Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 06:52
Behavioral task
behavioral1
Sample
06d191cb11b5332ca315fde549e38123a59b462a1712563c81129aaf70de8e8c.exe
Resource
win7-20240903-en
General
-
Target
06d191cb11b5332ca315fde549e38123a59b462a1712563c81129aaf70de8e8c.exe
-
Size
16.7MB
-
MD5
65e77040ed7d9dbbbbb65be5f8528b61
-
SHA1
22e5e40a62ebda8aae9f658d617888114ccc712f
-
SHA256
06d191cb11b5332ca315fde549e38123a59b462a1712563c81129aaf70de8e8c
-
SHA512
b185ea47e46279938566febd61fe120d4255ae2ade08bf213edf477096bbafb244705208dfec28dabf1e19db85e85dea24880fdc8efd10b7fb05cd709c0b7236
-
SSDEEP
393216:urN50n4bwQq7t3J086sIB6ehAAJ2u653xVu7vHhqBa4Cs0:uka9ZPBxKJpHCpqBa4Cx
Malware Config
Extracted
quasar
1.4.0
Chrome
live.nodenet.ml:8863
754ce6d6-f75b-4c6f-964c-3996e749369e
-
encryption_key
8F8DE0B9E0A9CA156684061043456EC2CF7D0A6D
-
install_name
chrome.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System
-
subdirectory
chrome
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023c8f-76.dat family_quasar behavioral2/memory/1564-98-0x0000000000130000-0x00000000001B4000-memory.dmp family_quasar -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 06d191cb11b5332ca315fde549e38123a59b462a1712563c81129aaf70de8e8c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AVB.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 06d191cb11b5332ca315fde549e38123a59b462a1712563c81129aaf70de8e8c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 06d191cb11b5332ca315fde549e38123a59b462a1712563c81129aaf70de8e8c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AVB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AVB.exe -
Checks computer location settings 2 TTPs 14 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 06d191cb11b5332ca315fde549e38123a59b462a1712563c81129aaf70de8e8c.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation AVB.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation chrome.exe -
Executes dropped EXE 15 IoCs
pid Process 1152 AVB.exe 1564 chrome.exe 3560 S^X.exe 1460 chrome.exe 2696 chrome.exe 3348 chrome.exe 1872 chrome.exe 3488 chrome.exe 4488 chrome.exe 2260 chrome.exe 1760 chrome.exe 3024 chrome.exe 4184 chrome.exe 1800 chrome.exe 2696 chrome.exe -
Loads dropped DLL 3 IoCs
pid Process 432 06d191cb11b5332ca315fde549e38123a59b462a1712563c81129aaf70de8e8c.exe 1152 AVB.exe 1152 AVB.exe -
Obfuscated with Agile.Net obfuscator 8 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/files/0x0008000000023c83-19.dat agile_net behavioral2/memory/1152-30-0x00000000005D0000-0x0000000001120000-memory.dmp agile_net behavioral2/memory/1152-44-0x0000000005EE0000-0x00000000064F2000-memory.dmp agile_net behavioral2/memory/1152-65-0x0000000005EE0000-0x00000000064EC000-memory.dmp agile_net behavioral2/memory/1152-67-0x0000000005EE0000-0x00000000064EC000-memory.dmp agile_net behavioral2/memory/1152-63-0x0000000005EE0000-0x00000000064EC000-memory.dmp agile_net behavioral2/memory/1152-62-0x0000000005EE0000-0x00000000064EC000-memory.dmp agile_net behavioral2/memory/1152-69-0x0000000005EE0000-0x00000000064EC000-memory.dmp agile_net -
resource yara_rule behavioral2/files/0x0007000000023c86-6.dat themida behavioral2/memory/432-11-0x00000000732B0000-0x00000000738B8000-memory.dmp themida behavioral2/memory/432-12-0x00000000732B0000-0x00000000738B8000-memory.dmp themida behavioral2/memory/432-10-0x00000000732B0000-0x00000000738B8000-memory.dmp themida behavioral2/memory/432-27-0x00000000732B0000-0x00000000738B8000-memory.dmp themida behavioral2/memory/1152-39-0x0000000074810000-0x0000000074E18000-memory.dmp themida behavioral2/memory/1152-41-0x0000000074810000-0x0000000074E18000-memory.dmp themida