Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 21:17
Static task
static1
Behavioral task
behavioral1
Sample
01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe
Resource
win10v2004-20241007-en
General
-
Target
01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe
-
Size
1.2MB
-
MD5
46feda17e80f3d49da421376b8ed69f0
-
SHA1
7f07a79d769261a5d51d5d74d878b2dc231eb6d2
-
SHA256
01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5
-
SHA512
d21cf60bfba3424895946180001e43e052ce028bb018950853205e0d6808a3c967de94bd23eb1b2a75440544404822a8569aab29cd776146965a8aacb7b77e6a
-
SSDEEP
12288:VNcWyda1DbJ0No0RJTTlTTJMtB6eSRV5txtIMzJTTlTTruAN6DbhQnNmWEOwoU8L:zcx4DEoSMKeYKMqnenNmWbjU8CcXjFg
Malware Config
Extracted
xworm
5.0
159.65.24.61:7812
ApBO5aKkoFf776MU
-
Install_directory
%AppData%
-
install_file
Windows Defender Service.exe
-
telegram
https://api.telegram.org/bot7308504158:AAGvjg5ZWkkItSzfmQZs_qu73xKZ_gWVkJI/sendMessage?chat_id=6291749148
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7479631857:AAFuIUMNJYKHzJ3Bc9t4FSh9ZQXlqymhFnk/sendMessage?chat_id=6291749148
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
185.252.232.158:7812
64.23.232.116:7812
vsvf
-
delay
1
-
install
true
-
install_file
Windows Security Health Service.exe
-
install_folder
%AppData%
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000a00000001225d-7.dat family_xworm behavioral1/memory/2436-20-0x0000000001130000-0x0000000001140000-memory.dmp family_xworm -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000015686-13.dat family_stormkitty behavioral1/memory/1928-47-0x0000000000CC0000-0x0000000000CF0000-memory.dmp family_stormkitty -
resource yara_rule behavioral1/files/0x0007000000015c0d-31.dat VenomRAT behavioral1/memory/2800-39-0x0000000000A00000-0x0000000000A18000-memory.dmp VenomRAT behavioral1/memory/264-71-0x00000000010D0000-0x00000000010E8000-memory.dmp VenomRAT -
Async RAT payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000015686-13.dat family_asyncrat behavioral1/files/0x0007000000015c0d-31.dat family_asyncrat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender Service.lnk Windows Defender Service.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender Service.lnk Windows Defender Service.exe -
Executes dropped EXE 8 IoCs
pid Process 2436 Windows Defender Service.exe 1928 svchost.exe 2796 AdobeUpdate.exe 2668 crack.exe 2800 Cracked.exe 2840 windows update.exe 2572 Flash USDT Sender.exe 264 Windows Security Health Service.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Defender Service = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Defender Service.exe" Windows Defender Service.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeUpdate.exe" AdobeUpdate.exe -
Drops desktop.ini file(s) 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\d0aa91f51b91ba5510f436cc99b274cd\Admin@UPNECVIU_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\d0aa91f51b91ba5510f436cc99b274cd\Admin@UPNECVIU_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\d0aa91f51b91ba5510f436cc99b274cd\Admin@UPNECVIU_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\d0aa91f51b91ba5510f436cc99b274cd\Admin@UPNECVIU_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\d0aa91f51b91ba5510f436cc99b274cd\Admin@UPNECVIU_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\d0aa91f51b91ba5510f436cc99b274cd\Admin@UPNECVIU_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\d0aa91f51b91ba5510f436cc99b274cd\Admin@UPNECVIU_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\d0aa91f51b91ba5510f436cc99b274cd\Admin@UPNECVIU_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flash USDT Sender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crack.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 2476 cmd.exe 3032 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 768 timeout.exe 1244 timeout.exe -
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg Flash USDT Sender.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewVersion = "0" Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Flash USDT Sender.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Flash USDT Sender.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Flash USDT Sender.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f4225481e03947bc34db131e946b44c8dd50000 Flash USDT Sender.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2112 schtasks.exe 1768 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2796 AdobeUpdate.exe 2436 Windows Defender Service.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2800 Cracked.exe 2800 Cracked.exe 2800 Cracked.exe 2800 Cracked.exe 2800 Cracked.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 1928 svchost.exe 1928 svchost.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 1928 svchost.exe 1928 svchost.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 1928 svchost.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe 264 Windows Security Health Service.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2572 Flash USDT Sender.