Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 23:12
Static task
static1
Behavioral task
behavioral1
Sample
ec214cd4f4d6a7bdee07525701843db8d6596871cf9c352c7cfcd4cc788580c6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec214cd4f4d6a7bdee07525701843db8d6596871cf9c352c7cfcd4cc788580c6N.exe
Resource
win10v2004-20241007-en
General
-
Target
ec214cd4f4d6a7bdee07525701843db8d6596871cf9c352c7cfcd4cc788580c6N.exe
-
Size
2.6MB
-
MD5
ddfaf870ff5954cccaac3a1c0427ac30
-
SHA1
e85d7abec385488927252315f445172787d248d4
-
SHA256
ec214cd4f4d6a7bdee07525701843db8d6596871cf9c352c7cfcd4cc788580c6
-
SHA512
5ce96610289e1bf4436622cbbbfe51e263baeb03487484f1e596d1c13ce4ffb82de69c657ee760b0c8d744147bc34f3d96324ef5ee8bff29ba3cb5713df6ae8a
-
SSDEEP
24576:ObCj2sObHtqQ4QEfCr7w7yvuqqNq8FroaSaPXRackmrM4Biq7MhLv9GImmVfq4ei:ObCjPKNqQEfsw43qtmVfq4v
Malware Config
Extracted
Protocol: smtp- Host:
smtp.mail.me.com - Port:
587 - Username:
[email protected] - Password:
RICHARD205lord
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1072 jhdfkldfhndfkjdfnbfklfnf.exe 3804 winmgr119.exe 2436 winmgr119.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts cvtres.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jhdfkldfhndfkjdfnbfklfnf = "C:\\ProgramData\\jhdfkldfhndfkjdfnbfklfnf.exe" ec214cd4f4d6a7bdee07525701843db8d6596871cf9c352c7cfcd4cc788580c6N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jhdfkldfhndfkjdfnbfklfnf = "C:\\ProgramData\\jhdfkldfhndfkjdfnbfklfnf.exe" jhdfkldfhndfkjdfnbfklfnf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 icanhazip.com 16 ipinfo.io -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000f000000023b4a-3.dat autoit_exe behavioral2/files/0x0008000000023c86-43.dat autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1072 set thread context of 4256 1072 jhdfkldfhndfkjdfnbfklfnf.exe 87 PID 4256 set thread context of 1852 4256 RegAsm.exe 91 PID 4256 set thread context of 4140 4256 RegAsm.exe 93 PID 4256 set thread context of 4784 4256 RegAsm.exe 95 -
resource yara_rule behavioral2/memory/1852-13-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/1852-14-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/1852-15-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/1852-21-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/4140-24-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4140-26-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4140-25-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4140-28-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 4 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\ec214cd4f4d6a7bdee07525701843db8d6596871cf9c352c7cfcd4cc788580c6N.exe:Zone.Identifier:$DATA ec214cd4f4d6a7bdee07525701843db8d6596871cf9c352c7cfcd4cc788580c6N.exe File created C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe:Zone.Identifier:$DATA jhdfkldfhndfkjdfnbfklfnf.exe File created C:\ProgramData\winmgr119.exe:Zone.Identifier:$DATA winmgr119.exe File opened for modification C:\ProgramData\winmgr119.exe:Zone.Identifier:$DATA winmgr119.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhdfkldfhndfkjdfnbfklfnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winmgr119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winmgr119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec214cd4f4d6a7bdee07525701843db8d6596871cf9c352c7cfcd4cc788580c6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
