Analysis

  • max time kernel
    227s
  • max time network
    212s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2024 20:36

General

  • Target

    http://anasrdrctf.com/Ths79saSbnSvVBsGshJAsgALisY2a

Malware Config

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://anasrdrctf.com/Ths79saSbnSvVBsGshJAsgALisY2a
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3492
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff697146f8,0x7fff69714708,0x7fff69714718
      2⤵
        PID:1544
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:2
        2⤵
          PID:3440
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1860
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2576 /prefetch:8
          2⤵
            PID:2196
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:1
            2⤵
              PID:5084
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1
              2⤵
                PID:232
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:1
                2⤵
                  PID:764
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:8
                  2⤵
                    PID:5020
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4960
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:1
                    2⤵
                      PID:3932
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:1
                      2⤵
                        PID:1420
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:1
                        2⤵
                          PID:2400
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:1
                          2⤵
                            PID:428
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:1
                            2⤵
                              PID:2780
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5896 /prefetch:8
                              2⤵
                                PID:3984
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:1
                                2⤵
                                  PID:1564
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:1
                                  2⤵
                                    PID:1876
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:1
                                    2⤵
                                      PID:5296
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:1
                                      2⤵
                                        PID:5304
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5980 /prefetch:8
                                        2⤵
                                          PID:5480
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6252 /prefetch:1
                                          2⤵
                                            PID:5488
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6240 /prefetch:8
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:5500
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,4840040469370219012,17678648421701855060,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5676 /prefetch:2
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:4572
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:4212
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:4872
                                            • C:\Windows\system32\AUDIODG.EXE
                                              C:\Windows\system32\AUDIODG.EXE 0x244 0x40c
                                              1⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2432
                                            • C:\Windows\System32\rundll32.exe
                                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                              1⤵
                                                PID:5256
                                              • C:\Program Files\7-Zip\7zG.exe
                                                "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\♯setupfree♯passc0de∻open∻9192-\" -spe -an -ai#7zMap10653:122:7zEvent26672
                                                1⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of FindShellTrayWindow
                                                PID:5148
                                              • C:\Program Files\7-Zip\7zG.exe
                                                "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\♯setupfree♯passc0de∻open∻9192-\♯setupfree♯passc0de∻open∻9192∻\♯setupfree♯passc0de∻open∻9192∻\" -spe -an -ai#7zMap4010:246:7zEvent30691
                                                1⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of FindShellTrayWindow
                                                PID:5756
                                              • C:\Users\Admin\Downloads\♯setupfree♯passc0de∻open∻9192-\♯setupfree♯passc0de∻open∻9192∻\♯setupfree♯passc0de∻open∻9192∻\Set-up.exe
                                                "C:\Users\Admin\Downloads\♯setupfree♯passc0de∻open∻9192-\♯setupfree♯passc0de∻open∻9192∻\♯setupfree♯passc0de∻open∻9192∻\Set-up.exe"
                                                1⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Checks processor information in registry
                                                PID:1536
                                                • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5860
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:4928
                                              • C:\Users\Admin\Downloads\♯setupfree♯passc0de∻open∻9192-\♯setupfree♯passc0de∻open∻9192∻\♯setupfree♯passc0de∻open∻9192∻\Set-up.exe
                                                "C:\Users\Admin\Downloads\♯setupfree♯passc0de∻open∻9192-\♯setupfree♯passc0de∻open∻9192∻\♯setupfree♯passc0de∻open∻9192∻\Set-up.exe"
                                                1⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:4024
                                              • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\♯setupfree♯passc0de∻open∻9192-\♯setupfree♯passc0de∻open∻9192∻\♯setupfree♯passc0de∻open∻9192∻\carferry.flv"
                                                1⤵
                                                • Suspicious behavior: AddClipboardFormatListener
                                                • Suspicious behavior: GetForegroundWindowSpam
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SendNotifyMessage
                                                • Suspicious use of SetWindowsHookEx
                                                PID:3516
                                              • C:\Users\Admin\Downloads\♯setupfree♯passc0de∻open∻9192-\♯setupfree♯passc0de∻open∻9192∻\♯setupfree♯passc0de∻open∻9192∻\Set-up.exe
                                                "C:\Users\Admin\Downloads\♯setupfree♯passc0de∻open∻9192-\♯setupfree♯passc0de∻open∻9192∻\♯setupfree♯passc0de∻open∻9192∻\Set-up.exe"
                                                1⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:3152
                                              • C:\Windows\system32\taskmgr.exe
                                                "C:\Windows\system32\taskmgr.exe" /4
                                                1⤵
                                                • Checks SCSI registry key(s)
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of SendNotifyMessage
                                                PID:6008
                                              • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                                1⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                PID:5524
                                              • C:\Users\Admin\Downloads\♯setupfree♯passc0de∻open∻9192-\♯setupfree♯passc0de∻open∻9192∻\♯setupfree♯passc0de∻open∻9192∻\Set-up.exe
                                                "C:\Users\Admin\Downloads\♯setupfree♯passc0de∻open∻9192-\♯setupfree♯passc0de∻open∻9192∻\♯setupfree♯passc0de∻open∻9192∻\Set-up.exe"
                                                1⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:5160
                                              • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                                                1⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • System Location Discovery: System Language Discovery
                                                PID:5948
                                              • C:\Windows\system32\OpenWith.exe
                                                C:\Windows\system32\OpenWith.exe -Embedding
                                                1⤵
                                                • Modifies registry class
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1676
                                              • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                                                1⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                PID:5800
                                              • C:\Program Files\7-Zip\7zFM.exe
                                                "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\{F15D78A1-D0EE-4ED6-B6CE-AB7CB00CB484} - OProcSessId.dat"
                                                1⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5240
                                              • C:\Program Files\7-Zip\7zFM.exe
                                                "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\6091fe56-ba1f-4298-b170-a662d144e767.tmp"
                                                1⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1104
                                              • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                                1⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                PID:2784
                                              • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                                                1⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                PID:3976
                                              • C:\Windows\system32\OpenWith.exe
                                                C:\Windows\system32\OpenWith.exe -Embedding
                                                1⤵
                                                • Modifies registry class
                                                • Suspicious use of SetWindowsHookEx
                                                PID:3972

