Analysis
-
max time kernel
94s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 16:38
Behavioral task
behavioral1
Sample
PhoneSpammerIL.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PhoneSpammerIL.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20241007-en
General
-
Target
PhoneSpammerIL.exe
-
Size
17.8MB
-
MD5
192a9969fc2cb8506eebfb8510a8317a
-
SHA1
49a9934a7fd0f0c7669ad9ee7d03dadbd2acbaeb
-
SHA256
18b35ae3626acb00ab08c540524a63740af187aa772f22fd33de6b8fd00afd3d
-
SHA512
cfb28a8910f4d6569eb053ac8199d5698e4038984fb5917bfbfee0ba05990676a67678cb8743effb41cfb555ad4b3d082207b53529e13d9d896e83caacdbeb21
-
SSDEEP
393216:kqPnLFXlcHK9Qc8nAB3Q0GKygbcnNjHHvEa9/fP21Xtmo:FPLFXOK9QFkAJUcnNjHsmfPho
Malware Config
Signatures
-
Loads dropped DLL 59 IoCs
Processes:
PhoneSpammerIL.exepid process 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\empyrean = "C:\\Users\\Admin\\AppData\\Roaming\\empyrean\\run.bat" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
Processes:
flow ioc 20 raw.githubusercontent.com 21 raw.githubusercontent.com 37 discord.com 17 discord.com 19 discord.com -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 33 ipapi.co 15 ipapi.co 16 ipapi.co 29 ipapi.co 31 ipapi.co -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI50042\python310.dll upx behavioral2/memory/2952-116-0x00007FF997E90000-0x00007FF9982F6000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\_ctypes.pyd upx behavioral2/memory/2952-124-0x00007FF9A7CD0000-0x00007FF9A7CF4000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\libffi-7.dll upx behavioral2/memory/2952-126-0x00007FF9AC2A0000-0x00007FF9AC2AF000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\_bz2.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\_lzma.pyd upx behavioral2/memory/2952-132-0x00007FF9A7AA0000-0x00007FF9A7ACC000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\pyexpat.pyd upx behavioral2/memory/2952-130-0x00007FF9A7AD0000-0x00007FF9A7AE8000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\_socket.pyd upx behavioral2/memory/2952-139-0x00007FF9A7620000-0x00007FF9A7639000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\select.pyd upx behavioral2/memory/2952-142-0x00007FF9A8480000-0x00007FF9A848D000-memory.dmp upx behavioral2/memory/2952-145-0x00007FF9A7A50000-0x00007FF9A7A5D000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\pythoncom310.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\win32api.pyd upx behavioral2/memory/2952-153-0x00007FF997BE0000-0x00007FF997C9C000-memory.dmp upx behavioral2/memory/2952-152-0x00007FF997E90000-0x00007FF9982F6000-memory.dmp upx behavioral2/memory/2952-148-0x00007FF9A75F0000-0x00007FF9A761E000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\pywintypes310.