Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 10:47
Static task
static1
General
-
Target
loader.exe
-
Size
5.2MB
-
MD5
c136329a989aad9543c913f9197a01fe
-
SHA1
0b3bdab50947cf330243938c9ccb3e685c43457b
-
SHA256
9b802ef1b1e58a521a45dbd45c48c75c5b7f9ac53b273d6d2cf868c1f6d46885
-
SHA512
fa7a7efa10b4da760b7d281aa235fa4bb4ce28d12796f28632fd653ae184a6f09bc796c18ba1aa3253f713af0334d97f040dc762a8a1d25352dc7308d49b8590
-
SSDEEP
98304:fKYhdZRJ8os9WXz/DsEAE4SfTQ3+5wJCn9cK4KwrUWxeNVSreDGknLjiSXBI:CYhdo0D/D1J8+mM9Y/gNIsGkLj
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1260642604438126643/aa_UuahSUZkuOs2VlSIBCQbkyeOFMP2Ohl9qSBW53DeOIykNwknCmzQV8l5t08t9fhd5
Extracted
njrat
0.7d
HacKed
147.185.221.20:49236
6a8a3b6e5450a823d542e748a454aa4c
-
reg_key
6a8a3b6e5450a823d542e748a454aa4c
-
splitter
|'|'|
Extracted
xworm
5.0
testarosa.duckdns.org:7110
5ZpeoOe6AtQfr6wU
-
Install_directory
%AppData%
-
install_file
Ondrive.exe
Signatures
-
Detect Umbral payload 17 IoCs
resource yara_rule behavioral1/files/0x000b000000012281-8.dat family_umbral behavioral1/memory/2316-10-0x0000000000B00000-0x0000000000B40000-memory.dmp family_umbral behavioral1/memory/2244-62-0x0000000000B10000-0x0000000000B50000-memory.dmp family_umbral behavioral1/memory/1108-91-0x0000000000380000-0x00000000003C0000-memory.dmp family_umbral behavioral1/memory/1064-101-0x0000000000350000-0x0000000000390000-memory.dmp family_umbral behavioral1/memory/1956-109-0x0000000000AD0000-0x0000000000B10000-memory.dmp family_umbral behavioral1/memory/1476-119-0x00000000012F0000-0x0000000001330000-memory.dmp family_umbral behavioral1/memory/2452-128-0x00000000008A0000-0x00000000008E0000-memory.dmp family_umbral behavioral1/memory/2652-136-0x00000000000B0000-0x00000000000F0000-memory.dmp family_umbral behavioral1/memory/112-145-0x0000000000DD0000-0x0000000000E10000-memory.dmp family_umbral behavioral1/memory/1220-153-0x0000000000D50000-0x0000000000D90000-memory.dmp family_umbral behavioral1/memory/2116-157-0x00000000012B0000-0x00000000012F0000-memory.dmp family_umbral behavioral1/memory/468-198-0x0000000000270000-0x00000000002B0000-memory.dmp family_umbral behavioral1/memory/1648-199-0x0000000000F40000-0x0000000000F80000-memory.dmp family_umbral behavioral1/memory/2716-200-0x00000000011C0000-0x0000000001200000-memory.dmp family_umbral behavioral1/memory/1728-201-0x00000000002A0000-0x00000000002E0000-memory.dmp family_umbral behavioral1/memory/704-202-0x0000000000C40000-0x0000000000C80000-memory.dmp family_umbral -
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x0006000000019496-26.dat family_xworm behavioral1/memory/2820-27-0x0000000000B90000-0x0000000000BA0000-memory.dmp family_xworm behavioral1/memory/1456-159-0x0000000000D90000-0x0000000000DA0000-memory.dmp family_xworm -
pid Process 2220 powershell.exe 1728 powershell.exe 2700 powershell.exe 2900 powershell.exe 1784 powershell.exe 924 powershell.exe 1888 powershell.exe 1624 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts Aquatic.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1628 netsh.exe -
Executes dropped EXE 64 IoCs
pid Process 2316 Aquatic.exe 2328 Server.exe 2664 Server.exe 2820 conhost.exe 2732 Aquatic.exe 2556 Server.exe 3044 Server.exe 2396 conhost.exe 2244 Aquatic.exe 2196 Server.exe 1588 Server.exe 1476 conhost.exe 1084 Aquatic.exe 1308 Server.exe 1656 server.exe 1108 Aquatic.exe 2860 Server.exe 2652 Server.exe 2864 Aquatic.exe 1064 Aquatic.exe 2492 Server.exe 1716 Server.exe 328 Aquatic.exe 1956 Aquatic.exe 2420 Server.exe 1076 Server.exe 1008 Aquatic.exe 1476 Aquatic.exe 1644 Server.exe 2140 Server.exe 3056 Aquatic.exe 2452 Aquatic.exe 2672 Server.exe 1756 Server.exe 2832 Aquatic.exe 2652 Aquatic.exe 560 Server.exe 2028 Server.exe 1516 Aquatic.exe 112 Aquatic.exe 2772 Server.exe 2816 Server.exe 2840 Aquatic.exe 1220 Aquatic.exe 1076 Server.exe 2676 Server.exe 848 Aquatic.exe 2116 Aquatic.exe 2892 Server.exe 2376 Server.exe 1864 Aquatic.exe 1980 Aquatic.exe 2756 Server.exe 684 Server.exe 1060 Aquatic.exe 1456 Ondrive.exe 2044 Aquatic.exe 2568 Server.exe 1900 Server.exe 1800 Aquatic.exe 924 Aquatic.exe 2136 Server.exe 1664 Server.exe 848 Aquatic.exe -
Loads dropped DLL 1 IoCs
pid Process 2664 Server.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\6a8a3b6e5450a823d542e748a454aa4c = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\6a8a3b6e5450a823d542e748a454aa4c = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 48 discord.com 49 discord.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 44 ip-api.com 92 ip-api.com 6 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 988 cmd.exe 2908 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1504 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2908 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2128 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2820 conhost.