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\6ca0d70a-15bb-42a2-9c88-b463863993e2.tmp

                                                Filesize

                                                11KB

                                                MD5

                                                4322ac08ad482f0404fb189f737222fe

                                                SHA1

                                                4b0c910dfff6a26394ba25e5655e1aec985c4165

                                                SHA256

                                                4686ae6e82de9d0de8100de6491e09d9a53688d47422583855ce8be70da28bbd

                                                SHA512

                                                64859d95533b1449d8cd2ae1d614a19148a9f19f22919265cb65919c3d92ec7c045acb4702566b20a9028a31cde9c6e9db23f51d35d7bfc9c4c7cea23e760be0

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                0a9dc42e4013fc47438e96d24beb8eff

                                                SHA1

                                                806ab26d7eae031a58484188a7eb1adab06457fc

                                                SHA256

                                                58d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151

                                                SHA512

                                                868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                61cef8e38cd95bf003f5fdd1dc37dae1

                                                SHA1

                                                11f2f79ecb349344c143eea9a0fed41891a3467f

                                                SHA256

                                                ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e

                                                SHA512

                                                6fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                Filesize

                                                96B

                                                MD5

                                                7325b90c07fcaba4ff4e6db19f76ff41

                                                SHA1

                                                80ee7c06fabf54b0e2f3fb49c0dd9fecda3a4aef

                                                SHA256

                                                b491aa9ee1a026d8ac3cdbe2042c88bef4c1563427748d7ad0519e54fd01ae58

                                                SHA512

                                                1dca365ea720e315de375b6ac12becdd02440478db86dbf73e9e1fd958b37f7bcdc2eef257214b43086facc5fd1c465f289f4ad5044ce6e188e0eca27c5ef895

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies

                                                Filesize

                                                20KB

                                                MD5

                                                49eb1799c7aa059431630c48e5980a2e

                                                SHA1

                                                19f2f83e2e9ebab618e02c61fa2eb78813a01014

                                                SHA256

                                                24e8f5b587c0b72f3f8181b69c1d7d9473b585b004e2faadfc0b7d8cde19607c

                                                SHA512

                                                4b42fbff8dc8cf70e3032f82e1cdc002d829f3a232f9e7b643bd0e83cae42ba7fa6214ef366419ecc93861e48e9a348c68e81fa38b5d0aa18cc1e362c4a34ee7

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                46295cac801e5d4857d09837238a6394