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\_queue.pyd upx behavioral2/memory/2952-136-0x00007FF9A7A60000-0x00007FF9A7A95000-memory.dmp upx behavioral2/memory/2952-157-0x00007FF9A70C0000-0x00007FF9A70EB000-memory.dmp upx behavioral2/memory/2952-156-0x00007FF9A7CD0000-0x00007FF9A7CF4000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\_decimal.pyd upx behavioral2/memory/2952-162-0x00007FF9A7C40000-0x00007FF9A7C83000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\psutil\_psutil_windows.pyd upx behavioral2/memory/2952-167-0x00007FF9A7740000-0x00007FF9A775C000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\_ssl.pyd upx behavioral2/memory/2952-172-0x00007FF9A76A0000-0x00007FF9A76CE000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\libssl-1_1.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\libcrypto-1_1.dll upx behavioral2/memory/2952-180-0x00007FF997530000-0x00007FF9978A9000-memory.dmp upx behavioral2/memory/2952-178-0x00007FF9A7620000-0x00007FF9A7639000-memory.dmp upx behavioral2/memory/2952-175-0x00007FF9983D0000-0x00007FF998488000-memory.dmp upx behavioral2/memory/2952-171-0x00007FF9A7AA0000-0x00007FF9A7ACC000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\_hashlib.pyd upx behavioral2/memory/2952-183-0x00007FF9A3330000-0x00007FF9A3345000-memory.dmp upx behavioral2/memory/2952-187-0x00007FF9A75F0000-0x00007FF9A761E000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\charset_normalizer\md__mypyc.cp310-win_amd64.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\unicodedata.pyd upx behavioral2/memory/2952-194-0x00007FF997410000-0x00007FF997528000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\_sqlite3.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\sqlite3.dll upx behavioral2/memory/2952-200-0x00007FF997290000-0x00007FF99740A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\Crypto\Cipher\_raw_cfb.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\Crypto\Cipher\_raw_ofb.pyd upx behavioral2/memory/2952-208-0x00007FF9983D0000-0x00007FF998488000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\Crypto\Cipher\_raw_cbc.pyd upx behavioral2/memory/2952-205-0x00007FF9A70B0000-0x00007FF9A70BB000-memory.dmp upx behavioral2/memory/2952-204-0x00007FF9A76A0000-0x00007FF9A76CE000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\Crypto\Cipher\_raw_ecb.pyd upx behavioral2/memory/2952-198-0x00007FF9A3310000-0x00007FF9A332F000-memory.dmp upx behavioral2/memory/2952-193-0x00007FF9A0E40000-0x00007FF9A0E67000-memory.dmp upx behavioral2/memory/2952-191-0x00007FF997BE0000-0x00007FF997C9C000-memory.dmp upx behavioral2/memory/2952-188-0x00007FF9AD9B0000-0x00007FF9AD9BB000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI50042\charset_normalizer\md.cp310-win_amd64.pyd upx behavioral2/memory/2952-230-0x00007FF998300000-0x00007FF998314000-memory.dmp upx behavioral2/memory/2952-229-0x00007FF998D60000-0x00007FF998D70000-memory.dmp upx behavioral2/memory/2952-236-0x00007FF997230000-0x00007FF997249000-memory.dmp upx behavioral2/memory/2952-239-0x00007FF9971C0000-0x00007FF9971D1000-memory.dmp upx behavioral2/memory/2952-241-0x00007FF9971A0000-0x00007FF9971BE000-memory.dmp upx -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 6 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