NTFS ADS 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\ec214cd4f4d6a7bdee07525701843db8d6596871cf9c352c7cfcd4cc788580c6N.exe:Zone.Identifier:$DATA ec214cd4f4d6a7bdee07525701843db8d6596871cf9c352c7cfcd4cc788580c6N.exe File created C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe:Zone.Identifier:$DATA jhdfkldfhndfkjdfnbfklfnf.exe File created C:\ProgramData\winmgr119.exe:Zone.Identifier:$DATA winmgr119.exe File opened for modification C:\ProgramData\winmgr119.exe:Zone.Identifier:$DATA winmgr119.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 27 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1224 schtasks.exe 1940 schtasks.exe 1096 schtasks.exe 4824 schtasks.exe 764 schtasks.exe 3160 schtasks.exe 4456 schtasks.exe 2504 schtasks.exe 3352 schtasks.exe 3180 schtasks.exe 4448 schtasks.exe 4348 schtasks.exe 2544 schtasks.exe 3980 schtasks.exe 4568 schtasks.exe 916 schtasks.exe 1640 schtasks.exe 4584 schtasks.exe 1424 schtasks.exe 3288 schtasks.exe 1720 schtasks.exe 4412 schtasks.exe 3660 schtasks.exe 1056 schtasks.exe 5028 schtasks.exe 5088 schtasks.exe 412 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4292 ec214cd4f4d6a7bdee07525701843db8d6596871cf9c352c7cfcd4cc788580c6N.exe 4292 ec214cd4f4d6a7bdee07525701843db8d6596871cf9c352c7cfcd4cc788580c6N.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 4256 RegAsm.exe 4256 RegAsm.exe 4256 RegAsm.exe 4256 RegAsm.exe 4256 RegAsm.exe 4256 RegAsm.exe 4256 RegAsm.exe 4256 RegAsm.exe 4256 RegAsm.exe 4256 RegAsm.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 4256 RegAsm.exe 4256 RegAsm.exe 4256 RegAsm.exe 4256 RegAsm.exe 4256 RegAsm.exe 4256 RegAsm.exe 3804 winmgr119.exe 3804 winmgr119.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 4256 RegAsm.exe 4256 RegAsm.exe 4256 RegAsm.exe 4256 RegAsm.exe 4256 RegAsm.exe 4256 RegAsm.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe 1072 jhdfkldfhndfkjdfnbfklfnf.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4256 RegAsm.exe Token: SeDebugPrivilege 1852 cvtres.exe Token: SeDebugPrivilege 4140 cvtres.exe Token: SeDebugPrivilege 4784 cvtres.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4256 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4292 wrote to memory of 1072 4292 ec214cd4f4d6a7bdee07525701843db8d6596871cf9c352c7cfcd4cc788580c6N.exe 86 PID 4292 wrote to memory of 1072 4292 ec214cd4f4d6a7bdee07525701843db8d6596871cf9c352c7cfcd4cc788580c6N.exe 86 PID 4292 wrote to memory of 1072 4292 ec214cd4f4d6a7bdee07525701843db8d6596871cf9c352c7cfcd4cc788580c6N.exe 86 PID 1072 wrote to memory of 4256 1072 jhdfkldfhndfkjdfnbfklfnf.exe 87 PID 1072 wrote to memory of 4256 1072 jhdfkldfhndfkjdfnbfklfnf.exe 87 PID 1072 wrote to memory of 4256 1072 jhdfkldfhndfkjdfnbfklfnf.exe 87 PID 1072 wrote to memory of 4256 1072 jhdfkldfhndfkjdfnbfklfnf.exe 87 PID 1072 wrote to memory of 4256 1072 jhdfkldfhndfkjdfnbfklfnf.exe 87 PID 1072 wrote to memory of 1720 1072 jhdfkldfhndfkjdfnbfklfnf.exe 88 PID 1072 wrote to memory of 1720 1072 jhdfkldfhndfkjdfnbfklfnf.exe 88 PID 1072 wrote to memory of 1720 1072 jhdfkldfhndfkjdfnbfklfnf.exe 88 PID 4256 wrote to memory of 1852 4256 RegAsm.exe 91 PID 4256 wrote to memory of 1852 4256 RegAsm.exe 91 PID 4256 wrote to memory of 1852 4256 RegAsm.exe 91 PID 4256 wrote to memory of 1852 4256 RegAsm.exe 91 PID 4256 wrote to memory of 1852 4256 RegAsm.exe 91 PID 4256 wrote to memory of 1852 4256 RegAsm.exe 91 PID 4256 wrote to memory of 1852 4256 RegAsm.exe 91 PID 4256 wrote to memory of 4140 4256 RegAsm.exe 93 PID 4256 wrote to memory of 4140 4256 RegAsm.exe 93 PID 4256 wrote to memory of 4140 4256 RegAsm.exe 93 PID 4256 wrote to memory of 4140 4256 RegAsm.exe 93 PID 4256 