Analysis
-
max time kernel
30s -
max time network
31s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
24-11-2024 03:59
Static task
static1
General
-
Target
UNBANSEVER.exe
-
Size
1.5MB
-
MD5
b086631c257c5dc8eba94d46245385f7
-
SHA1
a6384ec1428329b3eab89e44ac79d23042984821
-
SHA256
9deda7281dac54a2b7900300b1633a01da0dd33221f8c4a03c1691e871336483
-
SHA512
f9b3df84bf5db8318795961341141d75b88dd8ca5dadf2214807c98ab7ff98760334e7073c2c38bd28159730d6f7d12a185245558de973a9a72397b25a3ef542
-
SSDEEP
24576:Ob4Ff/RLTbkY25ayxZ2i/UcgOpu+hcA+sbaNRBjv8oaa:W4Ff/RLTArbf2i7gwuqcA+sbkvhb
Malware Config
Extracted
xworm
45.141.27.248:7777
45.141.26.194:7000
-
Install_directory
%AppData%
-
install_file
svchost.exe
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x0028000000045031-19.dat family_xworm behavioral1/memory/4548-30-0x0000000000D20000-0x0000000000D38000-memory.dmp family_xworm behavioral1/files/0x0028000000045036-175.dat family_xworm behavioral1/memory/552-188-0x0000000000330000-0x0000000000352000-memory.dmp family_xworm -
Xred family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2020 powershell.exe 5092 powershell.exe 2376 powershell.exe 4544 powershell.exe 4540 powershell.exe 4976 powershell.exe 2672 powershell.exe 2688 powershell.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000\Control Panel\International\Geo\Nation UNBANSEVER.exe Key value queried \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000\Control Panel\International\Geo\Nation UNBANSEVER.exe Key value queried \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000\Control Panel\International\Geo\Nation ._cache_UNBANSEVER.exe Key value queried \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000\Control Panel\International\Geo\Nation SecurityHealthSystray.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Registry.lnk SecurityHealthSystray.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Registry.lnk SecurityHealthSystray.exe -
Executes dropped EXE 8 IoCs
pid Process 2548 UNBANSEVER.exe 4548 svchost.exe 4712 ._cache_UNBANSEVER.exe 3772 Synaptics.exe 3180 UNBANSEVER.exe 552 SecurityHealthSystray.exe 2660 Registry 2456 svchost.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" UNBANSEVER.exe Set value (str) \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "C:\\ProgramData\\Registry" SecurityHealthSystray.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UNBANSEVER.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Kills process with taskkill 36 IoCs
pid Process 2896 taskkill.exe 4988 taskkill.exe 1916 taskkill.exe 1988 taskkill.exe 3936 taskkill.exe 2004 taskkill.exe 5096 taskkill.exe 1988 taskkill.exe 1016 taskkill.exe 3788 taskkill.exe 756 taskkill.exe 1472 taskkill.exe 3132 taskkill.exe 2960 taskkill.exe 352 taskkill.exe 3960 taskkill.exe 2876 taskkill.exe 2716 taskkill.exe 3944 taskkill.exe 464 taskkill.exe 4944 taskkill.exe 3140 taskkill.exe 4632 taskkill.exe 460 taskkill.exe 5036 taskkill.exe 3332 taskkill.exe 3316 taskkill.exe 4476 taskkill.exe 3680 taskkill.exe 4500 taskkill.exe 3624 taskkill.exe 3080 taskkill.exe 5036 taskkill.exe 2192 taskkill.exe 4980 taskkill.exe 1972 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ UNBANSEVER.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2716 schtasks.exe 4536 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2468 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2020 powershell.exe 2020 powershell.exe 5092 powershell.exe 5092 powershell.exe 5092 powershell.exe 2376 powershell.exe 2376 powershell.exe 2376 powershell.exe 4544 powershell.exe 4544 powershell.exe 4540 powershell.exe 4540 powershell.exe 4544 powershell.exe 4540 powershell.exe 4976 powershell.exe 4976 powershell.exe 2672 powershell.exe 4976 powershell.exe 2672 powershell.exe 2672 powershell.exe 2688 powershell.exe 2688 powershell.exe 2688 powershell.exe 4548 svchost.exe 4548 svchost.exe 552 SecurityHealthSystray.