Processes:
cmd.exenetsh.execmd.exenetsh.execmd.exenetsh.exepid process 4976 cmd.exe 4740 netsh.exe 1944 cmd.exe 996 netsh.exe 4764 cmd.exe 1328 netsh.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
PhoneSpammerIL.exepid process 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe 2952 PhoneSpammerIL.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
PhoneSpammerIL.exeWMIC.exeWMIC.exedescription pid process Token: SeDebugPrivilege 2952 PhoneSpammerIL.exe Token: SeIncreaseQuotaPrivilege 4816 WMIC.exe Token: SeSecurityPrivilege 4816 WMIC.exe Token: SeTakeOwnershipPrivilege 4816 WMIC.exe Token: SeLoadDriverPrivilege 4816 WMIC.exe Token: SeSystemProfilePrivilege 4816 WMIC.exe Token: SeSystemtimePrivilege 4816 WMIC.exe Token: SeProfSingleProcessPrivilege 4816 WMIC.exe Token: SeIncBasePriorityPrivilege 4816 WMIC.exe Token: SeCreatePagefilePrivilege 4816 WMIC.exe Token: SeBackupPrivilege 4816 WMIC.exe Token: SeRestorePrivilege 4816 WMIC.exe Token: SeShutdownPrivilege 4816 WMIC.exe Token: SeDebugPrivilege 4816 WMIC.exe Token: SeSystemEnvironmentPrivilege 4816 WMIC.exe Token: SeRemoteShutdownPrivilege 4816 WMIC.exe Token: SeUndockPrivilege 4816 WMIC.exe Token: SeManageVolumePrivilege 4816 WMIC.exe Token: 33 4816 WMIC.exe Token: 34 4816 WMIC.exe Token: 35 4816 WMIC.exe Token: 36 4816 WMIC.exe Token: SeIncreaseQuotaPrivilege 4816 WMIC.exe Token: SeSecurityPrivilege 4816 WMIC.exe Token: SeTakeOwnershipPrivilege 4816 WMIC.exe Token: SeLoadDriverPrivilege 4816 WMIC.exe Token: SeSystemProfilePrivilege 4816 WMIC.exe Token: SeSystemtimePrivilege 4816 WMIC.exe Token: SeProfSingleProcessPrivilege 4816 WMIC.exe Token: SeIncBasePriorityPrivilege 4816 WMIC.exe Token: SeCreatePagefilePrivilege 4816 WMIC.exe Token: SeBackupPrivilege 4816 WMIC.exe Token: SeRestorePrivilege 4816 WMIC.exe Token: SeShutdownPrivilege 4816 WMIC.exe Token: SeDebugPrivilege 4816 WMIC.exe Token: SeSystemEnvironmentPrivilege 4816 WMIC.exe Token: SeRemoteShutdownPrivilege 4816 WMIC.exe Token: SeUndockPrivilege 4816 WMIC.exe Token: SeManageVolumePrivilege 4816 WMIC.exe Token: 33 4816 WMIC.exe Token: 34 4816 WMIC.exe Token: 35 4816 WMIC.exe Token: 36 4816 WMIC.exe Token: SeIncreaseQuotaPrivilege 1716 WMIC.exe Token: SeSecurityPrivilege 1716 WMIC.exe Token: SeTakeOwnershipPrivilege 1716 WMIC.exe Token: SeLoadDriverPrivilege 1716 WMIC.exe Token: SeSystemProfilePrivilege 1716 WMIC.exe Token: SeSystemtimePrivilege 1716 WMIC.exe Token: SeProfSingleProcessPrivilege 1716 WMIC.exe Token: SeIncBasePriorityPrivilege 1716 WMIC.exe Token: SeCreatePagefilePrivilege 1716 WMIC.exe Token: SeBackupPrivilege 1716 WMIC.exe Token: SeRestorePrivilege 1716 WMIC.exe Token: SeShutdownPrivilege 1716 WMIC.exe Token: SeDebugPrivilege 1716 WMIC.exe Token: SeSystemEnvironmentPrivilege 1716 WMIC.exe Token: SeRemoteShutdownPrivilege 1716 WMIC.exe Token: SeUndockPrivilege 1716 WMIC.exe Token: SeManageVolumePrivilege 1716 WMIC.exe Token: 33 1716 WMIC.exe Token: 34 1716 WMIC.exe Token: 35 1716 WMIC.exe Token: 36 1716 WMIC.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