wrote to memory of 4140 4256 RegAsm.exe 93 PID 4256 wrote to memory of 4140 4256 RegAsm.exe 93 PID 4256 wrote to memory of 4140 4256 RegAsm.exe 93 PID 4256 wrote to memory of 4784 4256 RegAsm.exe 95 PID 4256 wrote to memory of 4784 4256 RegAsm.exe 95 PID 4256 wrote to memory of 4784 4256 RegAsm.exe 95 PID 4256 wrote to memory of 4784 4256 RegAsm.exe 95 PID 4256 wrote to memory of 4784 4256 RegAsm.exe 95 PID 4256 wrote to memory of 4784 4256 RegAsm.exe 95 PID 1072 wrote to memory of 1056 1072 jhdfkldfhndfkjdfnbfklfnf.exe 97 PID 1072 wrote to memory of 1056 1072 jhdfkldfhndfkjdfnbfklfnf.exe 97 PID 1072 wrote to memory of 1056 1072 jhdfkldfhndfkjdfnbfklfnf.exe 97 PID 1072 wrote to memory of 4568 1072 jhdfkldfhndfkjdfnbfklfnf.exe 99 PID 1072 wrote to memory of 4568 1072 jhdfkldfhndfkjdfnbfklfnf.exe 99 PID 1072 wrote to memory of 4568 1072 jhdfkldfhndfkjdfnbfklfnf.exe 99 PID 1072 wrote to memory of 3180 1072 jhdfkldfhndfkjdfnbfklfnf.exe 104 PID 1072 wrote to memory of 3180 1072 jhdfkldfhndfkjdfnbfklfnf.exe 104 PID 1072 wrote to memory of 3180 1072 jhdfkldfhndfkjdfnbfklfnf.exe 104 PID 1072 wrote to memory of 916 1072 jhdfkldfhndfkjdfnbfklfnf.exe 107 PID 1072 wrote to memory of 916 1072 jhdfkldfhndfkjdfnbfklfnf.exe 107 PID 1072 wrote to memory of 916 1072 jhdfkldfhndfkjdfnbfklfnf.exe 107 PID 1072 wrote to memory of 5028 1072 jhdfkldfhndfkjdfnbfklfnf.exe 109 PID 1072 wrote to memory of 5028 1072 jhdfkldfhndfkjdfnbfklfnf.exe 109 PID 1072 wrote to memory of 5028 1072 jhdfkldfhndfkjdfnbfklfnf.exe 109 PID 1072 wrote to memory of 1640 1072 jhdfkldfhndfkjdfnbfklfnf.exe 111 PID 1072 wrote to memory of 1640 1072 jhdfkldfhndfkjdfnbfklfnf.exe 111 PID 1072 wrote to memory of 1640 1072 jhdfkldfhndfkjdfnbfklfnf.exe 111 PID 1072 wrote to memory of 4456 1072 jhdfkldfhndfkjdfnbfklfnf.exe 113 PID 1072 wrote to memory of 4456 1072 jhdfkldfhndfkjdfnbfklfnf.exe 113 PID 1072 wrote to memory of 4456 1072 jhdfkldfhndfkjdfnbfklfnf.exe 113 PID 1072 wrote to memory of 1940 1072 jhdfkldfhndfkjdfnbfklfnf.exe 115 PID 1072 wrote to memory of 1940 1072 jhdfkldfhndfkjdfnbfklfnf.exe 115 PID 1072 wrote to memory of 1940 1072 jhdfkldfhndfkjdfnbfklfnf.exe 115 PID 1072 wrote to memory of 1096 1072 jhdfkldfhndfkjdfnbfklfnf.exe 118 PID 1072 wrote to memory of 1096 1072 jhdfkldfhndfkjdfnbfklfnf.exe 118 PID 1072 wrote to memory of 1096 1072 jhdfkldfhndfkjdfnbfklfnf.exe 118 PID 1072 wrote to memory of 4824 1072 jhdfkldfhndfkjdfnbfklfnf.exe 120 PID 1072 wrote to memory of 4824 1072 jhdfkldfhndfkjdfnbfklfnf.exe 120 PID 1072 wrote to memory of 4824 1072 jhdfkldfhndfkjdfnbfklfnf.exe 120 PID 1072 wrote to memory of 3160 1072 jhdfkldfhndfkjdfnbfklfnf.exe 122 PID 1072 wrote to memory of 3160 1072 jhdfkldfhndfkjdfnbfklfnf.exe 122 PID 1072 wrote to memory of 3160 1072 jhdfkldfhndfkjdfnbfklfnf.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec214cd4f4d6a7bdee07525701843db8d6596871cf9c352c7cfcd4cc788580c6N.exe"C:\Users\Admin\AppData\Local\Temp\ec214cd4f4d6a7bdee07525701843db8d6596871cf9c352c7cfcd4cc788580c6N.exe"1⤵
- Adds Run key to start application
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exeC:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe03⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp19AD.tmp"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp1C7D.tmp"4⤵
- Accesses Microsoft Outlook accounts
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp1CCC.tmp"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1720
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1056
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4568