                                                SHA1

                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                SHA256

                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                SHA512

                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                Filesize

                                                626B

                                                MD5

                                                60973b573af414d2efead9d43712b759

                                                SHA1

                                                a59119ea71afb1d8327b7bce8a33eb5a09a87fbf

                                                SHA256

                                                66d7ca61011e281748266e4bd55ea7cf3ab4922e33e859c12c2709edf2248109

                                                SHA512

                                                46d2bc2a80d46d5962a4dee768ac50d673ed6d704ee4719f2a199e07c575772568c7ee1921fbb77e2a6d3c23adfa36261e24ded5b84e52e944945b3cb413c89b

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                Filesize

                                                626B

                                                MD5

                                                dcc61b03ec42b7328ce892e48ed9f9ca

                                                SHA1

                                                b16a5d8c98c01d83a95a8a1424fc7790b3218785

                                                SHA256

                                                885c3b92a0beccf16bde0aa991c42e8d9958feb009a223ffd3481ba5951e31b8

                                                SHA512

                                                3c8ddc2ac897739cc462a33ce741c099e1ea98f510f46db9a7a6e69fc6960399117fc14fa433ad5562138adb8562c712fe47fcd257990b3a20ce51855517914e

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                f9bbf21234ad4436ab0121348ad9e806

                                                SHA1

                                                fe03f4f47b3a7f6fd29fc1a9b9a8f6937f0f1889

                                                SHA256

                                                90566cde3396db7a48107cfad4fc59fb5aca9196ffcb42cd0cef9ee9814b0ca4

                                                SHA512

                                                90fd76749ac7e13b6b0f6f7701cbdccd28ecfbd9d53dc2b41c2625d20db2927efd052fcf0cfbb1580487842ef49b635ccf6d1b80090f0e4e2d726a80e5bae333

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                7b62e02a43ce36611579933ca25fa095

                                                SHA1

                                                43c2b1794fc78e7b9292a4265f5a63b08e84e221

                                                SHA256

                                                3e78229d55e8a0c5148ddaa87ba95f32da48b322f1f840ba8f1a0f159bf65660

                                                SHA512

                                                65d3ceeded47249231b9fe264804a4d985a334ed7084cdd8920a1378fb90678963b3543e7a8d5ec3c8cfe7fa77dcf23946bbeff83cdc69f0e8ae188f29c1553a

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                5KB

                                                MD5

                                                61ae30fbde7262837007f60b31928767

                                                SHA1

                                                28eb8156e6b9470fdad61909f1063dd8507013de

                                                SHA256

                                                d5e48c37000f7c66862407984354d2bb44566a6112953da19bf28ead70d18791

                                                SHA512

                                                a6dcd5af56ee80c855f5b27584b4be703965837f4ea143deb6a8c1f1f381bbb4b2fc22114fef31e83f53e00b685906deaa1d39870b1b34abd8d91db8bcb8db19

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                1209ac465bfc6bd3ea13ece923610bfa

                                                SHA1

                                                fbe56ad90f89fa59e5eb3cd74e181455df93401e

                                                SHA256

                                                fdf95a36a8e1f3c8f2b924b164063a989635eda868e8264450e8174b33b42291

                                                SHA512

                                                77a43dae44a9c4a2d95f073af47c7c59215715819fa3784595e4ece321577833072b7907d7525fca41a59a16f9b640edbd8c3f24e3709081a5d48fb4e2d90c64

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001

                                                Filesize

                                                41B

                                                MD5

                                                5af87dfd673ba2115e2fcf5cfdb727ab

                                                SHA1

                                                d5b5bbf396dc291274584ef71f444f420b6056f1

                                                SHA256

                                                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                SHA512

                                                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                Filesize

                                                72B

                                                MD5

                                                b12631f8c4f687911603f76293e48c85

                                                SHA1

                                                bb4d9035c32d0c1cb4028388ed7576eef0f71bce

                                                SHA256

                                                587c06a4206b0fda6dcdfb534884397669b06fcc48fe22a7abfc80da774bfb55

                                                SHA512

                                                17847543591de03b66d11987cad60a62a1585954bf21b71fff5b8485d035a76f380dc112e4cb62a1962082b780c046f48f571118fc6864ff1e52a49555052d2d

