Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 21:14
Static task
static1
Behavioral task
behavioral1
Sample
01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe
Resource
win10v2004-20241007-en
General
-
Target
01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe
-
Size
1.2MB
-
MD5
46feda17e80f3d49da421376b8ed69f0
-
SHA1
7f07a79d769261a5d51d5d74d878b2dc231eb6d2
-
SHA256
01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5
-
SHA512
d21cf60bfba3424895946180001e43e052ce028bb018950853205e0d6808a3c967de94bd23eb1b2a75440544404822a8569aab29cd776146965a8aacb7b77e6a
-
SSDEEP
12288:VNcWyda1DbJ0No0RJTTlTTJMtB6eSRV5txtIMzJTTlTTruAN6DbhQnNmWEOwoU8L:zcx4DEoSMKeYKMqnenNmWbjU8CcXjFg
Malware Config
Extracted
xworm
5.0
159.65.24.61:7812
ApBO5aKkoFf776MU
-
Install_directory
%AppData%
-
install_file
Windows Defender Service.exe
-
telegram
https://api.telegram.org/bot7308504158:AAGvjg5ZWkkItSzfmQZs_qu73xKZ_gWVkJI/sendMessage?chat_id=6291749148
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7479631857:AAFuIUMNJYKHzJ3Bc9t4FSh9ZQXlqymhFnk/sendMessage?chat_id=6291749148
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
185.252.232.158:7812
64.23.232.116:7812
vsvf
-
delay
1
-
install
true
-
install_file
Windows Security Health Service.exe
-
install_folder
%AppData%
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000900000001225f-5.dat family_xworm behavioral1/memory/1364-10-0x0000000000130000-0x0000000000140000-memory.dmp family_xworm -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000016c03-13.dat family_stormkitty behavioral1/memory/2408-47-0x0000000000970000-0x00000000009A0000-memory.dmp family_stormkitty -
resource yara_rule behavioral1/files/0x0007000000016cb2-37.dat VenomRAT behavioral1/memory/2664-42-0x0000000000A00000-0x0000000000A18000-memory.dmp VenomRAT behavioral1/memory/2140-71-0x0000000000230000-0x0000000000248000-memory.dmp VenomRAT -
Async RAT payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000016c03-13.dat family_asyncrat behavioral1/files/0x0007000000016cb2-37.dat family_asyncrat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender Service.lnk Windows Defender Service.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender Service.lnk Windows Defender Service.exe -
Executes dropped EXE 8 IoCs
pid Process 1364 Windows Defender Service.exe 2408 svchost.exe 2696 AdobeUpdate.exe 2764 crack.exe 1152 windows update.exe 2664 Cracked.exe 2904 Flash USDT Sender.exe 2140 Windows Security Health Service.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeUpdate.exe" AdobeUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Defender Service = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Defender Service.exe" Windows Defender Service.exe -
Drops desktop.ini file(s) 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\3c40e6ca581f3e4961b899f6f6971c60\Admin@NNYJZAHP_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\3c40e6ca581f3e4961b899f6f6971c60\Admin@NNYJZAHP_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\3c40e6ca581f3e4961b899f6f6971c60\Admin@NNYJZAHP_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\3c40e6ca581f3e4961b899f6f6971c60\Admin@NNYJZAHP_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\3c40e6ca581f3e4961b899f6f6971c60\Admin@NNYJZAHP_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico Flash USDT Sender.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flash USDT Sender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 2500 cmd.exe 1908 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 svchost.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 880 timeout.exe 1208 timeout.exe -
Modifies registry class 20 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Flash USDT Sender.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" Flash USDT Sender.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewVersion = "0" Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f4225481e03947bc34db131e946b44c8dd50000 Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg Flash USDT Sender.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Flash USDT Sender.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Flash USDT Sender.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1340 schtasks.exe 1064 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2696 AdobeUpdate.exe 1364 Windows Defender Service.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2664 Cracked.exe 2664 Cracked.exe 2664 Cracked.exe 2664 Cracked.exe 2664 Cracked.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2408 svchost.exe 2408 svchost.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2408 svchost.exe 2408 svchost.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2408 svchost.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe 2140 Windows Security Health Service.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2904 Flash USDT Sender.