PhoneSpammerIL.exePhoneSpammerIL.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 5004 wrote to memory of 2952 5004 PhoneSpammerIL.exe PhoneSpammerIL.exe PID 5004 wrote to memory of 2952 5004 PhoneSpammerIL.exe PhoneSpammerIL.exe PID 2952 wrote to memory of 1928 2952 PhoneSpammerIL.exe cmd.exe PID 2952 wrote to memory of 1928 2952 PhoneSpammerIL.exe cmd.exe PID 2952 wrote to memory of 4676 2952 PhoneSpammerIL.exe cmd.exe PID 2952 wrote to memory of 4676 2952 PhoneSpammerIL.exe cmd.exe PID 4676 wrote to memory of 4816 4676 cmd.exe WMIC.exe PID 4676 wrote to memory of 4816 4676 cmd.exe WMIC.exe PID 2952 wrote to memory of 2700 2952 PhoneSpammerIL.exe cmd.exe PID 2952 wrote to memory of 2700 2952 PhoneSpammerIL.exe cmd.exe PID 2700 wrote to memory of 4808 2700 cmd.exe reg.exe PID 2700 wrote to memory of 4808 2700 cmd.exe reg.exe PID 2952 wrote to memory of 3340 2952 PhoneSpammerIL.exe cmd.exe PID 2952 wrote to memory of 3340 2952 PhoneSpammerIL.exe cmd.exe PID 3340 wrote to memory of 2152 3340 cmd.exe reg.exe PID 3340 wrote to memory of 2152 3340 cmd.exe reg.exe PID 2952 wrote to memory of 624 2952 PhoneSpammerIL.exe cmd.exe PID 2952 wrote to memory of 624 2952 PhoneSpammerIL.exe cmd.exe PID 624 wrote to memory of 1716 624 cmd.exe WMIC.exe PID 624 wrote to memory of 1716 624 cmd.exe WMIC.exe PID 2952 wrote to memory of 1436 2952 PhoneSpammerIL.exe cmd.exe PID 2952 wrote to memory of 1436 2952 PhoneSpammerIL.exe cmd.exe PID 1436 wrote to memory of 1272 1436 cmd.exe WMIC.exe PID 1436 wrote to memory of 1272 1436 cmd.exe WMIC.exe PID 2952 wrote to memory of 3760 2952 PhoneSpammerIL.exe cmd.exe PID 2952 wrote to memory of 3760 2952 PhoneSpammerIL.exe cmd.exe PID 3760 wrote to memory of 2252 3760 cmd.exe WMIC.exe PID 3760 wrote to memory of 2252 3760 cmd.exe WMIC.exe PID 2952 wrote to memory of 4976 2952 PhoneSpammerIL.exe cmd.exe PID 2952 wrote to memory of 4976 2952 PhoneSpammerIL.exe cmd.exe PID 4976 wrote to memory of 4740 4976 cmd.exe netsh.exe PID 4976 wrote to memory of 4740 4976 cmd.exe netsh.exe PID 2952 wrote to memory of 1944 2952 PhoneSpammerIL.exe cmd.exe PID 2952 wrote to memory of 1944 2952 PhoneSpammerIL.exe cmd.exe PID 1944 wrote to memory of 996 1944 cmd.exe netsh.exe PID 1944 wrote to memory of 996 1944 cmd.exe netsh.exe PID 2952 wrote to memory of 4764 2952 PhoneSpammerIL.exe cmd.exe PID 2952 wrote to memory of 4764 2952 PhoneSpammerIL.exe cmd.exe PID 4764 wrote to memory of 1328 4764 cmd.exe netsh.exe PID 4764 wrote to memory of 1328 4764 cmd.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PhoneSpammerIL.exe"C:\Users\Admin\AppData\Local\Temp\PhoneSpammerIL.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\PhoneSpammerIL.exe"C:\Users\Admin\AppData\Local\Temp\PhoneSpammerIL.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵PID:1928
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\System32\wbem\WMIC.exe csproduct get uuid"3⤵
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe csproduct get uuid4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v empyrean /f"3⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v empyrean /f4⤵
- Modifies registry key
PID:4808
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v empyrean /t REG_SZ /d C:\Users\Admin\AppData\Roaming\empyrean\run.bat /f"3⤵
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v empyrean /t REG_SZ /d C:\Users\Admin\AppData\Roaming\empyrean\run.bat /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:2152
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\System32\wbem\WMIC.exe csproduct get uuid"3⤵
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe csproduct get uuid4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\System32\wbem\WMIC.exe csproduct get uuid"3⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe csproduct get uuid4⤵PID:1272
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\System32\wbem\WMIC.exe csproduct get uuid"3⤵
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe csproduct get uuid4⤵PID:2252
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"3⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4740
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"3⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:996
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"3⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1328
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5fe44f698198190de574dc193a0e1b967
SHA15bad88c7cc50e61487ec47734877b31f201c5668
SHA25632fa416a29802eb0017a2c7360bf942edb132d4671168de26bd4c3e94d8de919
SHA512c841885dd7696f337635ef759e3f61ee7f4286b622a9fb8b695988d93219089e997b944321ca49ca3bd19d41440ee7c8e1d735bd3558052f67f762bf4d1f5fc3
-
Filesize
10KB
MD5ff64fd41b794e0ef76a9eeae1835863c
SHA1bf14e9d12b8187ca4cc9528d7331f126c3f5ca1e
SHA2565d2d1a5f79b44f36ac87d9c6d886404d9be35d1667c4b2eb8aab59fb77bf8bac
SHA51203673f94525b63644a7da45c652267077753f29888fb8966da5b2b560578f961fdc67696b69a49d9577a8033ffcc7b4a6b98c051b4f53380227c392761562734
-
Filesize
9KB
MD5f94726f6b584647142ea6d5818b0349d
SHA14aa9931c0ff214bf520c5e82d8e73ceeb08af27c
SHA256b98297fd093e8af7fca2628c23a9916e767540c3c6fa8894394b5b97ffec3174
SHA5122b40a9b39f5d09eb8d7ddad849c8a08ab2e73574ee0d5db132fe8c8c3772e60298e0545516c9c26ee0b257ebda59cfe1f56ef6c4357ef5be9017c4db4770d238
-
Filesize
10KB
MD5eea83b9021675c8ca837dfe78b5a3a58
SHA13660833ff743781e451342bb623fa59229ae614d
SHA25645a4e35231e504b0d50a5fd5968ab6960cb27d197f86689477701d79d8b95b3b
SHA512fcdccea603737364dbdbbcd5763fd85aeb0c175e6790128c93360af43e2587d0fd173bee4843c681f43fb63d57fcaef1a58be683625c905416e0c58af5bf1d6c
