Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 21:17
Static task
static1
Behavioral task
behavioral1
Sample
01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe
Resource
win10v2004-20241007-en
General
-
Target
01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe
-
Size
1.2MB
-
MD5
46feda17e80f3d49da421376b8ed69f0
-
SHA1
7f07a79d769261a5d51d5d74d878b2dc231eb6d2
-
SHA256
01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5
-
SHA512
d21cf60bfba3424895946180001e43e052ce028bb018950853205e0d6808a3c967de94bd23eb1b2a75440544404822a8569aab29cd776146965a8aacb7b77e6a
-
SSDEEP
12288:VNcWyda1DbJ0No0RJTTlTTJMtB6eSRV5txtIMzJTTlTTruAN6DbhQnNmWEOwoU8L:zcx4DEoSMKeYKMqnenNmWbjU8CcXjFg
Malware Config
Extracted
xworm
5.0
159.65.24.61:7812
ApBO5aKkoFf776MU
-
Install_directory
%AppData%
-
install_file
Windows Defender Service.exe
-
telegram
https://api.telegram.org/bot7308504158:AAGvjg5ZWkkItSzfmQZs_qu73xKZ_gWVkJI/sendMessage?chat_id=6291749148
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
185.252.232.158:7812
64.23.232.116:7812
vsvf
-
delay
1
-
install
true
-
install_file
Windows Security Health Service.exe
-
install_folder
%AppData%
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7479631857:AAFuIUMNJYKHzJ3Bc9t4FSh9ZQXlqymhFnk/sendMessage?chat_id=6291749148
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000a000000023c49-6.dat family_xworm behavioral2/memory/4996-24-0x0000000000F60000-0x0000000000F70000-memory.dmp family_xworm -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023ca4-17.dat family_stormkitty behavioral2/memory/2356-82-0x0000000000EC0000-0x0000000000EF0000-memory.dmp family_stormkitty -
resource yara_rule behavioral2/files/0x0007000000023ca7-51.dat VenomRAT behavioral2/memory/2784-83-0x00000000003D0000-0x00000000003E8000-memory.dmp VenomRAT -
Async RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023ca4-17.dat family_asyncrat behavioral2/files/0x0007000000023ca7-51.dat family_asyncrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Windows Defender Service.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Cracked.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender Service.lnk Windows Defender Service.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender Service.lnk Windows Defender Service.exe -
Executes dropped EXE 11 IoCs
pid Process 4996 Windows Defender Service.exe 2356 svchost.exe 1680 AdobeUpdate.exe 5064 crack.exe 2784 Cracked.exe 3552 Flash USDT Sender.exe 4000 windows update.exe 1960 Windows Security Health Service.exe 3536 Windows Defender Service.exe 1492 Windows Defender Service.exe 2280 Windows Defender Service.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeUpdate.exe" AdobeUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender Service = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Defender Service.exe" Windows Defender Service.exe -
Drops desktop.ini file(s) 7 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\8899e7c8792d7db7208cab0c91beba96\Admin@KBKWGEBK_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\8899e7c8792d7db7208cab0c91beba96\Admin@KBKWGEBK_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\8899e7c8792d7db7208cab0c91beba96\Admin@KBKWGEBK_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\8899e7c8792d7db7208cab0c91beba96\Admin@KBKWGEBK_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\8899e7c8792d7db7208cab0c91beba96\Admin@KBKWGEBK_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\8899e7c8792d7db7208cab0c91beba96\Admin@KBKWGEBK_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\8899e7c8792d7db7208cab0c91beba96\Admin@KBKWGEBK_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flash USDT Sender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 3756 cmd.exe 4580 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 4708 timeout.exe 1012 timeout.exe -
