Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
3620daf901799b60ce5435cae56ef47f73be941bb86b8725a9a106852e7a6abe.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3620daf901799b60ce5435cae56ef47f73be941bb86b8725a9a106852e7a6abe.exe
Resource
win10v2004-20240802-en
General
-
Target
3620daf901799b60ce5435cae56ef47f73be941bb86b8725a9a106852e7a6abe.exe
-
Size
2.6MB
-
MD5
c28d35c9c1c9b91958d1f34b443b4e87
-
SHA1
cd825f300034d38460680ffb506bee4e9b1085f0
-
SHA256
3620daf901799b60ce5435cae56ef47f73be941bb86b8725a9a106852e7a6abe
-
SHA512
83e5c9c20fc6b9ea630fcba25561aaabdafed46023b53e1cd3d9d6932fd6b8ce101b378ca2cd1b21a898366aa911826bf3cb7e4f3fedd231fbc846d150d32db0
-
SSDEEP
24576:ObCj2sObHtqQ4QEfCr7w7yvuqqNq8FroaSaPXRackmrM4Biq7MhLv9GImmVfq4eF:ObCjPKNqQEfsw43qtmVfq48
Malware Config
Extracted
Protocol: smtp- Host:
smtp.mail.me.com - Port:
587 - Username:
[email protected] - Password:
RICHARD205lord
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1544 jhdfkldfhndfkjdfnbfklfnf.exe 4880 winmgr119.exe 1760 winmgr119.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts cvtres.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jhdfkldfhndfkjdfnbfklfnf = "C:\\ProgramData\\jhdfkldfhndfkjdfnbfklfnf.exe" 3620daf901799b60ce5435cae56ef47f73be941bb86b8725a9a106852e7a6abe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jhdfkldfhndfkjdfnbfklfnf = "C:\\ProgramData\\jhdfkldfhndfkjdfnbfklfnf.exe" jhdfkldfhndfkjdfnbfklfnf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 ipinfo.io 28 icanhazip.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023505-3.dat autoit_exe behavioral2/files/0x001100000002350b-48.dat autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1544 set thread context of 764 1544 jhdfkldfhndfkjdfnbfklfnf.exe 92 PID 764 set thread context of 1228 764 RegAsm.exe 95 PID 764 set thread context of 4484 764 RegAsm.exe 97 PID 764 set thread context of 2820 764 RegAsm.exe 99 -
resource yara_rule behavioral2/memory/1228-15-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/1228-16-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/1228-17-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/1228-22-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/4484-26-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4484-27-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4484-28-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4484-30-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 4 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe:Zone.Identifier:$DATA jhdfkldfhndfkjdfnbfklfnf.exe File created C:\ProgramData\winmgr119.exe:Zone.Identifier:$DATA winmgr119.exe File opened for modification C:\ProgramData\winmgr119.exe:Zone.Identifier:$DATA winmgr119.exe File created C:\Users\Admin\AppData\Local\Temp\3620daf901799b60ce5435cae56ef47f73be941bb86b8725a9a106852e7a6abe.exe:Zone.Identifier:$DATA 3620daf901799b60ce5435cae56ef47f73be941bb86b8725a9a106852e7a6abe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winmgr119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhdfkldfhndfkjdfnbfklfnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winmgr119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3620daf901799b60ce5435cae56ef47f73be941bb86b8725a9a106852e7a6abe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