-
Filesize
95KB
MD5f34eb034aa4a9735218686590cba2e8b
SHA12bc20acdcb201676b77a66fa7ec6b53fa2644713
SHA2569d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1
SHA512d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af
-
Filesize
36KB
MD5135359d350f72ad4bf716b764d39e749
SHA12e59d9bbcce356f0fece56c9c4917a5cacec63d7
SHA25634048abaa070ecc13b318cea31425f4ca3edd133d350318ac65259e6058c8b32
SHA512cf23513d63ab2192c78cae98bd3fea67d933212b630be111fa7e03be3e92af38e247eb2d3804437fd0fda70fdc87916cd24cf1d3911e9f3bfb2cc4ab72b459ba
-
Filesize
47KB
MD507dcd3f7bebd3b0b08bcaf5a3c32459c
SHA169db03a9197ee05aee279103e5e8d42ef3eb20d8
SHA2566b4aef345ba8a57b1126e64988e65e8629737be05ddd729b690ca688efbda130
SHA512f8ff665e68fcec339477d28d4b714708afdea2b5c0138714966d486a814805bc98acfd6b1e547654c820589a9bd1c126e34c8e7a33d910d7f0269efb1e794e57
-
Filesize
58KB
MD553cd0ccedfdc38165c277029510de6b8
SHA16a17f2ce783bfc2cdfb6bfb147ee465422506e4e
SHA2567278f3d334e36294fbd81ffcc4330280d3787d17a4fc71dacd2da4408bd5136a
SHA5127b2cd56c6d46ba5b6b78fa2ef45553e759e64583b14176c4f08da8a623b39bbc2b641152f0e238218d5403fee3da8a3ab99b613cab751d1c3db37691799c752c
-
Filesize
106KB
MD5c97bcb3d8983f896e21f1779b93498ae
SHA15c0413e82f94d4a557e25e0d13e9b03ff7b85ce1
SHA25609012644e225e511bae07aceafd631d508b4ee4efcd42492bb3470f56344804f
SHA512045b95aa8daf0b36c3d84b0fd6b209d047e3cd28aa2717fef42c71a080fe74fcd41e7762eeebe96d3cc5d91bdc44989ffb8d33269854242d3baf8d253a82b8d8
-
Filesize
35KB
MD57a48ea2b3aa94cfaa8992d2850f34057
SHA1dca5c52f668d1077d1ecc497230ed7bc9d1677e6
SHA256dc41c07fbf97c53ce3f666ecee1b77f1101ce7365d8ab9edd18109a7ff0569c7
SHA512f305b717c8484539d59ac10a727a6796575d5d017c6ea7f0744f4ef1314be95bc361a03cfbb87ad6105c245c6cab06149077b17fc7cc63cc6a5c9dbd39d3ae7d
-
Filesize
85KB
MD5491b794b840ea147f88d26c54e66c751
SHA18aa37814aa95151dcd49a6ef2cfd453b91ed30e9
SHA256fbec4bc9b7adac154ba9f316a0c8fdfb22e16ac6c1376716bc33f399ad0875ea
SHA512aa700a627622f0c416d37216006f708ffcbeef6ddd4419cfb0f0edacf91e4b29362f0cf24d3965764fdf47c0864eb1636007121f612fa5d8ea1ade7d09b9cd58
-
Filesize
25KB
MD5c341eaecc02c68b8469fc3e2a675a654
SHA18e039602eb975e0ce13528da2694926e77fe4760
SHA2566692f25b92cef3534079687e17142a716d71e02deb820ec94f3e3a60d44424d5
SHA51207afa210fc633787f7c7bb52534f24c648538bea3093cc880676d9d58a2fe3e3e9e64189455db74112b14fe109dbbb3efa20f011c3e8aee01612904a8b97ee38
-
Filesize
42KB
MD58d1ea62241be70d4ff3af6c455cba777
SHA102d845595c8020b39ebb08667cfa753807da4680
SHA256645ae93e057061b8bdadaf743c718430a60b5511df54df843f929d3346abc2b5
SHA512ec8ca703c3c0dccaf590b1e7922bce0124e7861dd110a8c67adf85510772385829f5c81c91a3d5ad438ae6616b3ccb1c898698388be62880165dc615ef07f404
-
Filesize
50KB
MD5edefdc2ed2c050440d7c7495ba1ec232
SHA1cd5a886f994c08c8fd1666c1d92c64c8b6bc5a96
SHA256a9de81d7a5f83060fbdd73934d12fcb66f1c6de8f61346b4b263ad0299414cec
SHA5124ffa357a6f507a63b3c6b043e54cf23c749a730d29e06fa8406b590d1f059efc9270c28977a219132d39b9da4d9283ced09a7f422bb4fcb7d5edb0d947d30c1b