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4548 svchost.exe Token: SeDebugPrivilege 552 SecurityHealthSystray.exe Token: SeDebugPrivilege 4476 taskkill.exe Token: SeDebugPrivilege 3680 taskkill.exe Token: SeDebugPrivilege 1016 taskkill.exe Token: SeDebugPrivilege 2876 taskkill.exe Token: SeDebugPrivilege 5036 taskkill.exe Token: SeDebugPrivilege 2960 taskkill.exe Token: SeDebugPrivilege 2020 powershell.exe Token: SeDebugPrivilege 352 taskkill.exe Token: SeDebugPrivilege 4632 taskkill.exe Token: SeDebugPrivilege 3788 taskkill.exe Token: SeIncreaseQuotaPrivilege 2020 powershell.exe Token: SeSecurityPrivilege 2020 powershell.exe Token: SeTakeOwnershipPrivilege 2020 powershell.exe Token: SeLoadDriverPrivilege 2020 powershell.exe Token: SeSystemProfilePrivilege 2020 powershell.exe Token: SeSystemtimePrivilege 2020 powershell.exe Token: SeProfSingleProcessPrivilege 2020 powershell.exe Token: SeIncBasePriorityPrivilege 2020 powershell.exe Token: SeCreatePagefilePrivilege 2020 powershell.exe Token: SeBackupPrivilege 2020 powershell.exe Token: SeRestorePrivilege 2020 powershell.exe Token: SeShutdownPrivilege 2020 powershell.exe Token: SeDebugPrivilege 2020 powershell.exe Token: SeSystemEnvironmentPrivilege 2020 powershell.exe Token: SeRemoteShutdownPrivilege 2020 powershell.exe Token: SeUndockPrivilege 2020 powershell.exe Token: SeManageVolumePrivilege 2020 powershell.exe Token: 33 2020 powershell.exe Token: 34 2020 powershell.exe Token: 35 2020 powershell.exe Token: 36 2020 powershell.exe Token: SeDebugPrivilege 1988 taskkill.exe Token: SeDebugPrivilege 460 taskkill.exe Token: SeDebugPrivilege 4980 taskkill.exe Token: SeDebugPrivilege 4988 taskkill.exe Token: SeDebugPrivilege 5092 powershell.exe Token: SeDebugPrivilege 756 taskkill.exe Token: SeDebugPrivilege 4500 taskkill.exe Token: SeDebugPrivilege 2376 powershell.exe Token: SeIncreaseQuotaPrivilege 5092 powershell.exe Token: SeSecurityPrivilege 5092 powershell.exe Token: SeTakeOwnershipPrivilege 5092 powershell.exe Token: SeLoadDriverPrivilege 5092 powershell.exe Token: SeSystemProfilePrivilege 5092 powershell.exe Token: SeSystemtimePrivilege 5092 powershell.exe Token: SeProfSingleProcessPrivilege 5092 powershell.exe Token: SeIncBasePriorityPrivilege 5092 powershell.exe Token: SeCreatePagefilePrivilege 5092 powershell.exe Token: SeBackupPrivilege 5092 powershell.exe Token: SeRestorePrivilege 5092 powershell.exe Token: SeShutdownPrivilege 5092 powershell.exe Token: SeDebugPrivilege 5092 powershell.exe Token: SeSystemEnvironmentPrivilege 5092 powershell.exe Token: SeRemoteShutdownPrivilege 5092 powershell.exe Token: SeUndockPrivilege 5092 powershell.exe Token: SeManageVolumePrivilege 5092 powershell.exe Token: 33 5092 powershell.exe Token: 34 5092 powershell.exe Token: 35 5092 powershell.exe Token: 36 5092 powershell.exe Token: SeDebugPrivilege 3332 taskkill.exe Token: SeDebugPrivilege 3316 taskkill.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2468 EXCEL.EXE 2468 EXCEL.EXE 2468 EXCEL.EXE 2468 EXCEL.EXE 4548 svchost.exe 552 SecurityHealthSystray.