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57fc80.TMP

                                                Filesize

                                                48B

                                                MD5

                                                9293ba5a859396f2da14f3ba7e5fa619

                                                SHA1

                                                fbd368be753937079656ba3a6e352e42045ecc6f

                                                SHA256

                                                632875e06c31a50adf7772efa79e276ee6e285edae933db37743f3898fb74e1a

                                                SHA512

                                                63052489ae6bd2d33c801f6ff03c4b981111f322007414517cbf03aedc05e8fe9d5df7668abdc6116327aaa04b3b32f22e95ceb91ca5bc5cec214e4b81c66508

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                6752a1d65b201c13b62ea44016eb221f

                                                SHA1

                                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                SHA256

                                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                SHA512

                                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                11KB

                                                MD5

                                                e2430a4e8942bb528a1b5662066cc406

                                                SHA1

                                                4b60d54f09c83ad7d87a2c61fae82bcef4ffda31

                                                SHA256

                                                c4923a1cbf895cd568a71ebd1dfd95b39cb4357cb971288a1156a32b1348ee62

                                                SHA512

                                                83c564367fd09e0faa7bdb9bb571b7538d9f11b0b6e9d10cb4bd199eeee34d90c5e36947ca255e69275d0c262a7b536939308c28393bead46619d8a244f89423

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                12KB

                                                MD5

                                                8ea29b2227f665f0020934a5843af075

                                                SHA1

                                                27f352bfe60097b991edd39229e706b5f5de1995

                                                SHA256

                                                f21190bf657bebd7f78a47f0789ea9a9a232e9fb3bcd414afbeda32ceac5ac0d

                                                SHA512

                                                73d2dc66fa1bd923fe2dfc6061719962db537d1b012c3122eea3b0bad55a502dfebaaf98b94f7a46ca9460aa03964443345e297cd76ceccb2505b3bd50dccde6

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                12KB

                                                MD5

                                                85105b83dae029ab0f0e223b43ab76d6

                                                SHA1

                                                dbb5d4b253151dbdd33ca7b833e003ff4432109a

                                                SHA256

                                                a8fefc71628d4b73980c8b70e8e17e05df46e270c681e5ee5ec9b5bde27242cc

                                                SHA512

                                                c9fc111e427a8f3916e07cc7845a0b5c5a8202acadcbd299c838301bc6011d5dda99b1c0656587fbad06de0e7f50108d94dd6ecde5067b48696373dd9cc640fe

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                                                Filesize

                                                2B

                                                MD5

                                                f3b25701fe362ec84616a93a45ce9998

                                                SHA1

                                                d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                                SHA256

                                                b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                                SHA512

                                                98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                              • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini.HW3516

                                                Filesize

                                                280B

                                                MD5

                                                402325f7d17155fce4431a52d8d5f0e6

                                                SHA1

                                                af8dd5aa8d9a41a0720565fc1318af98a2114ef0

                                                SHA256

                                                f454503039216c55da0d5203ed484f6335201731a2aad9280c625de46bc40c44

                                                SHA512

                                                02c511ead690b13aaeaa18679afb332e9489e10e9107c55bae18b634a8d8cc6773a1aa59b0eea6bb9563fdf932099742912d676ab6d05d657fad058fc2ee04c1

                                              • C:\Users\Admin\Downloads\♯setupfree♯passc0de∻open∻9192-.zip

                                                Filesize

                                                21.2MB

                                                MD5

                                                6ce9901160551a083e089aab075fc90c

                                                SHA1

                                                a05c4de88def0a7159a9903c2dc3b86808db503f

                                                SHA256

                                                5e666111ac141a033b37d11930dd3ad1c550025b9bb8c868033b22bfe15b3db5

                                                SHA512

                                                4d04a2f80fe996c0433e8b4ade8078d1f733d78e8bcf22a28d6d881f1c30839853fa1be15d94b405bfe6ddde987e60b1412dec6b952feaa22ae481bb5620dbd1

                                              • C:\Users\Admin\Downloads\♯setupfree♯passc0de∻open∻9192-\♯setupfree♯passc0de∻open∻9192∻\♯setupfree♯passc0de∻open∻9192∻.rar

                                                Filesize

                                                21.2MB

                                                MD5

                                                a398de60fc1a8f12b3ce4cfd306a0fe3

                                                SHA1

                                                036c22c23a04a56a77ebbaae5e4b036fe9037725

                                                SHA256

                                                c5f107c45f83a8da73e9a106d1f42f05b0edf583ab9257e2208b9545c49ce240

                                                SHA512

                                                dd7257aa3e65c2cda823cbe7016723e51d1e7094eca31a19d793bed0be4d89f3040bbe6ebc7895f8ff0a7bd7913cebe17b1ca4be7807dd3dbd7b87c36dccc600