-
Filesize
62KB
MD5aedfa885a1f7566dd0955675c5d87d6c
SHA1e047404c9b0a1e28a5ef0825b3edeaacc843c965
SHA256709f85cb8775af1db6990b91f4232cf4c097dbe9f9297ae4e3eeed0a3b506557
SHA5128f7fb5135394750443eeb092628dfa07daf8622f306847dcb748d3fceefdbf6a7c8884e120e1ead2b0dd209b27feb981b29fdbcd6bebddf2d7a8a500e33de866
-
Filesize
24KB
MD5b68c98113c8e7e83af56ba98ff3ac84a
SHA1448938564559570b269e05e745d9c52ecda37154
SHA256990586f2a2ba00d48b59bdd03d3c223b8e9fb7d7fab6d414bac2833eb1241ca2
SHA51233c69199cba8e58e235b96684346e748a17cc7f03fc068cfa8a7ec7b5f9f6fa90d90b5cdb43285abf8b4108e71098d4e87fb0d06b28e2132357964b3eea3a4f8
-
Filesize
812KB
MD5fbd6be906ac7cd45f1d98f5cb05f8275
SHA15d563877a549f493da805b4d049641604a6a0408
SHA256ae35709e6b8538827e3999e61a0345680c5167962296ac7bef62d6b813227fb0
SHA5121547b02875f3e547c4f5e15c964719c93d7088c7f4fd044f6561bebd29658a54ef044211f9d5cfb4570ca49ed0f17b08011d27fe85914e8c3ea12024c8071e8a
-
Filesize
9KB
MD5ac03714161da507e824756742a877da9
SHA1702dbd2296ca50f6502bc5aac5b826b63cf9e200
SHA256cafc9c2befc85af6cc0f9cf0fa7681bae89c9acf511cadc39a0cee77d174b2c2
SHA5126b773b2f31512211a0944391733b77f25ef720d07a4057ab8432941950403faced50c8bc3166b36f648e6394bdf0d9943ccd81e689622558719dfe782c59bb2c
-
Filesize
39KB
MD5150731368d678f5b2f9ea8cb1a966b8a
SHA18263055aee278b6724e30aff7bd4bd471bb1c904
SHA25608bbccf9be3982bbb356e5df1e6fddaa94bb5f12b765bca7bd5701c86141f814
SHA512a5e984f9995e13fefd8a1750b8fef7670cfef11ff019880af06d4dff453416b43e077084f529e37fc24f4a70c1951cfc101f2611d7c860924bbf2922a98027a8
-
Filesize
1.1MB
MD5403736309b3b5d082712916898fd1354
SHA11c31f475bf0e8ff7e5aabc3631c36abd2f30d837
SHA256a6447002ef1fa01747e76353e8a94d296300d845e172cc3153586af23f28e6e3
SHA51276aab5b2860b465badf5e777c52ce409ce4662c5b9690b1ffada140c5e470716fc2b30fb30162c40952946ac5757428b16b9bdeea4476a5c41cf8c88bbb4f16a
-
Filesize
23KB
MD5b5150b41ca910f212a1dd236832eb472
SHA1a17809732c562524b185953ffe60dfa91ba3ce7d
SHA2561a106569ac0ad3152f3816ff361aa227371d0d85425b357632776ac48d92ea8a
SHA5129e82b0caa3d72bb4a7ad7d66ebfb10edb778749e89280bca67c766e72dc794e99aab2bc2980d64282a384699929ce6cc996462a73584898d2df67a57bff2a9c6
-
Filesize
204KB
MD511f23756f8727a80dfcde795d5e43a3f
SHA167a0dcc7f90104cfce59cb3cc0815dc80070579c
SHA25618b703afec83722f6dc78ccb63662296b9c186a830746dd9e57ef279da519446
SHA512b6acc6c27ef27f2ccb9157dd2b921edee603d28434bcb688cf814deb98231bdee14465f55ae1fa37d741dfa62e13ddec60b1dcaa5d820e011abcf62e2f1864d9
-
Filesize
34KB
MD5fb17b2f2f09725c3ffca6345acd7f0a8
SHA1b8d747cc0cb9f7646181536d9451d91d83b9fc61
SHA2569c7d401418db14353db85b54ff8c7773ee5d17cbf9a20085fde4af652bd24fc4
SHA512b4acb60045da8639779b6bb01175b13344c3705c92ea55f9c2942f06c89e5f43cedae8c691836d63183cacf2d0a98aa3bcb0354528f1707956b252206991bf63
-
Filesize
87KB
MD554683379c2419972818d53a7dbab049a
SHA1af0a301b049bf2c5408156059eb4cd38c28226cd
SHA256a4d7e93cffe266879a283abce61c0ba47072ba3ae6a83e3411c7eae71a24c834