behavioral2/memory/1152-42-0x0000000074810000-0x0000000074E18000-memory.dmp themida behavioral2/memory/1152-52-0x00000000741B0000-0x00000000747B8000-memory.dmp themida behavioral2/memory/1152-55-0x00000000741B0000-0x00000000747B8000-memory.dmp themida behavioral2/memory/1152-53-0x00000000741B0000-0x00000000747B8000-memory.dmp themida behavioral2/memory/1152-93-0x0000000074810000-0x0000000074E18000-memory.dmp themida behavioral2/memory/1152-94-0x00000000741B0000-0x00000000747B8000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 06d191cb11b5332ca315fde549e38123a59b462a1712563c81129aaf70de8e8c.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AVB.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 432 06d191cb11b5332ca315fde549e38123a59b462a1712563c81129aaf70de8e8c.exe 1152 AVB.exe 1152 AVB.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06d191cb11b5332ca315fde549e38123a59b462a1712563c81129aaf70de8e8c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AVB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S^X.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 12 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5048 PING.EXE 5052 PING.EXE 4624 PING.EXE 1748 PING.EXE 1292 PING.EXE 2828 PING.EXE 3036 PING.EXE 2760 PING.EXE 4672 PING.EXE 1456 PING.EXE 4624 PING.EXE 1732 PING.EXE -
Runs ping.exe 1 TTPs 12 IoCs
pid Process 2760 PING.EXE 5052 PING.EXE 2828 PING.EXE 3036 PING.EXE 4624 PING.EXE 1732 PING.EXE 5048 PING.EXE 4672 PING.EXE 4624 PING.EXE 1748 PING.EXE 1292 PING.EXE 1456 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3288 schtasks.exe 848 schtasks.exe 4916 schtasks.exe 2736 schtasks.exe 2012 schtasks.exe 4400 schtasks.exe 816 schtasks.exe 4324 schtasks.exe 2572 schtasks.exe 3432 schtasks.exe 2744 schtasks.exe 4296 schtasks.exe 1768 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 1564 chrome.exe Token: SeDebugPrivilege 1460 chrome.exe Token: SeDebugPrivilege 3560 S^X.exe Token: SeDebugPrivilege 2696 chrome.exe Token: SeDebugPrivilege 3348 chrome.exe Token: SeDebugPrivilege 1872 chrome.exe Token: SeDebugPrivilege 3488 chrome.exe Token: SeDebugPrivilege 4488 chrome.exe Token: SeDebugPrivilege 2260 chrome.exe Token: SeDebugPrivilege 1760 chrome.exe Token: SeDebugPrivilege 3024 chrome.exe Token: SeDebugPrivilege 4184 chrome.exe Token: SeDebugPrivilege 1800 chrome.exe Token: SeDebugPrivilege 2696 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 432 wrote to memory of 1152 432 06d191cb11b5332ca315fde549e38123a59b462a1712563c81129aaf70de8e8c.exe 83 PID 432 wrote to memory of 1152 432 06d191cb11b5332ca315fde549e38123a59b462a1712563c81129aaf70de8e8c.exe 83 PID 432 wrote to memory of 1152 432 06d191cb11b5332ca315fde549e38123a59b462a1712563c81129aaf70de8e8c.exe 83 PID 1152 wrote to memory of 1564 1152 AVB.exe 84 PID 1152 wrote to memory of 1564 1152 AVB.exe 84 PID 1152 wrote to memory of 3560 1152 AVB.exe 85 PID 1152 wrote to memory of 3560 1152 AVB.exe 85 PID 1152 wrote to memory of 3560 1152 AVB.exe 85 PID 1564 wrote to memory of 848 1564 chrome.exe 86 PID 1564 wrote to memory of 848 1564 chrome.exe 86 PID 1564 wrote to memory of 1460 1564 chrome.exe 88 PID 1564 wrote to memory of 1460 1564 chrome.exe 88 PID 1460 wrote to memory of 2572 1460 chrome.exe 91 PID 1460 wrote to memory of 2572 1460 chrome.exe 91 PID 1460 wrote to memory of 4488 1460 chrome.exe 95 PID 1460 wrote to memory of 4488 1460 chrome.exe 95 PID 4488 wrote to memory of 1736 4488 cmd.exe 97 PID 4488 wrote to memory of 1736 4488 cmd.exe 97 PID 4488 wrote to memory of 2760 4488 cmd.exe 98 PID 4488 wrote to memory of 2760 4488 cmd.exe 98 PID 4488 wrote to memory of 2696 4488 cmd.exe 107 PID 4488 wrote to memory of 2696 4488 cmd.exe 107 PID 2696 wrote to memory of 3432 2696 