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Flash USDT Sender.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings Flash USDT Sender.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" Flash USDT Sender.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Flash USDT Sender.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Flash USDT Sender.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Flash USDT Sender.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3036 schtasks.exe 1924 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1680 AdobeUpdate.exe 4996 Windows Defender Service.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 2784 Cracked.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 2356 svchost.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 2356 svchost.exe 2356 svchost.exe 2356 svchost.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe 1960 Windows Security Health Service.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4996 Windows Defender Service.exe Token: SeDebugPrivilege 2784 Cracked.exe Token: SeDebugPrivilege 2356 svchost.exe Token: SeDebugPrivilege 5064 crack.exe Token: SeDebugPrivilege 2784 Cracked.exe Token: SeDebugPrivilege 1960 Windows Security Health Service.exe Token: SeDebugPrivilege 1960 Windows Security Health Service.exe Token: SeDebugPrivilege 3536 Windows Defender Service.exe Token: SeDebugPrivilege 1492 Windows Defender Service.exe Token: SeDebugPrivilege 2280 Windows Defender Service.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3552 Flash USDT Sender.exe 1960 Windows Security Health Service.exe 3552 Flash USDT Sender.exe 3552 Flash USDT Sender.exe 3552 Flash USDT Sender.exe 3552 Flash USDT Sender.exe 3552 Flash USDT Sender.exe 3552 Flash USDT Sender.exe 3552 Flash USDT Sender.exe 3552 Flash USDT Sender.exe 3552 Flash USDT Sender.exe 3552 Flash USDT Sender.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 1852 wrote to memory of 4996 1852 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 83 PID 1852 wrote to memory of 4996 1852 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 83 PID 1852 wrote to memory of 2356 1852 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 84 PID 1852 wrote to memory of 2356 1852 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 84 PID 1852 wrote to memory of 2356 1852 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 84 PID 1852 wrote to memory of 1680 1852 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 85 PID 1852 wrote to memory of 1680 1852 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 85 PID 1852 wrote to memory of 5064 1852 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 86 PID 1852 wrote to memory of 5064 1852 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 86 PID 1852 wrote to memory of 5064 1852 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 86 PID 1852 wrote to memory of 2784 1852 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 87 PID 1852 wrote to memory of 2784 1852 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 87 PID 1852 wrote to memory of 4000 1852 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 88 PID 1852 wrote to memory of 4000 1852 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 88 PID 1852 wrote to memory of 4000 1852 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 88 PID 1852 wrote to memory of 3552 1852 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 89 PID 1852 wrote to memory of 3552 1852 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 89 PID 1852 wrote to memory of 3552 1852 01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe 89 PID 4996 wrote to memory of 3036 4996 Windows Defender Service.exe 92 PID 4996 wrote to memory of 3036 4996 Windows Defender Service.exe 92 PID 2784 wrote to memory of 3896 2784 Cracked.exe 94 PID 2784 wrote to memory of 3896 2784 Cracked.exe 94 PID 2784 wrote to memory of 4852 2784 Cracked.exe 95 PID 2784 wrote to memory of 4852 2784 Cracked.exe 95 PID 4852 wrote to memory of 4708 4852 cmd.exe 98 PID 4852 wrote to memory of 4708 4852 cmd.exe 