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2900 powershell.exe 1784 powershell.exe 924 powershell.exe 1888 powershell.exe 2116 Aquatic.exe 1624 powershell.exe 2220 powershell.exe 1728 powershell.exe 2240 powershell.exe 2700 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2316 Aquatic.exe Token: SeDebugPrivilege 2820 conhost.exe Token: SeDebugPrivilege 2396 conhost.exe Token: SeIncreaseQuotaPrivilege 1220 wmic.exe Token: SeSecurityPrivilege 1220 wmic.exe Token: SeTakeOwnershipPrivilege 1220 wmic.exe Token: SeLoadDriverPrivilege 1220 wmic.exe Token: SeSystemProfilePrivilege 1220 wmic.exe Token: SeSystemtimePrivilege 1220 wmic.exe Token: SeProfSingleProcessPrivilege 1220 wmic.exe Token: SeIncBasePriorityPrivilege 1220 wmic.exe Token: SeCreatePagefilePrivilege 1220 wmic.exe Token: SeBackupPrivilege 1220 wmic.exe Token: SeRestorePrivilege 1220 wmic.exe Token: SeShutdownPrivilege 1220 wmic.exe Token: SeDebugPrivilege 1220 wmic.exe Token: SeSystemEnvironmentPrivilege 1220 wmic.exe Token: SeRemoteShutdownPrivilege 1220 wmic.exe Token: SeUndockPrivilege 1220 wmic.exe Token: SeManageVolumePrivilege 1220 wmic.exe Token: 33 1220 wmic.exe Token: 34 1220 wmic.exe Token: 35 1220 wmic.exe Token: SeIncreaseQuotaPrivilege 1220 wmic.exe Token: SeSecurityPrivilege 1220 wmic.exe Token: SeTakeOwnershipPrivilege 1220 wmic.exe Token: SeLoadDriverPrivilege 1220 wmic.exe Token: SeSystemProfilePrivilege 1220 wmic.exe Token: SeSystemtimePrivilege 1220 wmic.exe Token: SeProfSingleProcessPrivilege 1220 wmic.exe Token: SeIncBasePriorityPrivilege 1220 wmic.exe Token: SeCreatePagefilePrivilege 1220 wmic.exe Token: SeBackupPrivilege 1220 wmic.exe Token: SeRestorePrivilege 1220 wmic.exe Token: SeShutdownPrivilege 1220 wmic.exe Token: SeDebugPrivilege 1220 wmic.exe Token: SeSystemEnvironmentPrivilege 1220 wmic.exe Token: SeRemoteShutdownPrivilege 1220 wmic.exe Token: SeUndockPrivilege 1220 wmic.exe Token: SeManageVolumePrivilege 1220 wmic.exe Token: 33 1220 wmic.exe Token: 34 1220 wmic.exe Token: 35 1220 wmic.exe Token: SeDebugPrivilege 2900 powershell.exe Token: SeDebugPrivilege 1784 powershell.exe Token: SeDebugPrivilege 1476 conhost.exe Token: SeDebugPrivilege 2244 Aquatic.exe Token: SeDebugPrivilege 924 powershell.exe Token: SeDebugPrivilege 1888 powershell.exe Token: SeIncreaseQuotaPrivilege 2760 wmic.exe Token: SeSecurityPrivilege 2760 wmic.exe Token: SeTakeOwnershipPrivilege 2760 wmic.exe Token: SeLoadDriverPrivilege 2760 wmic.exe Token: SeSystemProfilePrivilege 2760 wmic.exe Token: SeSystemtimePrivilege 2760 wmic.exe Token: SeProfSingleProcessPrivilege 2760 wmic.exe Token: SeIncBasePriorityPrivilege 2760 wmic.exe Token: SeCreatePagefilePrivilege 2760 wmic.exe Token: SeBackupPrivilege 2760 wmic.exe Token: SeRestorePrivilege 2760 wmic.exe Token: SeShutdownPrivilege 2760 wmic.exe Token: SeDebugPrivilege 2760 wmic.exe Token: SeSystemEnvironmentPrivilege 2760 wmic.exe Token: SeRemoteShutdownPrivilege 2760 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2316 2208 loader.exe 31 PID 2208 wrote to memory of 2316 2208 loader.exe 31 PID 2208 wrote to memory of 2316 2208 loader.exe 31 PID 2208 wrote to memory of 2328 2208 loader.exe 32 PID 2208 wrote to memory of 2328 2208 loader.exe 32 PID 2208 wrote to memory of 2328 2208 loader.exe 32 PID 2208 wrote to memory of 2652 2208 loader.exe 33 PID 2208 wrote to memory of 2652 2208 loader.exe 33 PID 2208 wrote to memory of 2652 2208 loader.exe 33 PID 2328 wrote to memory of 2664 2328 Server.exe 34 PID 2328 wrote to memory of 2664 2328 Server.exe 34 PID 2328 wrote to memory of 2664 2328 Server.exe 34 PID 2328 wrote to memory of 2664 2328 Server.exe 34 PID 2328 wrote to memory of 2820 2328 Server.exe 35 PID 2328 wrote to memory of 2820 2328 Server.exe 35 PID 2328 wrote to memory of 2820 2328 Server.exe 35 PID 2652 wrote to memory of 2732 2652 loader.exe 36 PID 2652 wrote to memory of 2732 2652 loader.exe 36 PID 2652 wrote to memory of 2732 2652 loader.exe 36 PID 2652 wrote to memory of 2556 2652 loader.exe 37 PID 2652 wrote to memory of 2556 2652 loader.exe 37 PID 2652 wrote to memory of 2556 2652 loader.exe 37 PID 2556 wrote to memory of 3044 2556 Server.exe 38 PID 2556 wrote to memory of 3044 2556 Server.exe 38 PID 2556 wrote to memory of 3044 2556 Server.exe 38 PID 2556 wrote to memory of 3044 2556 Server.exe 38 PID 2652 wrote to memory of 2608 2652 loader.exe 39 PID 2652 wrote to memory of 2608 2652 loader.exe 39 PID 2652 wrote to memory of 2608 2652 loader.exe 39 PID 2556 wrote to memory of 2396 2556 Server.exe 40 PID 2556 wrote to memory of 2396 2556 Server.exe 40 PID 2556 wrote to memory of 2396 2556 Server.exe 40 PID 2316 wrote to memory of 1220 2316 Aquatic.exe 41 PID 2316 wrote to memory of 1220 2316 Aquatic.exe 41 PID 2316 wrote to memory of 1220 2316 Aquatic.exe 41 PID 2820 wrote to memory of 2900 2820 conhost.exe 44 PID 2820 wrote to memory of 2900 2820 conhost.exe 44 PID 2820 wrote to memory of 2900 2820 conhost.exe 44 PID 2820 wrote to memory of 1784 2820 conhost.exe 46 PID 2820 wrote to