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1364 Windows Defender Service.exe Token: SeDebugPrivilege 2664 Cracked.exe Token: SeDebugPrivilege 2408 svchost.exe Token: SeDebugPrivilege 2764 crack.exe Token: SeDebugPrivilege 2664 Cracked.exe Token: SeDebugPrivilege 2140 Windows Security Health Service.exe Token: SeDebugPrivilege 2140 Windows Security Health Service.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2140 Windows Security Health Service.exe 2904 Flash USDT Sender.exe 2904 Flash USDT Sender.exe 2904 Flash USDT Sender.exe 2904 Flash USDT Sender.exe 2904 Flash USDT Sender.exe 2904 Flash USDT Sender.exe 2904 Flash USDT Sender.exe 2904 Flash USDT Sender.exe 2904 Flash USDT Sender.exe 2904 Flash USDT Sender.exe 2904 Flash USDT Sender.exe 2904 Flash USDT Sender.exe 2904 Flash USDT Sender.exe 2904 Flash USDT Sender.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2328 wrote to memory of 1364 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 31 PID 2328 wrote to memory of 1364 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 31 PID 2328 wrote to memory of 1364 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 31 PID 2328 wrote to memory of 2408 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 32 PID 2328 wrote to memory of 2408 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 32 PID 2328 wrote to memory of 2408 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 32 PID 2328 wrote to memory of 2408 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 32 PID 2328 wrote to memory of 2696 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 33 PID 2328 wrote to memory of 2696 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 33 PID 2328 wrote to memory of 2696 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 33 PID 2328 wrote to memory of 2764 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 34 PID 2328 wrote to memory of 2764 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 34 PID 2328 wrote to memory of 2764 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 34 PID 2328 wrote to memory of 2764 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 34 PID 2328 wrote to memory of 2664 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 35 PID 2328 wrote to memory of 2664 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 35 PID 2328 wrote to memory of 2664 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 35 PID 2328 wrote to memory of 1152 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 36 PID 2328 wrote to memory of 1152 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 36 PID 2328 wrote to memory of 1152 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 36 PID 2328 wrote to memory of 1152 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 36 PID 2328 wrote to memory of 1152 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 36 PID 2328 wrote to memory of 1152 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 36 PID 2328 wrote to memory of 1152 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 36 PID 2328 wrote to memory of 2904 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 37 PID 2328 wrote to memory of 2904 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 37 PID 2328 wrote to memory of 2904 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 37 PID 2328 wrote to memory of 2904 2328 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 37 PID 2664 wrote to memory of 964 2664 Cracked.exe 38 PID 2664 wrote to memory of 964 2664 Cracked.exe 38 PID 2664 wrote to memory of 964 2664 Cracked.exe 38 PID 2664 wrote to memory of 1204 2664 Cracked.exe 40 PID 2664 wrote to memory of 1204 2664 Cracked.exe 40 PID 2664 wrote to memory of 1204 2664 Cracked.exe 40 PID 964 wrote to memory of 1340 964 cmd.exe 42 PID 964 wrote to memory of 1340 964 cmd.exe 42 PID 964 wrote to memory of 1340 964 cmd.exe 42 PID 1204 wrote to memory of 880 1204 cmd.exe 43 PID 1204 wrote to memory of 880 1204 cmd.exe 43 PID 1204 wrote to memory of 880 1204 cmd.exe 43 PID 1364 wrote to memory of 1064 1364 Windows Defender Service.exe 44 PID 1364 wrote to memory of 1064 1364 Windows Defender Service.exe 44 PID 1364 wrote to memory of 1064 1364 Windows Defender Service.exe 44 PID 2764 wrote to memory of 2424 2764 crack.exe 47 PID 2764 wrote to memory of 2424 2764 crack.exe 47 PID 2764 wrote to memory of 2424 2764 crack.exe 47 PID 2764 wrote to memory of 2424 2764 crack.exe 47 PID 2424 wrote to memory of 1208 2424 cmd.exe 49 PID 2424 wrote to memory of 1208 2424 cmd.exe 49 PID 2424 wrote to memory of 1208 2424 cmd.exe 49 PID 2424 wrote to memory of 1208 2424 cmd.exe 49 PID 1204 wrote to memory of 2140 1204 cmd.exe 50 PID 1204 wrote to memory of 2140 1204 cmd.exe 50 PID 1204 wrote to memory of 2140 1204 cmd.exe 50 PID 2408 wrote to memory of 2500 2408 svchost.exe 51 PID 2408 wrote to memory of 2500 2408 svchost.exe 51 PID 2408 wrote to memory of 2500 2408 svchost.exe 51 PID 2408 wrote to memory of 2500 2408 svchost.exe 51 PID 2500 wrote to memory of 3032 2500 cmd.exe 53 PID 2500 wrote to memory of 3032 2500 cmd.exe 53 PID 2500 wrote to memory of 3032 2500 cmd.exe 53 PID 2500 wrote to memory of 3032 2500 cmd.exe 53 PID 2500 wrote to memory of 1908 2500 cmd.exe 54 PID 2500 wrote to memory of 1908 2500 cmd.exe 54 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe"C:\Users\Admin\AppData\Local\Temp\01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Roaming\Windows Defender Service.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Service.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Defender Service" /tr "C:\Users\Admin\AppData\Roaming\Windows Defender Service.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1064