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3180
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:916
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5028
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1640
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4456
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1940
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1096
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4824
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3160
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4348
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:764
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3352
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5088
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2544
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4448
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4412
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:412
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3980
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4584
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1424
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3660
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3288
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2504
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1224
-
-
-
C:\ProgramData\winmgr119.exeC:\ProgramData\winmgr119.exe1⤵
- Executes dropped EXE
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
C:\ProgramData\winmgr119.exeC:\ProgramData\winmgr119.exe1⤵
- Executes dropped EXE
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2436
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5dc117e1b966ce770369b5f2a180f156c
SHA14c2c374202d32a56d88886d462c177825dbc4282
SHA256fe8bb1c7515675985d3124b6de346e18c5359754999cc44640dd06917bd0c936
SHA512598c60c971e09d0580f5c8b911c933b5074b1f8a238207c3318415e99cdbc10769839ab8eecb3172da12295b432d6ed4dd737334eaed55100bb175bbd38d9785
-
Filesize
8B
MD5b707174a02cad07e5502a93693f75e0e
SHA164e5d80340716df4d753fbfeadeac8536401faf4
SHA256a414f1efa66cb6517439d2fdaab21ca933493803257182199c28df775e579e5d
SHA512dcb299404952bb9c443fa6b4c40ea0e6781d35c3d5b16b217fd81e407d8827c7dffdf16969e1f829afcb12ee0a49482487203e34d725ee379195d5bfe505eb91
-
Filesize
2.6MB
MD565a1d486cab240588a14f7d61bb572ad
SHA1be6889284b23fd5e46d67aa13a27b00d88ed8d08
SHA2569be7e5620bfefa7df65f07c24dd01059c580421139e86769f6cb90f2257e4deb
SHA512e8979dd6d4f57a5a770c585f69425aa29378d34ac0a0bf736133476c32c3421190c4e07970fed43be95fea9c466690c168f38eea966ed1eacb551db8039aa693
-
Filesize
1KB
MD5b0cc2e6f2d8036c9b5fef218736fa9c9
SHA164fd3017625979c95ba09d7cbea201010a82f73f
SHA256997aceeb78143e057d4ea0ed699db3cc1c723f699b4532663b7b85c83baa5c50
SHA512a1fe80b2971c4d1141a594f27eaea61500bf701cd1b8fbdb5ac2204a63c8ef862344f8c30f65ce769f0acf2b0718ed33a02744dd1a152c4a62a5318333d29b9b
-
Filesize
400B
MD5de4e5ff058882957cf8a3b5f839a031f
SHA10b3d8279120fb5fa27efbd9eee89695aa040fc24
SHA256ef54f46b9f1e342fc12e035ae94f57c61ea4e8be4e116f0a1c6f86310f400f49
SHA512a6b0d557e9eec4e56630e5ba64495df318f4fd959fffbdcbf77831185b067906917c9117a0ecd6ac817c7860d5d831cce15820d715657d81e2d817d9fab9fb72
-
Filesize
391B
MD53525ea58bba48993ea0d01b65ea71381
SHA11b917678fdd969e5ee5916e5899e7c75a979cf4d
SHA256681bcee53cf679ac674e700136f9229b9184fe60ed6410dbd7a33d462ed13ae2
SHA5125aad8dca43ec85882daf50c469bd04dcf0b62affc8bc605b3e289496a2679d4d548fea8bb0aea7080bbfbcdcab9d275fc6797b9c95b64f9f97ecf79583a83986