chrome.exe 108 PID 2696 wrote to memory of 3432 2696 chrome.exe 108 PID 2696 wrote to memory of 1068 2696 chrome.exe 111 PID 2696 wrote to memory of 1068 2696 chrome.exe 111 PID 1068 wrote to memory of 2884 1068 cmd.exe 113 PID 1068 wrote to memory of 2884 1068 cmd.exe 113 PID 1068 wrote to memory of 4672 1068 cmd.exe 114 PID 1068 wrote to memory of 4672 1068 cmd.exe 114 PID 1068 wrote to memory of 3348 1068 cmd.exe 116 PID 1068 wrote to memory of 3348 1068 cmd.exe 116 PID 3348 wrote to memory of 2744 3348 chrome.exe 117 PID 3348 wrote to memory of 2744 3348 chrome.exe 117 PID 3348 wrote to memory of 1424 3348 chrome.exe 120 PID 3348 wrote to memory of 1424 3348 chrome.exe 120 PID 1424 wrote to memory of 4720 1424 cmd.exe 122 PID 1424 wrote to memory of 4720 1424 cmd.exe 122 PID 1424 wrote to memory of 5052 1424 cmd.exe 123 PID 1424 wrote to memory of 5052 1424 cmd.exe 123 PID 1424 wrote to memory of 1872 1424 cmd.exe 128 PID 1424 wrote to memory of 1872 1424 cmd.exe 128 PID 1872 wrote to memory of 4916 1872 chrome.exe 129 PID 1872 wrote to memory of 4916 1872 chrome.exe 129 PID 1872 wrote to memory of 3052 1872 chrome.exe 132 PID 1872 wrote to memory of 3052 1872 chrome.exe 132 PID 3052 wrote to memory of 1040 3052 cmd.exe 134 PID 3052 wrote to memory of 1040 3052 cmd.exe 134 PID 3052 wrote to memory of 4624 3052 cmd.exe 135 PID 3052 wrote to memory of 4624 3052 cmd.exe 135 PID 3052 wrote to memory of 3488 3052 cmd.exe 137 PID 3052 wrote to memory of 3488 3052 cmd.exe 137 PID 3488 wrote to memory of 4296 3488 chrome.exe 138 PID 3488 wrote to memory of 4296 3488 chrome.exe 138 PID 3488 wrote to memory of 4028 3488 chrome.exe 141 PID 3488 wrote to memory of 4028 3488 chrome.exe 141 PID 4028 wrote to memory of 4368 4028 cmd.exe 143 PID 4028 wrote to memory of 4368 4028 cmd.exe 143 PID 4028 wrote to memory of 1748 4028 cmd.exe 144 PID 4028 wrote to memory of 1748 4028 cmd.exe 144 PID 4028 wrote to memory of 4488 4028 cmd.exe 146 PID 4028 wrote to memory of 4488 4028 cmd.exe 146 PID 4488 wrote to memory of 2736 4488 chrome.exe 147 PID 4488 wrote to memory of 2736 4488 chrome.exe 147 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\06d191cb11b5332ca315fde549e38123a59b462a1712563c81129aaf70de8e8c.exe"C:\Users\Admin\AppData\Local\Temp\06d191cb11b5332ca315fde549e38123a59b462a1712563c81129aaf70de8e8c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Roaming\AVB.exe"C:\Users\Admin\AppData\Roaming\AVB.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Roaming\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:848
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:2572
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6TtGaafO1umz.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:1736
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2760
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:3432
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ofAIgHEtcu5d.bat" "7⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\system32\chcp.comchcp 650018⤵PID:2884
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4672
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:2744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rTOKWdItm0HO.bat" "9⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\system32\chcp.comchcp 6500110⤵PID:4720
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5052
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:4916
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kgmJxC2mZgyd.bat" "11⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\system32\chcp.comchcp 6500112⤵PID:1040
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4624
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:4296
