Analysis
-
max time kernel
149s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 10:55
Static task
static1
Behavioral task
behavioral1
Sample
1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe
Resource
win7-20240903-en
General
-
Target
1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe
-
Size
1.8MB
-
MD5
ee0926816777a4ea755ee40b6006c2c4
-
SHA1
d69044c6a9d6fd106de544cc2502704e6fd9d63a
-
SHA256
1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676
-
SHA512
800fda45c90e68f2ea453a56582de07ad347324ee17f5fccbe4d7185f2809f932fd9e8e98e9da1fa33daa7672fc44bb7a9b9165086d6bdb0b5a3403176a1c6d3
-
SSDEEP
24576:/3vLRdVhZBK8NogWYO09JOGi9JbBodjwC/hR:/3d5ZQ1TxJ+
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
1.15.12.73:4567
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\I: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\X: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\S: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\V: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\A: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\E: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\H: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\Q: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\R: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\Z: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\J: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\K: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\N: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\P: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\W: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\U: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\Y: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\B: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\L: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\M: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\O: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe File opened (read-only) \??\T: 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 4000 msedge.exe 4000 msedge.exe 1964 identity_helper.exe 1964 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2152 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe Token: SeDebugPrivilege 2152 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe Token: SeDebugPrivilege 1196 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe Token: SeDebugPrivilege 1196 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2152 wrote to memory of 1196 2152 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe 85 PID 2152 wrote to memory of 1196 2152 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe 85 PID 2152 wrote to memory of 1196 2152 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe 85 PID 1196 wrote to memory of 4000 1196 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe 99 PID 1196 wrote to memory of 4000 1196 1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe 99 PID 4000 wrote to memory of 1800 4000 msedge.exe 100 PID 4000 wrote to memory of 1800 4000 msedge.exe 100 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 976 4000 msedge.exe 101 PID 4000 wrote to memory of 3196 4000 msedge.exe 102 PID 4000 wrote to memory of 3196 4000 msedge.exe 102 PID 4000 wrote to memory of 4208 4000 msedge.exe 103 PID 4000 wrote to memory of 4208 4000 msedge.exe 103 PID 4000 wrote to memory of 4208 4000 msedge.exe 103 PID 4000 wrote to memory of 4208 4000 msedge.exe 103 PID 4000 wrote to memory of 4208 4000 msedge.exe 103 PID 4000 wrote to memory of 4208 4000 msedge.exe 103 PID 4000 wrote to memory of 4208 4000 msedge.exe 103 PID 4000 wrote to memory of 4208 4000 msedge.exe 103 PID 4000 wrote to memory of 4208 4000 msedge.exe 103 PID 4000 wrote to memory of 4208 4000 msedge.exe 103 PID 4000 wrote to memory of 4208 4000 msedge.exe 103 PID 4000 wrote to memory of 4208 4000 msedge.exe 103 PID 4000 wrote to memory of 4208 4000 msedge.exe 103 PID 4000 wrote to memory of 4208 4000 msedge.exe 103 PID 4000 wrote to memory of 4208 4000 msedge.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe"C:\Users\Admin\AppData\Local\Temp\1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe"C:\Users\Admin\AppData\Local\Temp\1a8872bdf8bf58508f279ea50f5b137de5acbad0f204daae4918afceac2ec676.exe" Admin2⤵
- Drops file in Drivers directory
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.178stu.com/my.htm3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff93f5c46f8,0x7ff93f5c4708,0x7ff93f5c47184⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,6824623739705870203,3032799791183402040,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:24⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,6824623739705870203,3032799791183402040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,6824623739705870203,3032799791183402040,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:84⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6824623739705870203,3032799791183402040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:14⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6824623739705870203,3032799791183402040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:14⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,6824623739705870203,3032799791183402040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 /prefetch:84⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,6824623739705870203,3032799791183402040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6824623739705870203,3032799791183402040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:14⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6824623739705870203,3032799791183402040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:14⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6824623739705870203,3032799791183402040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:14⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6824623739705870203,3032799791183402040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:14⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6824623739705870203,3032799791183402040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:14⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6824623739705870203,3032799791183402040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:14⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6824623739705870203,3032799791183402040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1700 /prefetch:14⤵PID:4176
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1656
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
5KB
MD50ec92d3578a3459b5edf0a88485c9a5d
SHA122bc88660ebb13182bfaab583b69ee5e39d25e14
SHA256310b0dfd8fc467357eff4595a97a46b87b68f52fda2b5e29bfa605b112338702
SHA512499c2d4d302ef8496cf6558aa3dd8b8581d1364e083cc05b60a2afef97f8d7afb115526e19f568a2aa3c74162bb20fa8459d313c6544a3a3868426a85c9411c3
-
Filesize
6KB
MD55240389d21cea9c8b8f5e3220b681ce7
SHA1fad748d0336e1f7e4974f009c853718c1939804f
SHA25628ff5136cb8c27229f5c5a49c188afb03accef3dbe9f5d54236c03652644cdce
SHA512a938c056b0a9789d009043c88bcadb1ebac11e42f5802b67e1af03046729ddb9f23cc3e068663b8900193403f5cd44662ece5cafeae6481914a666216c63f031
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5bd452b8c6cebb2d60e00d74a80a373e1
SHA188f9e1544b653cacbda2ac3dfa75c08f45fd5b68
SHA2562303d8384bd0b462e3292b937b4844a50f5b40ab027f7c88a0f210ac48a64ea1
SHA5121d2e798b57fba89834587a3ac5baa14c905b4f26f70d46a8f08c4841123c8ab124c67e2404be85e1cf665d52d5e7fb6c42e332aa56d98eb9283682b833df8014
-
Filesize
822B
MD503450e8ddb20859f242195450c19b8f1
SHA19698f8caf67c8853e14c8bf4933949f458c3044a
SHA2561bdd8f1dd7bd82b5b2313d8770dfe4f41cd3f45bbaeab8b8a7f75fc5e2d3720b
SHA51287371e57bf2296af5ec7f5db772a4ce66729d54aa23a8b384e3f4c42310b97b636576c7dff67c27a3b679339cdeee05b836563ae2a878f0367caf247b3e1ba7b