbcaeb
-
SHA512
8a8c01bb1c4aa8db4346d693c2650862f8965b897ffbabc19e04a091964b20b093e27be5fd19d7e37eb81816275b2e8da40d289c3fa3485f047d9e527a00ce11
-
SSDEEP
24576:OCUG////SMrrr8SSCrirMSpSc9CLtrDrHO37kw8m657w6ZBLmkitKqBCjC0PDgMW:OCUd37bVV1BCjB
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7044437613:AAEXeS1SKGTrEjQ8F-7vSegWo8OLABeJY5k/sendMessage?chat_id=6052812018
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Detect Neshta payload 5 IoCs
resource yara_rule behavioral1/files/0x00080000000120fb-2.dat family_neshta behavioral1/memory/2612-178-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2612-180-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x0007000000016d5a-186.dat family_neshta behavioral1/memory/1700-194-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 3 IoCs
resource yara_rule behavioral1/files/0x00080000000120fb-2.dat family_stormkitty behavioral1/files/0x0007000000016d49-23.dat family_stormkitty behavioral1/memory/2720-29-0x0000000000180000-0x00000000001B2000-memory.dmp family_stormkitty -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016d49-23.dat family_asyncrat -
Executes dropped EXE 4 IoCs
pid Process 2612 LET.EXE 2668 VIPERDEHASHER.EXE 2720 LET.EXE 1700 svchost.com -
Loads dropped DLL 5 IoCs
pid Process 1956 Dehasher.exe 1956 Dehasher.exe 1956 Dehasher.exe 2612 LET.EXE 2612 LET.EXE -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" LET.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\ea158774d24159f20af8e1665dd95e19\Admin@NNYJZAHP_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini LET.EXE File created C:\Users\Admin\AppData\Local\ea158774d24159f20af8e1665dd95e19\Admin@NNYJZAHP_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini LET.EXE File created C:\Users\Admin\AppData\Local\ea158774d24159f20af8e1665dd95e19\Admin@NNYJZAHP_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini LET.EXE File created C:\Users\Admin\AppData\Local\ea158774d24159f20af8e1665dd95e19\Admin@NNYJZAHP_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini LET.EXE File opened for modification C:\Users\Admin\AppData\Local\ea158774d24159f20af8e1665dd95e19\Admin@NNYJZAHP_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini LET.EXE File opened for modification C:\Users\Admin\AppData\Local\ea158774d24159f20af8e1665dd95e19\Admin@NNYJZAHP_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini LET.EXE File created C:\Users\Admin\AppData\Local\ea158774d24159f20af8e1665dd95e19\Admin@NNYJZAHP_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini LET.EXE -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe LET.EXE File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE LET.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE LET.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE LET.EXE File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe LET.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE LET.EXE File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE LET.EXE File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe LET.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE LET.EXE File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE LET.EXE File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE LET.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE LET.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE LET.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe LET.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE LET.EXE File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE LET.EXE File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe LET.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE LET.EXE File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE LET.EXE File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE LET.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE LET.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE LET.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE LET.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE LET.EXE File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe LET.EXE File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE LET.EXE File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE LET.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe LET.EXE File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe LET.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE LET.EXE File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe LET.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE LET.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE LET.EXE File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe LET.EXE File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe LET.EXE File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe LET.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe LET.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE LET.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE LET.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE LET.EXE File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe LET.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com LET.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dehasher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VIPERDEHASHER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LET.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LET.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 1792 cmd.exe 628 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 LET.