98 PID 3896 wrote to memory of 1924 3896 cmd.exe 99 PID 3896 wrote to memory of 1924 3896 cmd.exe 99 PID 5064 wrote to memory of 1972 5064 crack.exe 100 PID 5064 wrote to memory of 1972 5064 crack.exe 100 PID 5064 wrote to memory of 1972 5064 crack.exe 100 PID 1972 wrote to memory of 1012 1972 cmd.exe 103 PID 1972 wrote to memory of 1012 1972 cmd.exe 103 PID 1972 wrote to memory of 1012 1972 cmd.exe 103 PID 4852 wrote to memory of 1960 4852 cmd.exe 105 PID 4852 wrote to memory of 1960 4852 cmd.exe 105 PID 2356 wrote to memory of 3756 2356 svchost.exe 107 PID 2356 wrote to memory of 3756 2356 svchost.exe 107 PID 2356 wrote to memory of 3756 2356 svchost.exe 107 PID 3756 wrote to memory of 1048 3756 cmd.exe 109 PID 3756 wrote to memory of 1048 3756 cmd.exe 109 PID 3756 wrote to memory of 1048 3756 cmd.exe 109 PID 3756 wrote to memory of 4580 3756 cmd.exe 110 PID 3756 wrote to memory of 4580 3756 cmd.exe 110 PID 3756 wrote to memory of 4580 3756 cmd.exe 110 PID 3756 wrote to memory of 4708 3756 cmd.exe 111 PID 3756 wrote to memory of 4708 3756 cmd.exe 111 PID 3756 wrote to memory of 4708 3756 cmd.exe 111 PID 2356 wrote to memory of 4852 2356 svchost.exe 112 PID 2356 wrote to memory of 4852 2356 svchost.exe 112 PID 2356 wrote to memory of 4852 2356 svchost.exe 112 PID 4852 wrote to memory of 2148 4852 cmd.exe 114 PID 4852 wrote to memory of 2148 4852 cmd.exe 114 PID 4852 wrote to memory of 2148 4852 cmd.exe 114 PID 4852 wrote to memory of 1544 4852 cmd.exe 115 PID 4852 wrote to memory of 1544 4852 cmd.exe 115 PID 4852 wrote to memory of 1544 4852 cmd.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe"C:\Users\Admin\AppData\Local\Temp\01f20bc6aeea3f99b634c203f16d3eb6298ed184c824cffdd16895385922bde5N.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Roaming\Windows Defender Service.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Service.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Defender Service" /tr "C:\Users\Admin\AppData\Roaming\Windows Defender Service.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3036
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:1048
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4580
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵
- System Location Discovery: System Language Discovery
PID:4708
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:2148
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1544
-
-
-
-
C:\Users\Admin\AppData\Roaming\AdobeUpdate.exe"C:\Users\Admin\AppData\Roaming\AdobeUpdate.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
PID:1680
-
-
C:\Users\Admin\AppData\Roaming\crack.exe"C:\Users\Admin\AppData\Roaming\crack.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC6BB.tmp.cmd""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\timeout.exetimeout 44⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1012
-
-
-
-
C:\Users\Admin\AppData\Roaming\Cracked.exe"C:\Users\Admin\AppData\Roaming\Cracked.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows Security Health Service" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows Security Health Service" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:1924
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC5F0.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:4708
-
-
C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1960
-
-
-
-
C:\Users\Admin\AppData\Roaming\windows update.exe"C:\Users\Admin\AppData\Roaming\windows update.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4000
-
-
C:\Users\Admin\AppData\Roaming\Flash USDT Sender.exe"C:\Users\Admin\AppData\Roaming\Flash USDT Sender.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3552
-
-
C:\Users\Admin\AppData\Roaming\Windows Defender Service.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Service.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
C:\Users\Admin\AppData\Roaming\Windows Defender Service.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Service.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