NTFS ADS 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\3620daf901799b60ce5435cae56ef47f73be941bb86b8725a9a106852e7a6abe.exe:Zone.Identifier:$DATA 3620daf901799b60ce5435cae56ef47f73be941bb86b8725a9a106852e7a6abe.exe File created C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe:Zone.Identifier:$DATA jhdfkldfhndfkjdfnbfklfnf.exe File created C:\ProgramData\winmgr119.exe:Zone.Identifier:$DATA winmgr119.exe File opened for modification C:\ProgramData\winmgr119.exe:Zone.Identifier:$DATA winmgr119.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 26 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3936 schtasks.exe 1668 schtasks.exe 1344 schtasks.exe 4560 schtasks.exe 712 schtasks.exe 3436 schtasks.exe 2424 schtasks.exe 2096 schtasks.exe 2136 schtasks.exe 2004 schtasks.exe 2532 schtasks.exe 532 schtasks.exe 1056 schtasks.exe 1568 schtasks.exe 4936 schtasks.exe 3212 schtasks.exe 4584 schtasks.exe 4588 schtasks.exe 4832 schtasks.exe 1344 schtasks.exe 972 schtasks.exe 4292 schtasks.exe 1288 schtasks.exe 1080 schtasks.exe 2760 schtasks.exe 1840 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1540 3620daf901799b60ce5435cae56ef47f73be941bb86b8725a9a106852e7a6abe.exe 1540 3620daf901799b60ce5435cae56ef47f73be941bb86b8725a9a106852e7a6abe.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 764 RegAsm.exe 764 RegAsm.exe 764 RegAsm.exe 764 RegAsm.exe 764 RegAsm.exe 764 RegAsm.exe 764 RegAsm.exe 764 RegAsm.exe 764 RegAsm.exe 764 RegAsm.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 764 RegAsm.exe 764 RegAsm.exe 764 RegAsm.exe 764 RegAsm.exe 764 RegAsm.exe 764 RegAsm.exe 4880 winmgr119.exe 4880 winmgr119.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 764 RegAsm.exe 764 RegAsm.exe 764 RegAsm.exe 764 RegAsm.exe 764 RegAsm.exe 764 RegAsm.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe 1544 jhdfkldfhndfkjdfnbfklfnf.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 764 RegAsm.exe Token: SeDebugPrivilege 1228 cvtres.exe Token: SeDebugPrivilege 4484 cvtres.exe Token: SeDebugPrivilege 2820 cvtres.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 764 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1540 wrote to memory of 1544 1540 3620daf901799b60ce5435cae56ef47f73be941bb86b8725a9a106852e7a6abe.exe 91 PID 1540 wrote to memory of 1544 1540 3620daf901799b60ce5435cae56ef47f73be941bb86b8725a9a106852e7a6abe.exe 91 PID 1540 wrote to memory of 1544 1540 3620daf901799b60ce5435cae56ef47f73be941bb86b8725a9a106852e7a6abe.exe 91 PID 1544 wrote to memory of 764 1544 jhdfkldfhndfkjdfnbfklfnf.exe 92 PID 1544 wrote to memory of 764 1544 jhdfkldfhndfkjdfnbfklfnf.exe 92 PID 1544 wrote to memory of 764 1544 jhdfkldfhndfkjdfnbfklfnf.exe 92 PID 1544 wrote to memory of 764 1544 jhdfkldfhndfkjdfnbfklfnf.exe 92 PID 1544 wrote to memory of 764 1544 jhdfkldfhndfkjdfnbfklfnf.exe 92 PID 1544 wrote to memory of 712 1544 jhdfkldfhndfkjdfnbfklfnf.exe 93 PID 1544 wrote to memory of 712 1544 jhdfkldfhndfkjdfnbfklfnf.exe 93 PID 1544 wrote to memory of 712 1544 jhdfkldfhndfkjdfnbfklfnf.exe 93 PID 764 wrote to memory of 1228 764 RegAsm.exe 95 PID 764 wrote to memory of 1228 764 RegAsm.exe 95 PID 764 wrote to memory of 1228 764 RegAsm.exe 95 PID 764 wrote to memory of 1228 764 RegAsm.exe 95 PID 764 wrote to memory of 1228 764 RegAsm.exe 95 PID 764 wrote to memory of 1228 764 RegAsm.exe 95 PID 764 wrote to memory of 1228 764 RegAsm.exe 95 PID 764 wrote to memory of 4484 764 RegAsm.exe 97 PID 764 wrote to memory of 4484 764 RegAsm.exe 97 PID 764 wrote to memory of 4484 764 RegAsm.exe 97 PID 764 wrote to memory of 4484 764 RegAsm.exe 97 PID 764 wrote to memory of 4484 764 RegAsm.exe 97 PID 764 wrote to