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1564 wrote to memory of 2548 1564 UNBANSEVER.exe 81 PID 1564 wrote to memory of 2548 1564 UNBANSEVER.exe 81 PID 1564 wrote to memory of 2548 1564 UNBANSEVER.exe 81 PID 1564 wrote to memory of 4548 1564 UNBANSEVER.exe 82 PID 1564 wrote to memory of 4548 1564 UNBANSEVER.exe 82 PID 2548 wrote to memory of 4712 2548 UNBANSEVER.exe 83 PID 2548 wrote to memory of 4712 2548 UNBANSEVER.exe 83 PID 2548 wrote to memory of 3772 2548 UNBANSEVER.exe 84 PID 2548 wrote to memory of 3772 2548 UNBANSEVER.exe 84 PID 2548 wrote to memory of 3772 2548 UNBANSEVER.exe 84 PID 4712 wrote to memory of 3180 4712 ._cache_UNBANSEVER.exe 85 PID 4712 wrote to memory of 3180 4712 ._cache_UNBANSEVER.exe 85 PID 4712 wrote to memory of 552 4712 ._cache_UNBANSEVER.exe 87 PID 4712 wrote to memory of 552 4712 ._cache_UNBANSEVER.exe 87 PID 3180 wrote to memory of 1996 3180 UNBANSEVER.exe 90 PID 3180 wrote to memory of 1996 3180 UNBANSEVER.exe 90 PID 1996 wrote to memory of 4476 1996 cmd.exe 91 PID 1996 wrote to memory of 4476 1996 cmd.exe 91 PID 3180 wrote to memory of 524 3180 UNBANSEVER.exe 94 PID 3180 wrote to memory of 524 3180 UNBANSEVER.exe 94 PID 524 wrote to memory of 3680 524 cmd.exe 95 PID 524 wrote to memory of 3680 524 cmd.exe 95 PID 3180 wrote to memory of 4500 3180 UNBANSEVER.exe 132 PID 3180 wrote to memory of 4500 3180 UNBANSEVER.exe 132 PID 4500 wrote to memory of 1016 4500 cmd.exe 98 PID 4500 wrote to memory of 1016 4500 cmd.exe 98 PID 3180 wrote to memory of 2964 3180 UNBANSEVER.exe 100 PID 3180 wrote to memory of 2964 3180 UNBANSEVER.exe 100 PID 2964 wrote to memory of 2876 2964 cmd.exe 101 PID 2964 wrote to memory of 2876 2964 cmd.exe 101 PID 3180 wrote to memory of 2920 3180 UNBANSEVER.exe 102 PID 3180 wrote to memory of 2920 3180 UNBANSEVER.exe 102 PID 2920 wrote to memory of 5036 2920 cmd.exe 181 PID 2920 wrote to memory of 5036 2920 cmd.exe 181 PID 3180 wrote to memory of 1928 3180 UNBANSEVER.exe 104 PID 3180 wrote to memory of 1928 3180 UNBANSEVER.exe 104 PID 1928 wrote to memory of 2960 1928 cmd.exe 105 PID 1928 wrote to memory of 2960 1928 cmd.exe 105 PID 4548 wrote to memory of 2020 4548 svchost.exe 107 PID 4548 wrote to memory of 2020 4548 svchost.exe 107 PID 3180 wrote to memory of 464 3180 UNBANSEVER.exe 158 PID 3180 wrote to memory of 464 3180 UNBANSEVER.exe 158 PID 464 wrote to memory of 352 464 cmd.exe 110 PID 464 wrote to memory of 352 464 cmd.exe 110 PID 3180 wrote to memory of 4880 3180 UNBANSEVER.exe 111 PID 3180 wrote to memory of 4880 3180 UNBANSEVER.exe 111 PID 4880 wrote to memory of 4632 4880 cmd.exe 112 PID 4880 wrote to memory of 4632 4880 cmd.exe 112 PID 3180 wrote to memory of 2504 3180 UNBANSEVER.exe 113 PID 3180 wrote to memory of 2504 3180 UNBANSEVER.exe 113 PID 2504 wrote to memory of 3788 2504 cmd.exe 144 PID 2504 wrote to memory of 3788 2504 cmd.exe 144 PID 3180 wrote to memory of 4348 3180 UNBANSEVER.exe 115 PID 3180 wrote to memory of 4348 3180 UNBANSEVER.exe 115 PID 4348 wrote to memory of 1988 4348 cmd.exe 177 PID 4348 wrote to memory of 1988 4348 cmd.exe 177 PID 3180 wrote to memory of 1104 3180 UNBANSEVER.exe 119 PID 3180 wrote to memory of 1104 3180 UNBANSEVER.exe 119 PID 1104 wrote to memory of 460 1104 cmd.exe 120 PID 1104 wrote to memory of 460 1104 cmd.exe 120 PID 3180 wrote to memory of 1800 3180 UNBANSEVER.exe 121 PID 3180 wrote to memory of 1800 3180 UNBANSEVER.exe 121 PID 1800 wrote to memory of 4980 1800 cmd.exe 122 PID 1800 wrote to memory of 4980 1800 cmd.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\UNBANSEVER.exe"C:\Users\Admin\AppData\Local\Temp\UNBANSEVER.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Roaming\UNBANSEVER.exe"C:\Users\Admin\AppData\Roaming\UNBANSEVER.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\._cache_UNBANSEVER.exe"C:\Users\Admin\AppData\Local\Temp\._cache_UNBANSEVER.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\ProgramData\UNBANSEVER.exe"C:\ProgramData\UNBANSEVER.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im RiotClienServices.exe >nul 2>&15⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\system32\taskkill.exetaskkill /f /im RiotClienServices.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4476