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier LET.EXE -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" LET.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2660 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE 2720 LET.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2720 LET.EXE Token: SeDebugPrivilege 2720 LET.EXE -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2612 1956 Dehasher.exe 30 PID 1956 wrote to memory of 2612 1956 Dehasher.exe 30 PID 1956 wrote to memory of 2612 1956 Dehasher.exe 30 PID 1956 wrote to memory of 2612 1956 Dehasher.exe 30 PID 1956 wrote to memory of 2668 1956 Dehasher.exe 31 PID 1956 wrote to memory of 2668 1956 Dehasher.exe 31 PID 1956 wrote to memory of 2668 1956 Dehasher.exe 31 PID 1956 wrote to memory of 2668 1956 Dehasher.exe 31 PID 2612 wrote to memory of 2720 2612 LET.EXE 32 PID 2612 wrote to memory of 2720 2612 LET.EXE 32 PID 2612 wrote to memory of 2720 2612 LET.EXE 32 PID 2612 wrote to memory of 2720 2612 LET.EXE 32 PID 2720 wrote to memory of 1792 2720 LET.EXE 34 PID 2720 wrote to memory of 1792 2720 LET.EXE 34 PID 2720 wrote to memory of 1792 2720 LET.EXE 34 PID 2720 wrote to memory of 1792 2720 LET.EXE 34 PID 1792 wrote to memory of 1088 1792 cmd.exe 36 PID 1792 wrote to memory of 1088 1792 cmd.exe 36 PID 1792 wrote to memory of 1088 1792 cmd.exe 36 PID 1792 wrote to memory of 1088 1792 cmd.exe 36 PID 1792 wrote to memory of 628 1792 cmd.exe 37 PID 1792 wrote to memory of 628 1792 cmd.exe 37 PID 1792 wrote to memory of 628 1792 cmd.exe 37 PID 1792 wrote to memory of 628 1792 cmd.exe 37 PID 1792 wrote to memory of 2492 1792 cmd.exe 38 PID 1792 wrote to memory of 2492 1792 cmd.exe 38 PID 1792 wrote to memory of 2492 1792 cmd.exe 38 PID 1792 wrote to memory of 2492 1792 cmd.exe 38 PID 2720 wrote to memory of 3016 2720 LET.EXE 39 PID 2720 wrote to memory of 3016 2720 LET.EXE 39 PID 2720 wrote to memory of 3016 2720 LET.EXE 39 PID 2720 wrote to memory of 3016 2720 LET.EXE 39 PID 3016 wrote to memory of 2040 3016 cmd.exe 41 PID 3016 wrote to memory of 2040 3016 cmd.exe 41 PID 3016 wrote to memory of 2040 3016 cmd.exe 41 PID 3016 wrote to memory of 2040 3016 cmd.exe 41 PID 3016 wrote to memory of 2332 3016 cmd.exe 42 PID 3016 wrote to memory of 2332 3016 cmd.exe 42 PID 3016 wrote to memory of 2332 3016 cmd.exe 42 PID 3016 wrote to memory of 2332 3016 cmd.exe 42 PID 2720 wrote to memory of 1700 2720 LET.EXE 43 PID 2720 wrote to memory of 1700 2720 LET.EXE 43 PID 2720 wrote to memory of 1700 2720 LET.EXE 43 PID 2720 wrote to memory of 1700 2720 LET.EXE 43 PID 1700 wrote to memory of 2660 1700 svchost.com 44 PID 1700 wrote to memory of 2660 1700 svchost.com 44 PID 1700 wrote to memory of 2660 1700 svchost.com 44 PID 1700 wrote to memory of 2660 1700 svchost.com 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dehasher.exe"C:\Users\Admin\AppData\Local\Temp\Dehasher.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\LET.EXE"C:\Users\Admin\AppData\Local\Temp\LET.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\3582-490\LET.EXE"C:\Users\Admin\AppData\Local\Temp\3582-490\LET.EXE"3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵
- System Location Discovery: System Language Discovery
PID:1088
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:628
-
-
C:\Windows\SysWOW64\findstr.exefindstr All5⤵
- System Location Discovery: System Language Discovery
PID:2492
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵
- System Location Discovery: System Language Discovery
PID:2040
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2332
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Admin\AppData\Local\Temp\3582-490\LET.EXE"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /sc ONLOGON /RL HIGHEST /tn Chrome Update /tr C:\Users\Admin\AppData\Local\Temp\3582-490\LET.EXE5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2660
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\VIPERDEHASHER.EXE"C:\Users\Admin\AppData\Local\Temp\VIPERDEHASHER.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Change Default File Association
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
2Change Default File Association
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
175KB
MD5c7235b3be7873e0743aba6235cd3d677
SHA12481321813caff4ded19135c86301f899fb19f66
SHA2564902c56dfa5b513df7c00f8fe5df90dcc46a03f194dca424ebbf6f03e7904486
SHA5127310beb111ca489fd6348d40cea921d8854d99858cb2b9dc7d8211009a8c958374832f585f2cb25962e7ed3a453ca11102b7fb47be0eff8d2a7bc2b564928860
-
Filesize
8B
MD595513cfed79e9ace3e6fa322d940edaa
SHA1e2beafef0dd7d3c3190e17d4a4402d0c3811b3ca
SHA25666840cc056c60d82ab4955fe2ba32fa85c724aea8dd6d56f1b7974bfeaded159
SHA512b0d9de6ae19339184a527015167df56731863c8ba2563d90ef257a49bc1cc54bd968bbfbe4b5e8367aa798d7d55318ad05a9e6cc4b35bae4e16941600c930b29
-
Filesize
40KB
MD536fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
216KB
MD5cb66ae727ba5ed3a3c1b1fc60dadb152
SHA16def0bea71e985e041c5796b959814b36d75e551
SHA25651c82632119b14af345b42ec4bce4c780d81502b8ec67b63b631c6830fb845d6
SHA51284b9219eac6fc235f74a063cad74625350132b4481c5653fa47ba8dbb0319798a5c1d5aa07701e4b542bd7fc8330dcfc3ce4037baa4af86a0bbea1d6e9b2c901
-
Filesize
892KB
MD55a6ac9ed6969b3be67d1d45813ee0662
SHA12b7a10d8f9c062905b2aff6c6d3a31a85c4f74fb
SHA25693f31fdee5f1701424d12d3445d2c8afdf8073f79ebccf0c61e173b9b20b90a9
SHA51237380b1c355dff936b46177d5315d82e74ede89fc986b12771be9300a0a041142de8cdb32e582e72c92c287b55b07a02be46172ba47a7be97a65879daf04a883