memory of 4484 764 RegAsm.exe 97 PID 764 wrote to memory of 4484 764 RegAsm.exe 97 PID 764 wrote to memory of 2820 764 RegAsm.exe 99 PID 764 wrote to memory of 2820 764 RegAsm.exe 99 PID 764 wrote to memory of 2820 764 RegAsm.exe 99 PID 764 wrote to memory of 2820 764 RegAsm.exe 99 PID 764 wrote to memory of 2820 764 RegAsm.exe 99 PID 764 wrote to memory of 2820 764 RegAsm.exe 99 PID 1544 wrote to memory of 1056 1544 jhdfkldfhndfkjdfnbfklfnf.exe 101 PID 1544 wrote to memory of 1056 1544 jhdfkldfhndfkjdfnbfklfnf.exe 101 PID 1544 wrote to memory of 1056 1544 jhdfkldfhndfkjdfnbfklfnf.exe 101 PID 1544 wrote to memory of 1568 1544 jhdfkldfhndfkjdfnbfklfnf.exe 104 PID 1544 wrote to memory of 1568 1544 jhdfkldfhndfkjdfnbfklfnf.exe 104 PID 1544 wrote to memory of 1568 1544 jhdfkldfhndfkjdfnbfklfnf.exe 104 PID 1544 wrote to memory of 3436 1544 jhdfkldfhndfkjdfnbfklfnf.exe 107 PID 1544 wrote to memory of 3436 1544 jhdfkldfhndfkjdfnbfklfnf.exe 107 PID 1544 wrote to memory of 3436 1544 jhdfkldfhndfkjdfnbfklfnf.exe 107 PID 1544 wrote to memory of 1288 1544 jhdfkldfhndfkjdfnbfklfnf.exe 109 PID 1544 wrote to memory of 1288 1544 jhdfkldfhndfkjdfnbfklfnf.exe 109 PID 1544 wrote to memory of 1288 1544 jhdfkldfhndfkjdfnbfklfnf.exe 109 PID 1544 wrote to memory of 4936 1544 jhdfkldfhndfkjdfnbfklfnf.exe 111 PID 1544 wrote to memory of 4936 1544 jhdfkldfhndfkjdfnbfklfnf.exe 111 PID 1544 wrote to memory of 4936 1544 jhdfkldfhndfkjdfnbfklfnf.exe 111 PID 1544 wrote to memory of 4832 1544 jhdfkldfhndfkjdfnbfklfnf.exe 113 PID 1544 wrote to memory of 4832 1544 jhdfkldfhndfkjdfnbfklfnf.exe 113 PID 1544 wrote to memory of 4832 1544 jhdfkldfhndfkjdfnbfklfnf.exe 113 PID 1544 wrote to memory of 1344 1544 jhdfkldfhndfkjdfnbfklfnf.exe 115 PID 1544 wrote to memory of 1344 1544 jhdfkldfhndfkjdfnbfklfnf.exe 115 PID 1544 wrote to memory of 1344 1544 jhdfkldfhndfkjdfnbfklfnf.exe 115 PID 1544 wrote to memory of 3212 1544 jhdfkldfhndfkjdfnbfklfnf.exe 117 PID 1544 wrote to memory of 3212 1544 jhdfkldfhndfkjdfnbfklfnf.exe 117 PID 1544 wrote to memory of 3212 1544 jhdfkldfhndfkjdfnbfklfnf.exe 117 PID 1544 wrote to memory of 2136 1544 jhdfkldfhndfkjdfnbfklfnf.exe 119 PID 1544 wrote to memory of 2136 1544 jhdfkldfhndfkjdfnbfklfnf.exe 119 PID 1544 wrote to memory of 2136 1544 jhdfkldfhndfkjdfnbfklfnf.exe 119 PID 1544 wrote to memory of 1080 1544 jhdfkldfhndfkjdfnbfklfnf.exe 122 PID 1544 wrote to memory of 1080 1544 jhdfkldfhndfkjdfnbfklfnf.exe 122 PID 1544 wrote to memory of 1080 1544 jhdfkldfhndfkjdfnbfklfnf.exe 122 PID 1544 wrote to memory of 2004 1544 jhdfkldfhndfkjdfnbfklfnf.exe 124 PID 1544 wrote to memory of 2004 1544 jhdfkldfhndfkjdfnbfklfnf.exe 124 PID 1544 wrote to memory of 2004 1544 jhdfkldfhndfkjdfnbfklfnf.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\3620daf901799b60ce5435cae56ef47f73be941bb86b8725a9a106852e7a6abe.exe"C:\Users\Admin\AppData\Local\Temp\3620daf901799b60ce5435cae56ef47f73be941bb86b8725a9a106852e7a6abe.exe"1⤵
- Adds Run key to start application
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exeC:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe03⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp3524.tmp"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp3787.tmp"4⤵
- Accesses Microsoft Outlook accounts
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp37F5.tmp"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:712
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1056
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1568