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2436 Windows Defender Service.exe Token: SeDebugPrivilege 2800 Cracked.exe Token: SeDebugPrivilege 1928 svchost.exe Token: SeDebugPrivilege 2668 crack.exe Token: SeDebugPrivilege 2800 Cracked.exe Token: SeDebugPrivilege 264 Windows Security Health Service.exe Token: SeDebugPrivilege 264 Windows Security Health Service.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 264 Windows Security Health Service.exe 2572 Flash USDT Sender.exe 2572 Flash USDT Sender.exe 2572 Flash USDT Sender.exe 2572 Flash USDT Sender.exe 2572 Flash USDT Sender.exe 2572 Flash USDT Sender.exe 2572 Flash USDT Sender.exe 2572 Flash USDT Sender.exe 2572 Flash USDT Sender.exe 2572 Flash USDT Sender.exe 2572 Flash USDT Sender.exe 2572 Flash USDT Sender.exe 2572 Flash USDT Sender.exe 2572 Flash USDT Sender.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2436 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 30 PID 3036 wrote to memory of 2436 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 30 PID 3036 wrote to memory of 2436 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 30 PID 3036 wrote to memory of 1928 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 31 PID 3036 wrote to memory of 1928 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 31 PID 3036 wrote to memory of 1928 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 31 PID 3036 wrote to memory of 1928 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 31 PID 3036 wrote to memory of 2796 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 32 PID 3036 wrote to memory of 2796 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 32 PID 3036 wrote to memory of 2796 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 32 PID 3036 wrote to memory of 2668 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 33 PID 3036 wrote to memory of 2668 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 33 PID 3036 wrote to memory of 2668 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 33 PID 3036 wrote to memory of 2668 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 33 PID 3036 wrote to memory of 2800 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 34 PID 3036 wrote to memory of 2800 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 34 PID 3036 wrote to memory of 2800 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 34 PID 3036 wrote to memory of 2840 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 35 PID 3036 wrote to memory of 2840 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 35 PID 3036 wrote to memory of 2840 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 35 PID 3036 wrote to memory of 2840 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 35 PID 3036 wrote to memory of 2840 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 35 PID 3036 wrote to memory of 2840 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 35 PID 3036 wrote to memory of 2840 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 35 PID 3036 wrote to memory of 2572 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 36 PID 3036 wrote to memory of 2572 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 36 PID 3036 wrote to memory of 2572 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 36 PID 3036 wrote to memory of 2572 3036 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 36 PID 2800 wrote to memory of 2192 2800 Cracked.exe 37 PID 2800 wrote to memory of 2192 2800 Cracked.exe 37 PID 2800 wrote to memory of 2192 2800 Cracked.exe 37 PID 2800 wrote to memory of 2060 2800 Cracked.exe 39 PID 2800 wrote to memory of 2060 2800 Cracked.exe 39 PID 2800 wrote to memory of 2060 2800 Cracked.exe 39 PID 2192 wrote to memory of 2112 2192 cmd.exe 41 PID 2192 wrote to memory of 2112 2192 cmd.exe 41 PID 2192 wrote to memory of 2112 2192 cmd.exe 41 PID 2060 wrote to memory of 1244 2060 cmd.exe 42 PID 2060 wrote to memory of 1244 2060 cmd.exe 42 PID 2060 wrote to memory of 1244 2060 cmd.exe 42 PID 2436 wrote to memory of 1768 2436 Windows Defender Service.exe 43 PID 2436 wrote to memory of 1768 2436 Windows Defender Service.exe 43 PID 2436 wrote to memory of 1768 2436 Windows Defender Service.exe 43 PID 2668 wrote to memory of 1772 2668 crack.exe 46 PID 2668 wrote to memory of 1772 2668 crack.exe 46 PID 2668 wrote to memory of 1772 2668 crack.exe 46 PID 2668 wrote to memory of 1772 2668 crack.exe 46 PID 1772 wrote to memory of 768 1772 cmd.exe 48 PID 1772 wrote to memory of 768 1772 cmd.exe 48 PID 1772 wrote to memory of 768 1772 cmd.exe 48 PID 1772 wrote to memory of 768 1772 cmd.exe 48 PID 2060 wrote to memory of 264 2060 cmd.exe 49 PID 2060 wrote to memory of 264 2060 cmd.exe 49 PID 2060 wrote to memory of 264 2060 cmd.exe 49 PID 1928 wrote to memory of 2476 1928 svchost.exe 50 PID 1928 wrote to memory of 2476 1928 svchost.exe 50 PID 1928 wrote to memory of 2476 1928 svchost.exe 50 PID 1928 wrote to memory of 2476 1928 svchost.exe 50 PID 2476 wrote to memory of 1612 2476 cmd.exe 52 PID 2476 wrote to memory of 1612 2476 cmd.exe 52 PID 2476 wrote to memory of 1612 2476 cmd.exe 52 PID 2476 wrote to memory of 1612 2476 cmd.exe 52 PID 2476 wrote to memory of 3032 2476 cmd.exe 53 PID 2476 wrote to memory of 3032 2476 cmd.exe 53 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe"C:\Users\Admin\AppData\Local\Temp\01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Roaming\Windows Defender Service.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Service.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Defender Service" /tr "C:\Users\Admin\AppData\Roaming\Windows Defender Service.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1768