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im vgtray.exe >nul 2>&15⤵
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\system32\taskkill.exetaskkill /f /im vgtray.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&15⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im mafiaengine-x86_64-SSE4-AVX2.exe >nul 2>&15⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\system32\taskkill.exetaskkill /f /im mafiaengine-x86_64-SSE4-AVX2.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im KsDumperClient.exe >nul 2>&15⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\system32\taskkill.exetaskkill /f /im KsDumperClient.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im KsDumper.exe >nul 2>&15⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\system32\taskkill.exetaskkill /f /im KsDumper.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&15⤵
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:352
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&15⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im ProcessHacker.exe >nul 2>&15⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\system32\taskkill.exetaskkill /f /im ProcessHacker.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im idaq.exe >nul 2>&15⤵
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\system32\taskkill.exetaskkill /f /im idaq.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im idaq64.exe >nul 2>&15⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\system32\taskkill.exetaskkill /f /im idaq64.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:460
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Wireshark.exe >nul 2>&15⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\system32\taskkill.exetaskkill /f /im Wireshark.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Fiddler.exe >nul 2>&15⤵PID:4372
-
C:\Windows\system32\taskkill.exetaskkill /f /im Fiddler.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im FiddlerEverywhere.exe >nul 2>&15⤵PID:4976
-
C:\Windows\system32\taskkill.exetaskkill /f /im FiddlerEverywhere.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Xenos64.exe >nul 2>&15⤵PID:5008
-
C:\Windows\system32\taskkill.exetaskkill /f /im Xenos64.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Xenos.exe >nul 2>&15⤵PID:3596
-
C:\Windows\system32\taskkill.exetaskkill /f /im Xenos.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3332
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Xenos32.exe >nul 2>&15⤵PID:5084
-
C:\Windows\system32\taskkill.exetaskkill /f /im Xenos32.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im de4dot.exe >nul 2>&15⤵PID:2492
-
C:\Windows\system32\taskkill.exetaskkill /f /im de4dot.exe6⤵
- Kills process with taskkill
PID:2716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Cheat Engine.exe >nul 2>&15⤵PID:4036
-
C:\Windows\system32\taskkill.exetaskkill /f /im Cheat Engine.exe6⤵
- Kills process with taskkill
PID:3936
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64.exe >nul 2>&15⤵PID:4680
-
C:\Windows\system32\taskkill.exetaskkill /f /im cheatengine-x86_64.exe6⤵
- Kills process with taskkill
PID:2004
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64-SSE4-AVX2.exe >nul 2>&15⤵PID:5000
-
C:\Windows\system32\taskkill.exetaskkill /f /im cheatengine-x86_64-SSE4-AVX2.exe6⤵
- Kills process with taskkill