SHA512906df0deb11a0b1a227a4c97fa658c9ac863a95c5f57d7c55f4184028163f72cf5e90f4010fec2fdee995ed4d40ef839ab7468bda48e54bf21a46a8e69837e6f
-
Filesize
64KB
MD5fd4a39e7c1f7f07cf635145a2af0dc3a
SHA105292ba14acc978bb195818499a294028ab644bd
SHA256dc909eb798a23ba8ee9f8e3f307d97755bc0d2dc0cb342cedae81fbbad32a8a9
SHA51237d3218bc767c44e8197555d3fa18d5aad43a536cfe24ac17bf8a3084fb70bd4763ccfd16d2df405538b657f720871e0cd312dfeb7f592f3aac34d9d00d5a643
-
Filesize
1.4MB
MD5cb0b4cf4ee16344ab13914c95e2ef4ce
SHA1ba7a0b9d76e9dccdc6097d7e98ec0d20879e1c61
SHA256a2b591ecadbd12bd1cd6e1c231bff1e814b71e9e99ffca450ece2f736e5ef1b6
SHA512cdc9ad107a275bbe8e93c06f6dd0d2a2c1ac13df92a216fb98485583ecfb6e3d92f2c87c4dd80aceb05f3e9a4113468e60891ef4e3245386eb30201927384dd5
-
Filesize
193KB
MD59051abae01a41ea13febdea7d93470c0
SHA1b06bd4cd4fd453eb827a108e137320d5dc3a002f
SHA256f12c8141d4795719035c89ff459823ed6174564136020739c106f08a6257b399
SHA51258d8277ec4101ad468dd8c4b4a9353ab684ecc391e5f9db37de44d5c3316c17d4c7a5ffd547ce9b9a08c56e3dd6d3c87428eae12144dfb72fc448b0f2cfc47da
-
Filesize
62KB
MD56f2aa8fa02f59671f99083f9cef12cda
SHA19fd0716bcde6ac01cd916be28aa4297c5d4791cd
SHA2561a15d98d4f9622fa81b60876a5f359707a88fbbbae3ae4e0c799192c378ef8c6
SHA512f5d5112e63307068cdb1d0670fe24b65a9f4942a39416f537bdbc17dedfd99963861bf0f4e94299cdce874816f27b3d86c4bebb889c3162c666d5ee92229c211
-
Filesize
25KB
MD5d8d4a3b58e4cab8f4efab64fb04340f8
SHA1e07653ec07d1819c389b142809bc2736d8c13db2
SHA2566be05319f6bcd1bb956db273cbcfcfc555e5ecff87b106f4f56e014a0ce5826c
SHA512c0e4769efe79b494238b7d836a70313ef75f97a43ca2c17610cc355caa2923d73f999975bd86bec95c064abaf494c7d78b5396a53fa4ebf67b1c72c4600923fe
-
Filesize
622KB
MD5a5c0bfd25539dbefc0360c139eb6c82c
SHA1373f3680a18d74a68549ecab5cadfc8abfdf8172
SHA25643ca2f3a0f933e7ffe593635b51288277c0d85ae3cd3c0647120b9cc51e4831f
SHA5120274ea610613c2009e0beac00e4d84e35b903b1f5d59a90ea55c8326ceeb89ac5f2b842b43290c4327e5512ca1478547d9910fcbd19b28b52d303818a9d172f5
-
Filesize
289KB
MD5828fb207ceaea84a54141cf2acbd27af
SHA14cf236f44f1b8646abc4a8061926fa979ce781db
SHA2566d36a9e7294374dffe3231cd9887351aec8e78c5c0d496ba6f7aac57baefe007
SHA5125171cbfdf39a4adb3a57bb6a06a0073134c8982d7e1e7fd4804bf86ed78046db38aae51a883d59c7d40a7488b8a6d2a0c77614e10d9c01ec818a752a090698e2
-
Filesize
48KB
MD5561f419a2b44158646ee13cd9af44c60
SHA193212788de48e0a91e603d74f071a7c8f42fe39b
SHA256631465da2a1dad0cb11cd86b14b4a0e4c7708d5b1e8d6f40ae9e794520c3aaf7
SHA512d76ab089f6dc1beffd5247e81d267f826706e60604a157676e6cbc3b3447f5bcee66a84bf35c21696c020362fadd814c3e0945942cdc5e0dfe44c0bca169945c
-
Filesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
258B
MD58295280b2a4dde6fadebac44a113df5d
SHA1d2b7beca5513d43ab520eda9eb898e1f64249637
SHA256ca731f8b6229774ff50e313d7b6418214f0d38624f6048ea7370e59e14cf97ad
SHA512e2ef92ec0f33ada185b969971f8c3e30d9b406d34a864e14f1a53ec29535acbd730adffb24889b8ee0f9d02430d5c72fd873fdfb8b5400613a2f6e5892832116