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3436
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1288
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4936
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4832
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1344
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3212
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2136
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1080
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2004
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:972
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2424
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2532
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4292
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2096
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3936
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4584
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2760
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1668
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4588
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1840
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1344
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:532
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4560
-
-
-
C:\ProgramData\winmgr119.exeC:\ProgramData\winmgr119.exe1⤵
- Executes dropped EXE
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
C:\ProgramData\winmgr119.exeC:\ProgramData\winmgr119.exe1⤵
- Executes dropped EXE
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:1760
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5689bd4e86fab1315e61b6f624d2d26ea
SHA1a0bb6705890525b13909e9a5a904c39395c14abb
SHA256ad947a9f9818c5071f810c0816fbacc6a22764c2f8d81b4303a2315924f73128
SHA512d42e8522cbd388ffa568e6d7b527dd12f0ce16a5abdf97aad60a516b56c515beb4d3bc0318af5cdb531f278152be1238c857cad6428953c363b7f2453d8f78bd
-
Filesize
8B
MD5ed551017eb59a78d4a05d24841e3383e
SHA171fafd1ba221a6e57107c830ea01e0edf82b3bf3
SHA256e8d25a5107b5dc0809e3ad1b593c153a93879d5abea79727875587d5fd2156e3
SHA5128f7b0e57261a0ec93e6cc350d1d41e4a73c89499c9ace0e6f9cc0f26cad618f84e95d71d59052a48fb52ba11b5de5b665c07c3033ecceda6385b16c782f84b86
-
Filesize
2.6MB
MD5dd3e5413fd53810a2d537bb3860a4a43
SHA12f1bdc963874a5b1ede186308de6a4d08ec5543d
SHA25603a17acf610a9ee7851a8acaec2256b7a7b80f37abdbbfb630e0c35828dc6016
SHA5126c9394f0cf3a3809580128f223f0fb3fdae6b8c14885308cf71a240181a40d779f6f308041fd3ba62f15b77b912f4f477f07c16e3f2b66a84ad9a4f557307f1b
-
Filesize
1KB
MD5b0cc2e6f2d8036c9b5fef218736fa9c9
SHA164fd3017625979c95ba09d7cbea201010a82f73f
SHA256997aceeb78143e057d4ea0ed699db3cc1c723f699b4532663b7b85c83baa5c50
SHA512a1fe80b2971c4d1141a594f27eaea61500bf701cd1b8fbdb5ac2204a63c8ef862344f8c30f65ce769f0acf2b0718ed33a02744dd1a152c4a62a5318333d29b9b
-
Filesize
400B
MD5de4e5ff058882957cf8a3b5f839a031f
SHA10b3d8279120fb5fa27efbd9eee89695aa040fc24
SHA256ef54f46b9f1e342fc12e035ae94f57c61ea4e8be4e116f0a1c6f86310f400f49
SHA512a6b0d557e9eec4e56630e5ba64495df318f4fd959fffbdcbf77831185b067906917c9117a0ecd6ac817c7860d5d831cce15820d715657d81e2d817d9fab9fb72
-
Filesize
391B
MD53525ea58bba48993ea0d01b65ea71381
SHA11b917678fdd969e5ee5916e5899e7c75a979cf4d
SHA256681bcee53cf679ac674e700136f9229b9184fe60ed6410dbd7a33d462ed13ae2
SHA5125aad8dca43ec85882daf50c469bd04dcf0b62affc8bc605b3e289496a2679d4d548fea8bb0aea7080bbfbcdcab9d275fc6797b9c95b64f9f97ecf79583a83986