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FGPS8FepNnvI.bat" "13⤵
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\system32\chcp.comchcp 6500114⤵PID:4368
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1748
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:2736
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5RmJeiWl57Tf.bat" "15⤵PID:4436
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:2144
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1292
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2260 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:1768
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XnO5UVEqyjTV.bat" "17⤵PID:976
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:3064
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2828
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1760 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:2012
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FEb6ALB171aL.bat" "19⤵PID:4628
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:4636
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3036
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3024 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:4400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ThHUYGi6BUNK.bat" "21⤵PID:4824
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:3616
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4624
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4184 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:816
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Xxor5NctWBOx.bat" "23⤵PID:2448
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:2620
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1732
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1800 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:3288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\y1lI6iFuGUZw.bat" "25⤵PID:3116
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:220
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5048
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2696 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
PID:4324
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\43L7I59UpYtY.bat" "27⤵PID:4040
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:3940
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1456
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\S^X.exe"C:\Users\Admin\AppData\Local\Temp\S^X.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
207B
MD5f5736939b31d08272651b0af864ab889
SHA1f3ef7434acd7c6a3c9fef780e3dd4efd456ff92c
SHA25601069c42e35b9406af27be291d88194415af98defec2c45857e770d70f17a56f
SHA512dfe43678046b0d38c77b55ad32d45c9f452e3daef4d4e644d68cae81297716de92459489918e8e341f0414d0d91aa83a08564727fedfb028b0005be426db301e
-
Filesize
207B
MD5cb90585c43bed29a29192d3dc4adffcf
SHA118c5e48ec51dc3d1d82ed48cf4a541572cc43997
SHA2564d0d827c76d0b48f8c35022226f8ec6875229e492c31096708a89121763191fe
SHA5129c5679fac876d9daa33fe7641b2f8f1d5bad09aba842c314d19e485fa4dbf685df4f42cf9f96c10c4b85f69e137382194505cc0faf03f8c34b5792e02ff519e9
-
Filesize
207B
MD554f4b3882a84feb970528d42e344d0d2
SHA1c78db5903f87b63ffb41b4f4b59e83ac6913ff8b
SHA2569995a21af83e43251969f748c3d4e68dd711e580f24e48d436c208fb22ff5ffa
SHA512a8a3bd24d493433b39762eebc31b84e6ffc3c20b5c3f56d380bf70923ba340bee8951e462de10f06cfb44de381c1f9edd5a62d44576da909656c684768306025
-
Filesize
207B
MD5a5feda9b4cf1f17a0b67896207bdbe1c
SHA1a403a6100190e701bde26a90741b5d11601fafaa
SHA256b0fb595a281da0bd7475922deacd33eaa73509a86438dc19bd3387719c6460aa
SHA5126a9f219b550e02949226e2c1b51837578a93b2b08056f860aab70f311eae2ad75fbbb3a4f73be79e54e6981d76c91aae03835c7bc88f6e0a20a248827d4c88e9