PID:3944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im MugenJinFuu-x86_64-SSE4-AVX2.exe >nul 2>&15⤵PID:4372
-
C:\Windows\system32\taskkill.exetaskkill /f /im MugenJinFuu-x86_64-SSE4-AVX2.exe6⤵
- Kills process with taskkill
PID:1916
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im MugenJinFuu-i386.exe >nul 2>&15⤵PID:4524
-
C:\Windows\system32\taskkill.exetaskkill /f /im MugenJinFuu-i386.exe6⤵
- Kills process with taskkill
PID:1472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64.exe >nul 2>&15⤵PID:4272
-
C:\Windows\system32\taskkill.exetaskkill /f /im cheatengine-x86_64.exe6⤵
- Kills process with taskkill
PID:464
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-i386.exe >nul 2>&15⤵PID:3640
-
C:\Windows\system32\taskkill.exetaskkill /f /im cheatengine-i386.exe6⤵
- Kills process with taskkill
PID:4944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTP Debugger Windows Service (32 bit).exe >nul 2>&15⤵PID:544
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTP Debugger Windows Service (32 bit).exe6⤵
- Kills process with taskkill
PID:3132
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im KsDumper.exe >nul 2>&15⤵PID:3200
-
C:\Windows\system32\taskkill.exetaskkill /f /im KsDumper.exe6⤵
- Kills process with taskkill
PID:3140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im OllyDbg.exe >nul 2>&15⤵PID:2104
-
C:\Windows\system32\taskkill.exetaskkill /f /im OllyDbg.exe6⤵
- Kills process with taskkill
PID:1972
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im x64dbg.exe >nul 2>&15⤵PID:4376
-
C:\Windows\system32\taskkill.exetaskkill /f /im x64dbg.exe6⤵
- Kills process with taskkill
PID:3624
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im x32dbg.exe >nul 2>&15⤵PID:928
-
C:\Windows\system32\taskkill.exetaskkill /f /im x32dbg.exe6⤵
- Kills process with taskkill
PID:5096
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&15⤵PID:4700
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe6⤵
- Kills process with taskkill
PID:1988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&15⤵PID:2812
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe6⤵
- Kills process with taskkill
PID:3080
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Ida64.exe >nul 2>&15⤵PID:3252
-
C:\Windows\system32\taskkill.exetaskkill /f /im Ida64.exe6⤵
- Kills process with taskkill
PID:5036
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im OllyDbg.exe >nul 2>&15⤵PID:4520
-
C:\Windows\system32\taskkill.exetaskkill /f /im OllyDbg.exe6⤵
- Kills process with taskkill
PID:2896
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Dbg64.exe >nul 2>&15⤵PID:4456
-
C:\Windows\system32\taskkill.exetaskkill /f /im Dbg64.exe6⤵
- Kills process with taskkill
PID:3960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Dbg32.exe >nul 2>&15⤵PID:2820
-
C:\Windows\system32\taskkill.exetaskkill /f /im Dbg32.exe6⤵
- Kills process with taskkill
PID:2192
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls5⤵PID:3812
-
-
-
C:\ProgramData\SecurityHealthSystray.exe"C:\ProgramData\SecurityHealthSystray.exe"4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:552 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\SecurityHealthSystray.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SecurityHealthSystray.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4540 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:3788
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Registry'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Registry'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2688
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Registry" /tr "C:\ProgramData\Registry"5⤵
- Scheduled Task/Job: Scheduled Task