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:1612
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3032
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2596
-
-
-
-
C:\Users\Admin\AppData\Roaming\AdobeUpdate.exe"C:\Users\Admin\AppData\Roaming\AdobeUpdate.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
PID:2796
-
-
C:\Users\Admin\AppData\Roaming\crack.exe"C:\Users\Admin\AppData\Roaming\crack.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp9119.tmp.cmd""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\timeout.exetimeout 44⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:768
-
-
-
-
C:\Users\Admin\AppData\Roaming\Cracked.exe"C:\Users\Admin\AppData\Roaming\Cracked.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows Security Health Service" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows Security Health Service" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:2112
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp8843.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:1244
-
-
C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:264
-
-
-
-
C:\Users\Admin\AppData\Roaming\windows update.exe"C:\Users\Admin\AppData\Roaming\windows update.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\Users\Admin\AppData\Roaming\Flash USDT Sender.exe"C:\Users\Admin\AppData\Roaming\Flash USDT Sender.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {731EDA58-3FB0-4E16-A967-9D58962BF965} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]1⤵PID:3056
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175B
MD58044c015c56d08abb189c956973d076d
SHA12b56c45b64c06facce6ed71a451fb8c4988adcb2
SHA2565eabb8ba263a27eb48be2d93668655ee9e6567544fdb63f78c0c30ece985a083
SHA512bafe73dcbcdfb368ed51abed1b2c22d8dce41b7b45b9c737b8ede3979e8d70f6ddd81f2f5be4d93ef4b1eecda8c2a66fcd7e5da27b5419f8734df3bec08073b0
-
Filesize
151B
MD529071d807f44ddb617991d0910b65fec
SHA14698cf3c3b07cc0d394d8d4dca2f33f5fddd33f4
SHA2564b35f44b40c770cd2331bb3ac254fcf2088a9bd010cbae6f007887f3f7c7b876
SHA5124e7d3b6709d8d633be2a7fe15645457f1fc36f30296fcc77ccf2c0cbeb36e56d2e5febbcb44471b1ee6870d6b695790f0b9fdfef25756c0f299957f97ba7d589
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
10KB
MD5bb2f6ec73b6646fb1d674763a060b42b
SHA1dbdaed5d56e6a54bdefc352a12f8436a73c3cd9d
SHA2560f5c554a665e05341d97ffbe3b7facbcb2043e50d079457fc54cd762cdeb11de
SHA5129df8a285a80a8d1a6ea43163cd32dba72a8ee3bfbc96cc4a96917a60b9fd07a13da8c7abac41052db1b263e64dd5acf62820cbafad685d36e3c9ae3f607c56f8
-
Filesize
74KB
MD50dfa83a82f6418c73406d78296de61be
SHA1dd7eceef8a434c43e0751e180bf714e08771d336
SHA2568d27369ffa8b29d561fa9daf485be14d2fc00287bb1c69d4c84d514891c8db5e
SHA5129a4b026250b18c29ab7dd48203f321c2ef2f12695bd2dcb52ebbc15001c8ddf019d5a7e04da056c50c1881ce269d1810259bf6d04b61f471e8751b7192fc73d4
-
Filesize
776KB
MD5ac7938b542469a1c5bb108fc046ac87b
SHA19571a4ab3359b982f0ab33b03e815df8c354b0f3
SHA2561efd1de7aef995821042509c66121a942c7ee8e004badbb4e14a10b5d7c96292
SHA512a669d873bfbe176b6e8b365178272b8666eeadc85e74a814c10e0d5217b988d8f11ef94aa495cbd9ad47d63f4483872c3e42e18c9554db7572ef14321682d257
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
39KB
MD5d536d6af55d6fdd40603aa188302fea0
SHA1cafde0fdaec80e0adf0f8190c6653599de64e6d0
SHA256765f25e12378795aef83491f0aab228e0b20f1be973dd7aac44608fddb334bce
SHA512c1ecac71c9703dc06b8eef9f0ba2f3fbcec4fc053f99acd6a2d2a11fd723c631075625a7cb85c0565f660526ae8c1cfe9621b50858213e08e6f70722be56c180
-
Filesize
8KB
MD59215015740c937980b6b53cee5087769
SHA1a0bfe95486944f1548620d4de472c3758e95d36a
SHA256a5390a297f14ef8f5be308009ec436d2a58598188dbb92d7299795a10ba1c541
SHA5125b9bbf1836466d803d3e160a38e10c8397aa3966c120ab6435a52b7d0a09eb664ef2172bf0e7e2de1cc3eae261167c9355fa7ac3b1b7e4504a7e07b82c4b90e2
-
Filesize
170KB
MD596014694a042d8344b910bc47d79337b
SHA19d19ab2f110ae58f30965a5a3d608cbf51986edb
SHA2564950eb74909bd6e739e38e57d8c6465c76ef108d65cac9f130d3f5c6d2fe943f
SHA512fe308c42b3ad2c3d73a834399aa12ea23f336103389181dface80a81da8be1ffd9a950cac802dc8a806ad318eb90a6bb6021d1acd9206a07749f83f2bb6cd03d
-
Filesize
76KB
MD574eab303bc6b579831e076ccad9f29c6
SHA117d29c26066457aee794d2f365bcf4dc4a00ef40
SHA256533cfe737cd440c7f9a65d7b47c0f082886d50bcebff287f922a27f4d10f77f0
SHA5125352fafaf6fbcd7a72383ab300b2cef462e10eafc40033cf7e605bc14d47ebd0668b518d6d0a2700befa9521bfcfd11d971fe4153aaabefa4071f017a6cc72e2