memory of 1784 2820 conhost.exe 46 PID 2820 wrote to memory of 1784 2820 conhost.exe 46 PID 2608 wrote to memory of 2244 2608 loader.exe 48 PID 2608 wrote to memory of 2244 2608 loader.exe 48 PID 2608 wrote to memory of 2244 2608 loader.exe 48 PID 2608 wrote to memory of 2196 2608 loader.exe 49 PID 2608 wrote to memory of 2196 2608 loader.exe 49 PID 2608 wrote to memory of 2196 2608 loader.exe 49 PID 2196 wrote to memory of 1588 2196 Server.exe 50 PID 2196 wrote to memory of 1588 2196 Server.exe 50 PID 2196 wrote to memory of 1588 2196 Server.exe 50 PID 2196 wrote to memory of 1588 2196 Server.exe 50 PID 2196 wrote to memory of 1476 2196 Server.exe 51 PID 2196 wrote to memory of 1476 2196 Server.exe 51 PID 2196 wrote to memory of 1476 2196 Server.exe 51 PID 2608 wrote to memory of 836 2608 loader.exe 52 PID 2608 wrote to memory of 836 2608 loader.exe 52 PID 2608 wrote to memory of 836 2608 loader.exe 52 PID 2820 wrote to memory of 924 2820 conhost.exe 53 PID 2820 wrote to memory of 924 2820 conhost.exe 53 PID 2820 wrote to memory of 924 2820 conhost.exe 53 PID 2820 wrote to memory of 1888 2820 conhost.exe 55 PID 2820 wrote to memory of 1888 2820 conhost.exe 55 PID 2820 wrote to memory of 1888 2820 conhost.exe 55 PID 2820 wrote to memory of 2128 2820 conhost.exe 57 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1988 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Roaming\Server.exe"C:\Users\Admin\AppData\Roaming\Server.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1628
-
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\conhost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'conhost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Ondrive.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:924
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Ondrive.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Ondrive" /tr "C:\Users\Admin\AppData\Roaming\Ondrive.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"3⤵
- Executes dropped EXE
PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Roaming\Server.exe"C:\Users\Admin\AppData\Roaming\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3044
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2244 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Roaming\Server.exe"C:\Users\Admin\AppData\Roaming\Server.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1588
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"4⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"5⤵
- Executes dropped EXE
PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1308
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"5⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"6⤵
- Executes dropped EXE
PID:1108 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid7⤵PID:2452
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"6⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"7⤵
- Executes dropped EXE
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"7⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"8⤵
- Executes dropped EXE
PID:1064 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid9⤵PID:2376
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2492
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"8⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"9⤵
- Executes dropped EXE
PID:328
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"9⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"10⤵
- Executes dropped EXE
PID:1956 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid11⤵PID:1744
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"10⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"11⤵
- Executes dropped EXE
PID:1008
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1076
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"11⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"12⤵
- Executes dropped EXE
PID:1476 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid13⤵PID:2276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"12⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"13⤵
- Executes dropped EXE
PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"13⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"14⤵
- Executes dropped EXE
PID:2452 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid15⤵PID:448
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"14⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"15⤵
- Executes dropped EXE
PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"15⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"16⤵
- Executes dropped EXE
PID:2652 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid17⤵PID:1784
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:560
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"16⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"17⤵
- Executes dropped EXE
PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"17⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"18⤵