PID:2716
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3772
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4536
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"3⤵PID:1528
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"3⤵PID:1972
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:3132
-
C:\ProgramData\Registry"C:\ProgramData\Registry"1⤵
- Executes dropped EXE
PID:2660
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"1⤵
- Executes dropped EXE
PID:2456
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD508cc682417292fe4a048e5e466b13a1b
SHA1bd2feb697b639327de8eb67e6ac4957df8f3b7b3
SHA25638182c14bb826f357f1348df2affc840df3173054347b4883b0e3ae18402448c
SHA512f5c5c49e9d652bdc3d89912880c2eefa80cce28fc3ecb7e3bb267969bd6dc79a5c8e218c307c869df2e63c50bb97a37813e47c6a87170c83a1bae4f9bf538267
-
Filesize
753KB
MD507293a0fdb8c1eadcc0d29f6393d8a38
SHA11e1b5c039848ac34b288965212424af2aa97f9b2
SHA2567ccd0b389b97d10c6de3ec6e2bd1abb3969d25db4d1426633198dae20641245a
SHA512e8d68582ee882662569cbb3fa9ca87cb23cc61e9afe436c60d2c9a8a69edd8221c5c974a82a73055b2fa7ebe0a34aef95ec7ade3df609e188d23c67088cfa1f8
-
Filesize
548KB
MD56c08ba3b33673a7979167a6138a42544
SHA1a065fa0d2d8d1d82dbb6cd1e1b3c8be2a09c74d1
SHA256bed8d059ed403a6ff674aee820d5b3b0df4e072d1e86d09af8b55703abe31038
SHA51269ea45439d6a965758fe8e8bbe05f6d247231e72d98e7396a77f6958636b968eb43742dcc4a1be4a9f05e67a0b2c526c16e27b7e7c64ce8fafed7531d180c03e
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD5c67441dfa09f61bca500bb43407c56b8
SHA15a56cf7cbeb48c109e2128c31b681fac3959157b
SHA25663082da456c124d0bc516d2161d1613db5f3008d903e4066d2c7b4e90b435f33
SHA512325de8b718b3a01df05e20e028c5882240e5fd2e96c771361b776312923ff178f27494a1f5249bf6d7365a99155eb8735a51366e85597008e6a10462e63ee0e8
-
Filesize
1KB
MD59ed3b07cd0201735d935489823a4ae50
SHA17656830e99dfe351bc5e482e89f28d610e185cfc
SHA256a65c9159d45f310034693af21c935c3fa97219666e6ff02ac197eb06e3f967a9
SHA5121d9df661c507514cb77920fff9dc39e6bddf33c1947738693732df70b6334377e882b01c2244e612ba6768ba9357c8a98822585a577c54b2242de763774fd2a9
-
Filesize
1KB
MD53f397b6002221aceaa6f7060d4f70835
SHA1af773dd1eba3551a87c7371cc9feaafbfd2dbb44
SHA256491394f85f076c4a4dd2e7c2034e98971772e30aa06eadbcb2e348e9cd8c4006
SHA51277c6f2f89265475d979a5fbdc71487fd77c76c3832e53e20cead9561b747eb273b479f178c063c58651437f35450c57673cf5b83054d49688d8c9f89b173d5a0
-
Filesize
1KB
MD591c7142641892d9ebd7682b31c336b75
SHA105cdb58f14dc2bbe2b8bb2d3158a6cee9e7bfb9f
SHA256e7e8a4def273d0e298b8aac873652004bebb98a7e424f5896d85819068e894c5
SHA51256335db470bd4b44a316170323adbfc76523d62d6cd3d70e6211d22c12fc48e3e6171b7f97bf369272d3c9953b1e622dc908fa9d745db209ac712d7ca4914fa5
-
Filesize
675KB
MD5ed22ee40a790a5153cd085e9dbd7391f
SHA1f4e4d5723b2402c9a1c972b2c40ce2311d10171e
SHA256a4504aa12e11ba425fca91830b3bed4834dd44109a01d5ff8c75e110a482fcc5
SHA5125cb1b65f1c7861f89f09fb35b0a3ce189f4ded76c952b60f4a5fdb7f6abca3268fa768a6576ff9f09d106e6ed0ba4391ddd9aabc684b7e3101f0fd64cdbcd5a3
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.4MB
MD5539f768061ffc3f39075ae3e4442802a
SHA1706043a7105c1409d0007cdf6334dc0e34a4dfd8
SHA2562300047877eeecb89531c05ef2736f621df249feb44a3cd7321c56a8355f10a1
SHA512bd6086b87a80e3e36941deda63bca0c8fcf8f25e295fb4c211ccf848edf05afe5176fd0b77f53f536706bcf5a0f229ee81b3a97ad46d5ea8c0a90be2eb47ad32
-
Filesize
70KB
MD5e9a629dd7b0accda9d7696fc15135663
SHA1d3643c86610e441da6304670fe7e5c2d07d1a6df
SHA256bace1c7a8d5498687db5abc129d37373a918d5bda3ef11b94f21b3807887e799
SHA512cceadc67f570e0165b0925b450e06eac2c46552e0b646a761862f5e6290fbdd727b84b41ca23470edf42da623643f29c58ea5a01bcf084f4488476ecace144d6