-
Filesize
207B
MD5b4ec3c7002fe6102bdc4048f8e150451
SHA156980e8366fe613d69974b8bdd824887f5a0f6a7
SHA256127c4fbece0d73fb7df7d064703988460c6c3dc99f545f05fd417f93e9ee46cc
SHA512076707a853d55b64ec823b21b2bd10b5dd6c6ff20d9a744c0de67e7d6af8f0ef54c3db10075b6f8e74c868b4e003f0082c9c98439ec62208941adfebb9b356be
-
Filesize
789KB
MD5e2437ac017506bbde9a81fb1f618457b
SHA1adef2615312b31e041ccf700b3982dd50b686c7f
SHA25694594fa46d0bd28c02365f0a32ec3a662b25df95f3f3e8e2a952c18a23895b12
SHA5129169f8be39b8fede38f7fce5a2e64d42630857e0ebd37f921c68ccf0bf0a8816f1682ba4659d22ad43413d99de62a59b2494494701404b44aa41c4d6bdc1e019
-
Filesize
207B
MD5ea64da9d4ef0de12873a758b90394cad
SHA14616f7bfab45bc2466abd50f0fa5a1d8fc007f54
SHA256d2624cba2bb765fa452025ea9b0b9d425c461dd8b4fc86f95fe801332bfb47fa
SHA5127e598102828c56dc81d76510b6ef86f9e37db54ae329698d8146fc6f5ba7ff5b967481cc2f182cda766ea575f60ba52b1f25f1ad1b0729b8c82396ede63e15d2
-
Filesize
207B
MD59c0e0c51a58592c3ad4b184b92119620
SHA1f49692aac21c0cc60f4e02b8bee8c2cd504b4cef
SHA2563ffa37f07f7979c97c65b157d50761e40395b72c7cc0de7d5607059d9a965ffc
SHA512c6c4cc6db9e6606424e2f9872d382012ce25da90669b0fe8b20e969246e27728df419c7a010766f7eabb26b6c43f3edc5e55f90ed950ba130d75e9d9a5501a1a
-
Filesize
207B
MD5b5cad2f00e6a65e787d47c1502937119
SHA1a1c22906c7f15315f071f102048b413abcc4f55d
SHA256284ddfc536815660d6178b1da9867af8447d4fa31bb0ffbf58c88d560cfcebee
SHA5127ef45055264e60341c373a6ac612129911f39c0655e8e6ada9ea120980f3717f3897d01ffdceccb2c988c14826ff8568557318a66452b82128d5b3a41cd27d11
-
Filesize
2.2MB
MD52d86c4ad18524003d56c1cb27c549ba8
SHA1123007f9337364e044b87deacf6793c2027c8f47
SHA256091ab8a1acdab40c544bd1e5c91a96881acc318cac4df5235e1b5673f5489280
SHA5120dd5204733b3c20932aeea2cebf0ca1eeca70e4b3b3b8932d78d952a8f762f0b96ebdbdaf217e95889c02ec6a39b8f9919fd4c0cba56bb629256e71fa61faa3c
-
Filesize
207B
MD5567ffb17feca9cba84283ceb133e73cf
SHA182c19ccaf08cf24acd58100f1eb4ef805064844a
SHA256a28d861bc514f07f1088ea64c93599701bf52a1d54274f4c8ae4aac18b95d2be
SHA51217e9a090fb7dccb2608dea407cee29fc3874fd2881260a04bf52b0b9f941aaad1208df8be5bfbc7033b6f220e99010670c2c45c923a65ff987cecd654d342d81
-
Filesize
207B
MD5816ac991abc3a8f8c6ae68b7ee242213
SHA149d9f947e13b7df97cdf4f5c871b1e46f592cf72
SHA2566751257bc500db3a41e1d3d8909d4d6723a793b58107250b45e8fac33f96160e
SHA5122ff732a132b1538b5ef3d895e10f3dca4ccbcfa4cb2acc3bea5c399fe9a08be634da6cb6fff3aeb5205307601b7a0dc8b0fe7cd939a3b282b5734371cc0006b5
-
Filesize
207B
MD5f82e36bd1f5f4b1a8e53e5a6a3100f3c
SHA1f4948a77b5ef289c06d756efa658de94ec773889
SHA256a567293c9af13c92daaeac113c7efcb31eacbb054e8b063be692a32a848a43bb
SHA512b38ecede465f2cad0d93c1931f2f79b63e7b3bfa61367ec6848fb395affcfb33737a9d16e06d83c6af86f82293da6f10596af407939e95f0f2c30e20d1a88458
-
Filesize
207B
MD5efa76c63b8197193966de4f2c4eef0ce
SHA15c03806cb86eedbb8472348b4e845ad8078c1a5c
SHA256c8b5792982553f14d981a0d8f75193b0f50ed9797c78e8a8a26b963c90a117c4
SHA512f9f58719412c1c02bae56f7e91899008c653fd496507304f413d1132805dcf0f93f74e24f31f893c8c68dbddb45fc4be09c2dc2a908aaa0cdc4c74b5cbd0adf2
-
Filesize
11.3MB
MD504d5fbe1ca0ee0d8b82c9c47786de31d
SHA1e63bc0f81cb9d1b4439e62c5018ae30120a5a8a3
SHA2568bde20ee2c5183c9d13716242130b6fc5f8f4bf317e7908645dc460f3ed15715
SHA512dcd3213f484cbb301e8fb17b98fff51d6003cefd401e0d9358f0f2219e906f25f2fa0f66c81aa8bb031b327c6c19412b99472f2815262de86e73c635622b413a
-
Filesize
502KB
MD592479f1615fd4fa1dd3ac7f2e6a1b329
SHA10a6063d27c9f991be2053b113fcef25e071c57fd
SHA2560c4917cc756e769e94ab97d626bef49713dab833525ba2e5d75fc9aea4c72569
SHA5129f117c74c04749e6d0142e1cf952a8c59428f649413750921fc7aea35a3ccb62d9975ef954e61ce323d6234e0e9c7b8816f2ca9270552b726f9233219750847c