- Executes dropped EXE
PID:112 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid19⤵PID:2700
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"18⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"19⤵
- Executes dropped EXE
PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"19⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"20⤵
- Executes dropped EXE
PID:1220 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid21⤵PID:1224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"20⤵
- Executes dropped EXE
PID:1076
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"20⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"21⤵
- Executes dropped EXE
PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"21⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"22⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid23⤵PID:2472
-
-
C:\Windows\system32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"23⤵
- Views/modifies file attributes
PID:1988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Aquatic.exe'23⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 223⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY23⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1728
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption23⤵PID:2288
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory23⤵PID:2772
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid23⤵PID:2612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER23⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name23⤵
- Detects videocard installed
PID:1504
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Aquatic.exe" && pause23⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:988 -
C:\Windows\system32\PING.EXEping localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"22⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"23⤵
- Executes dropped EXE
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"23⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"24⤵
- Executes dropped EXE
PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"24⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"25⤵
- Executes dropped EXE
PID:1060
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:684
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"25⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"26⤵
- Executes dropped EXE
PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"26⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"27⤵
- Executes dropped EXE
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1900
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"27⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"28⤵
- Executes dropped EXE
PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2136
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"28⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"29⤵
- Executes dropped EXE
PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"29⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"30⤵PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"30⤵
- System Location Discovery: System Language Discovery
PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"30⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"31⤵PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"31⤵
- System Location Discovery: System Language Discovery
PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"31⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"32⤵PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"32⤵PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"32⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"33⤵PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"33⤵
- System Location Discovery: System Language Discovery
PID:588
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"33⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"34⤵PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"34⤵
- System Location Discovery: System Language Discovery
PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"34⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"35⤵PID:2276
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid36⤵PID:1772
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"35⤵
- System Location Discovery: System Language Discovery
PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"35⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"36⤵PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"36⤵
- System Location Discovery: System Language Discovery
PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"36⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"37⤵PID:2472
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid38⤵PID:2448
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"37⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"37⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"38⤵PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"38⤵