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:3032
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1908
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵
- System Location Discovery: System Language Discovery
PID:2916
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:2824
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2572
-
-
-
-
C:\Users\Admin\AppData\Roaming\AdobeUpdate.exe"C:\Users\Admin\AppData\Roaming\AdobeUpdate.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
PID:2696
-
-
C:\Users\Admin\AppData\Roaming\crack.exe"C:\Users\Admin\AppData\Roaming\crack.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp4E1.tmp.cmd""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\timeout.exetimeout 44⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1208
-
-
-
-
C:\Users\Admin\AppData\Roaming\Cracked.exe"C:\Users\Admin\AppData\Roaming\Cracked.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows Security Health Service" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows Security Health Service" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:1340
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpFB50.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:880
-
-
C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2140
-
-
-
-
C:\Users\Admin\AppData\Roaming\windows update.exe"C:\Users\Admin\AppData\Roaming\windows update.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1152
-
-
C:\Users\Admin\AppData\Roaming\Flash USDT Sender.exe"C:\Users\Admin\AppData\Roaming\Flash USDT Sender.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2904
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3ECE98DF-D236-4650-BCA5-D8FE62AC9724} S-1-5-21-3551809350-4263495960-1443967649-1000:NNYJZAHP\Admin:Interactive:[1]1⤵PID:1716
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
150B
MD56669cf5500341253951d2b2e5873e78d
SHA1d06dcaede716f609ef4c9f5466f6c71d1e0f75ef
SHA256e035de86ff40874f80cd5af44ab9dad9877a1fb6190e390e3423eafcb77c0c52
SHA51211a0f17435e51c35074466d53da481ce9958a61aa06dd9c1ac217214c22d822055d29f77b6f8f87db16d8ccb63d61fd55657bbe67d4b7d7d0654e3278c2fa53d
-
Filesize
175B
MD5f1dbb72de145f8104cf2b1c224f2d746
SHA198e9fc0a2422c5c0712f4b57bcd05c84213a9b0b
SHA25615a10ebcf6d19cc30d9812e140e4455f1aef81acf262287a14ff9b56bd46d3b9
SHA51283a5f53aaaf6ae7565c4f203cc5f7022a48d7d2cee6217a435526a703d42ea7523b49a251949c7a36c9f9678ff4e6bb6c2d155680012cc2d2268c62dc626d052
-
Filesize
10KB
MD5bb2f6ec73b6646fb1d674763a060b42b
SHA1dbdaed5d56e6a54bdefc352a12f8436a73c3cd9d
SHA2560f5c554a665e05341d97ffbe3b7facbcb2043e50d079457fc54cd762cdeb11de
SHA5129df8a285a80a8d1a6ea43163cd32dba72a8ee3bfbc96cc4a96917a60b9fd07a13da8c7abac41052db1b263e64dd5acf62820cbafad685d36e3c9ae3f607c56f8
-
Filesize
74KB
MD50dfa83a82f6418c73406d78296de61be
SHA1dd7eceef8a434c43e0751e180bf714e08771d336
SHA2568d27369ffa8b29d561fa9daf485be14d2fc00287bb1c69d4c84d514891c8db5e
SHA5129a4b026250b18c29ab7dd48203f321c2ef2f12695bd2dcb52ebbc15001c8ddf019d5a7e04da056c50c1881ce269d1810259bf6d04b61f471e8751b7192fc73d4
-
Filesize
776KB
MD5ac7938b542469a1c5bb108fc046ac87b
SHA19571a4ab3359b982f0ab33b03e815df8c354b0f3
SHA2561efd1de7aef995821042509c66121a942c7ee8e004badbb4e14a10b5d7c96292
SHA512a669d873bfbe176b6e8b365178272b8666eeadc85e74a814c10e0d5217b988d8f11ef94aa495cbd9ad47d63f4483872c3e42e18c9554db7572ef14321682d257
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
39KB
MD5d536d6af55d6fdd40603aa188302fea0
SHA1cafde0fdaec80e0adf0f8190c6653599de64e6d0
SHA256765f25e12378795aef83491f0aab228e0b20f1be973dd7aac44608fddb334bce
SHA512c1ecac71c9703dc06b8eef9f0ba2f3fbcec4fc053f99acd6a2d2a11fd723c631075625a7cb85c0565f660526ae8c1cfe9621b50858213e08e6f70722be56c180
-
Filesize
8KB
MD59215015740c937980b6b53cee5087769
SHA1a0bfe95486944f1548620d4de472c3758e95d36a
SHA256a5390a297f14ef8f5be308009ec436d2a58598188dbb92d7299795a10ba1c541
SHA5125b9bbf1836466d803d3e160a38e10c8397aa3966c120ab6435a52b7d0a09eb664ef2172bf0e7e2de1cc3eae261167c9355fa7ac3b1b7e4504a7e07b82c4b90e2
-
Filesize
170KB
MD596014694a042d8344b910bc47d79337b
SHA19d19ab2f110ae58f30965a5a3d608cbf51986edb
SHA2564950eb74909bd6e739e38e57d8c6465c76ef108d65cac9f130d3f5c6d2fe943f
SHA512fe308c42b3ad2c3d73a834399aa12ea23f336103389181dface80a81da8be1ffd9a950cac802dc8a806ad318eb90a6bb6021d1acd9206a07749f83f2bb6cd03d
-
Filesize
76KB
MD574eab303bc6b579831e076ccad9f29c6
SHA117d29c26066457aee794d2f365bcf4dc4a00ef40
SHA256533cfe737cd440c7f9a65d7b47c0f082886d50bcebff287f922a27f4d10f77f0
SHA5125352fafaf6fbcd7a72383ab300b2cef462e10eafc40033cf7e605bc14d47ebd0668b518d6d0a2700befa9521bfcfd11d971fe4153aaabefa4071f017a6cc72e2