                                              • C:\Users\Admin\Downloads\♯setupfree♯passc0de∻open∻9192-\♯setupfree♯passc0de∻open∻9192∻\♯setupfree♯passc0de∻open∻9192∻\Set-up.exe

                                                Filesize

                                                5.7MB

                                                MD5

                                                b04655f0fde317a4889d530842964b75

                                                SHA1

                                                33bb9bb9b50762189df7e430c53bca5906958cdf

                                                SHA256

                                                0210417bdb01d8af769ac258f0134e3e037327049a00324b0cc82444c920e34c

                                                SHA512

                                                b473886c8425d5aea8c73e789c9f152b168cf46c721547db872d3f781716409b848a5f7a215c30cd48e2c1ec16360b792c1fe374e6eb2c7dd6ab7ec171db00d0

                                              • C:\Users\Admin\Downloads\♯setupfree♯passc0de∻open∻9192-\♯setupfree♯passc0de∻open∻9192∻\♯setupfree♯passc0de∻open∻9192∻\carferry.flv

                                                Filesize

                                                11KB

                                                MD5

                                                16a30926e4ebc495d3659854c3731f63

                                                SHA1

                                                2b46d1ee4f0b9c6b184aad6d9a246745b3b4163c

                                                SHA256

                                                dc260b93c358e10fc6f74c0b9f487dd0c2fd58e791ec5b0925b0546258923b36

                                                SHA512

                                                04a4893e068a6bcbec340398868b37adcf8d41580b2e6eb7a5cd30396a14acd401e67cfbb0e3ed05fa31601cb0261b82df2a4d9a3713db7e39c61c7fb64ea71f

                                              • \??\pipe\LOCAL\crashpad_3492_NCBJXZOZBPKXWSBJ

                                                MD5

                                                d41d8cd98f00b204e9800998ecf8427e

                                                SHA1

                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                SHA256

                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                SHA512

                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                              • memory/1536-533-0x00000000004D0000-0x0000000000A96000-memory.dmp

                                                Filesize

                                                5.8MB

                                              • memory/1536-501-0x0000000069CC0000-0x000000006A37B000-memory.dmp

                                                Filesize

                                                6.7MB

                                              • memory/1536-635-0x00000000004D0000-0x0000000000A96000-memory.dmp

                                                Filesize

                                                5.8MB

                                              • memory/3152-612-0x00000000004D0000-0x0000000000A96000-memory.dmp

                                                Filesize

                                                5.8MB

                                              • memory/3516-597-0x00007FFF58240000-0x00007FFF584F6000-memory.dmp

                                                Filesize

                                                2.7MB

                                              • memory/3516-595-0x00007FF79DCE0000-0x00007FF79DDD8000-memory.dmp

                                                Filesize

                                                992KB

                                              • memory/3516-596-0x00007FFF699A0000-0x00007FFF699D4000-memory.dmp

                                                Filesize

                                                208KB

                                              • memory/4024-567-0x00000000004D0000-0x0000000000A96000-memory.dmp

                                                Filesize

                                                5.8MB

                                              • memory/5160-654-0x00000000004D0000-0x0000000000A96000-memory.dmp

                                                Filesize

                                                5.8MB

                                              • memory/5524-643-0x00000000002D0000-0x00000000002E2000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/5860-640-0x0000000075A40000-0x0000000075B74000-memory.dmp

                                                Filesize

                                                1.2MB

                                              • memory/5860-639-0x00000000002D0000-0x00000000002E2000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/6008-619-0x00000165BEAB0000-0x00000165BEAB1000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/6008-624-0x00000165BEAB0000-0x00000165BEAB1000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/6008-625-0x00000165BEAB0000-0x00000165BEAB1000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/6008-626-0x00000165BEAB0000-0x00000165BEAB1000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/6008-627-0x00000165BEAB0000-0x00000165BEAB1000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/6008-628-0x00000165BEAB0000-0x00000165BEAB1000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/6008-629-0x00000165BEAB0000-0x00000165BEAB1000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/6008-630-0x00000165BEAB0000-0x00000165BEAB1000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/6008-620-0x00000165BEAB0000-0x00000165BEAB1000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/6008-618-0x00000165BEAB0000-0x00000165BEAB1000-memory.dmp

                                                Filesize

                                                4KB