C:\Users\Admin\AppData\Roaming\Windows Defender Service.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Service.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2280
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD52ef8781369f660c4e873bdf5fbf863d4
SHA19019ae66bdf78d020d227818bc5e01a85e8b55da
SHA256785b5317fd88eefc626c2dd90344b203d0c7759c36070b62a9a0e58524cdedb9
SHA5127cd75445fb792d367b7bd9fb1465a29f170bb92b01f3113bf7d43caf539fde4654d8b70c273cf0fe1f78e1491d17d7157107d5493a7099a34a0820338b2fcc62
-
C:\Users\Admin\AppData\Local\8899e7c8792d7db7208cab0c91beba96\Admin@KBKWGEBK_en-US\Browsers\Firefox\Bookmarks.txt
Filesize105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
C:\Users\Admin\AppData\Local\8899e7c8792d7db7208cab0c91beba96\Admin@KBKWGEBK_en-US\System\Process.txt
Filesize4KB
MD5c6b914faa91196c8467f4732b78d98dc
SHA16c4dd5b04e58c9c01d32fa3b2797c19e924bb21b
SHA256a70a23ccabea9e0a71ffe157a7eb7e6b770d4dd1a7ab6d89120d77f3073b672a
SHA512b12ad415b156f4309c0958dd20b1405a3fff0b1cc1effc6fd5c5c1236db2d079ec61b58ea2eabf7d8c91ad94dd5cee65da46187018dbc7d55b7a128b236c05b5
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
175B
MD57ba39056a6006e0f05fc7a420cfe7278
SHA16ec09c08704ddba4b8be13064c5a8ff6245fcff4
SHA256cec51b123cb1a96b87878576e4c7b840f77d009b9ab6f4b9b7289b0211d96538
SHA51213cc9d0e2dde86f1e37e8b6f314303c098dee2c1d02e9c8a27f7a6e4e553ef85fe5dc1de1f0f3c84f508a57e9de57de12039952c6135f82da0bb42afd820c9c1
-
Filesize
151B
MD549b6d28ba22355fc92e5a4ab6234be07
SHA14e92fc1b92bf504c5cb01339850bb9005891e1f2
SHA2560a5ffe1c5446d54a4da1487100f47a8a2e08aed1eb3e053ef948d4735dd5c998
SHA512a3d451493493b6bad97f1093a216e749fbab33caf261e5703c57436bf85cac03a62569a1df5ba8eb7de96e9dc26d3894d0da65e71bcd9610808e018c9f651d7e
-
Filesize
10KB
MD5bb2f6ec73b6646fb1d674763a060b42b
SHA1dbdaed5d56e6a54bdefc352a12f8436a73c3cd9d
SHA2560f5c554a665e05341d97ffbe3b7facbcb2043e50d079457fc54cd762cdeb11de
SHA5129df8a285a80a8d1a6ea43163cd32dba72a8ee3bfbc96cc4a96917a60b9fd07a13da8c7abac41052db1b263e64dd5acf62820cbafad685d36e3c9ae3f607c56f8
-
Filesize
74KB
MD50dfa83a82f6418c73406d78296de61be
SHA1dd7eceef8a434c43e0751e180bf714e08771d336
SHA2568d27369ffa8b29d561fa9daf485be14d2fc00287bb1c69d4c84d514891c8db5e
SHA5129a4b026250b18c29ab7dd48203f321c2ef2f12695bd2dcb52ebbc15001c8ddf019d5a7e04da056c50c1881ce269d1810259bf6d04b61f471e8751b7192fc73d4
-
Filesize
776KB
MD5ac7938b542469a1c5bb108fc046ac87b
SHA19571a4ab3359b982f0ab33b03e815df8c354b0f3
SHA2561efd1de7aef995821042509c66121a942c7ee8e004badbb4e14a10b5d7c96292
SHA512a669d873bfbe176b6e8b365178272b8666eeadc85e74a814c10e0d5217b988d8f11ef94aa495cbd9ad47d63f4483872c3e42e18c9554db7572ef14321682d257
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
39KB
MD5d536d6af55d6fdd40603aa188302fea0
SHA1cafde0fdaec80e0adf0f8190c6653599de64e6d0
SHA256765f25e12378795aef83491f0aab228e0b20f1be973dd7aac44608fddb334bce
SHA512c1ecac71c9703dc06b8eef9f0ba2f3fbcec4fc053f99acd6a2d2a11fd723c631075625a7cb85c0565f660526ae8c1cfe9621b50858213e08e6f70722be56c180
-
Filesize
8KB
MD59215015740c937980b6b53cee5087769
SHA1a0bfe95486944f1548620d4de472c3758e95d36a
SHA256a5390a297f14ef8f5be308009ec436d2a58598188dbb92d7299795a10ba1c541
SHA5125b9bbf1836466d803d3e160a38e10c8397aa3966c120ab6435a52b7d0a09eb664ef2172bf0e7e2de1cc3eae261167c9355fa7ac3b1b7e4504a7e07b82c4b90e2
-
Filesize
170KB
MD596014694a042d8344b910bc47d79337b
SHA19d19ab2f110ae58f30965a5a3d608cbf51986edb
SHA2564950eb74909bd6e739e38e57d8c6465c76ef108d65cac9f130d3f5c6d2fe943f
SHA512fe308c42b3ad2c3d73a834399aa12ea23f336103389181dface80a81da8be1ffd9a950cac802dc8a806ad318eb90a6bb6021d1acd9206a07749f83f2bb6cd03d
-
Filesize
76KB
MD574eab303bc6b579831e076ccad9f29c6
SHA117d29c26066457aee794d2f365bcf4dc4a00ef40
SHA256533cfe737cd440c7f9a65d7b47c0f082886d50bcebff287f922a27f4d10f77f0
SHA5125352fafaf6fbcd7a72383ab300b2cef462e10eafc40033cf7e605bc14d47ebd0668b518d6d0a2700befa9521bfcfd11d971fe4153aaabefa4071f017a6cc72e2