- System Location Discovery: System Language Discovery
PID:604
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"38⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"39⤵PID:3032
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid40⤵PID:1264
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"39⤵
- System Location Discovery: System Language Discovery
PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"39⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"40⤵PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"40⤵
- System Location Discovery: System Language Discovery
PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"40⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"41⤵PID:3048
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid42⤵PID:1416
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"41⤵
- System Location Discovery: System Language Discovery
PID:1100
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"41⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"42⤵PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"42⤵
- System Location Discovery: System Language Discovery
PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"42⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"43⤵PID:2088
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid44⤵PID:1780
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"43⤵
- System Location Discovery: System Language Discovery
PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"43⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"44⤵PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"44⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"44⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"45⤵PID:2180
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid46⤵PID:2796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"45⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"45⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"46⤵PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"46⤵
- System Location Discovery: System Language Discovery
PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"46⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"47⤵PID:1476
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid48⤵PID:2240
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"47⤵
- System Location Discovery: System Language Discovery
PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"47⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"48⤵PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"48⤵
- System Location Discovery: System Language Discovery
PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"48⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"49⤵PID:2208
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid50⤵PID:2984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"49⤵
- System Location Discovery: System Language Discovery
PID:1156
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"49⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"50⤵PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"50⤵
- System Location Discovery: System Language Discovery
PID:1416
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"50⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"51⤵PID:1100
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid52⤵PID:2600
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"51⤵
- System Location Discovery: System Language Discovery
PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"51⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"52⤵PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"52⤵
- System Location Discovery: System Language Discovery
PID:1596
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"52⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"53⤵PID:468
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid54⤵PID:1220
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"53⤵
- System Location Discovery: System Language Discovery
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"53⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"54⤵PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"54⤵
- System Location Discovery: System Language Discovery
PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"54⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"55⤵PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"55⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"55⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"56⤵PID:1896
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"56⤵PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"56⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"57⤵PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"57⤵
- System Location Discovery: System Language Discovery
PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"57⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"58⤵PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"58⤵PID:1500
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"58⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"59⤵PID:1648
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid60⤵PID:1580
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"59⤵PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"59⤵PID:792
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"60⤵PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"60⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"60⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"61⤵PID:2552
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid62⤵PID:2948
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"61⤵
- System Location Discovery: System Language Discovery
PID:544
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"61⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"62⤵PID:2260
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"62⤵
- System Location Discovery: System Language Discovery
PID:236
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"62⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"63⤵PID:1900
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid64⤵PID:2312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"63⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"63⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"64⤵PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"64⤵
- System Location Discovery: System Language Discovery
PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"64⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"65⤵PID:2716
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid66⤵PID:1712
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"65⤵
- System Location Discovery: System Language Discovery
PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"65⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"66⤵PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"66⤵
- System Location Discovery: System Language Discovery
PID:448
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"66⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"67⤵PID:1728
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid68⤵PID:908
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"67⤵
- System Location Discovery: System Language Discovery
PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"67⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"68⤵PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"68⤵PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"68⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"C:\Users\Admin\AppData\Local\Temp\Aquatic.exe"69⤵PID:704
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"69⤵
- System Location Discovery: System Language Discovery
PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"69⤵PID:2636
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B2F134B0-7ADC-4B1E-B8FB-237A93DAD390} S-1-5-21-4177215427-74451935-3209572229-1000:JSMURNPT\Admin:Interactive:[1]1⤵PID:812
-
C:\Users\Admin\AppData\Roaming\Ondrive.exeC:\Users\Admin\AppData\Roaming\Ondrive.exe2⤵
- Executes dropped EXE
PID:1456
-
-
C:\Users\Admin\AppData\Roaming\Ondrive.exeC:\Users\Admin\AppData\Roaming\Ondrive.exe2⤵PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD556c788116da32ec8e9ac3b1b0e66b520
SHA1545f203f2bdf6fac2f131a76a5f36e21637b27ca
SHA256f67268d2659ceb1e8cf8a7560784372294bcd8f249f7c0efdf33216722a5f0bb
SHA5127da85b8e5f92f4a448a10f5c60c21f46b3eb511fda461b15956339ca7130c901e05ad58856a3a3903cdb52b81c4051d3bb0222e87aefab87136351d1ff01734f
-
Filesize
71KB
MD5f9b08bd21b40a938122b479095b7c70c
SHA1eb925e3927b83c20d8d24bdab2e587c10d6ac8cd
SHA256c96cde2e96021c266a202286d644ceb28543d6347e21006d72b29b8a72c505e8
SHA512fcc5784936b7f85a550883c472b99b5edfa7e5c6fd3872fd806b81c2ce1f195ca34342b230a89456066885579fe55aea46d91074ac08af192fbd04ea158473ee
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5b5211156bb5ba4138c9cac1f00c28eac
SHA1998d1c1823742105d11f9401a79525d05fb1481a
SHA2565a7504f2676b8f5f63792624799d52103b75ebb217f0370deb2ff84500687b39
SHA51295f41c52894d02e1499ed709bbf90907726041d152cbead09fc9af71162c66dae15dc5650bcd52571078667c9205dfc6bcc8f1f2c13852841ae1dc53c1f0ac4e
-
Filesize
23KB
MD532fe01ccb93b0233503d0aaaa451f7b2
SHA158e5a63142150e8fb175dbb4dedea2ce405d7db0
SHA2566988ee719a54c93a89303dcff277c62ae4890274cc45f074bc7effde315fbf43
SHA51276945f23a49d594e325d80ffc0570341044ac0b97bd889c92f90bc56d3cdff5c1b29178be4f157c8c1bb9ce7cc311765309f2e6f7b08b24e7acf983ea67635a6
-
Filesize
37KB
MD5b37dd1a1f0507baf993471ae1b7a314c
SHA19aff9d71492ffff8d51f8e8d67f5770755899882
SHA256e58e8918a443c0061add029f8f211f6551a130202195cc2b9b529ea72553e0bc
SHA512ac76d5b10540eb292341f30c7abfd81f03be65f6655c814aba6ac6a0ecf4f0f2c34c3b8e63ceef8c4579f98b7459e51b9fdd30d601c6d1930860ab7c154da460