Analysis

  • max time kernel
    393s
  • max time network
    392s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    24-11-2024 11:06

General

  • Target

    https://gofile.to/b55d/gyat.exe

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

192.168.1.63:45678

Mutex

4wMHcxbOKref

Attributes
  • delay

    3

  • install

    false

  • install_file

    update

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Downloads MZ/PE file
  • A potential corporate email address has been identified in the URL: [email protected]
  • A potential corporate email address has been identified in the URL: [email protected]
  • A potential corporate email address has been identified in the URL: sweetalert2@11
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 9 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 20 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 58 IoCs
  • Suspicious use of FindShellTrayWindow 38 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.to/b55d/gyat.exe
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffff57d46f8,0x7ffff57d4708,0x7ffff57d4718
      2⤵
        PID:1088
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
        2⤵
          PID:5152
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4796
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:8
          2⤵
            PID:2352
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:1
            2⤵
              PID:2780
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:1
              2⤵
                PID:5360
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:1
                2⤵
                  PID:2108
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:1
                  2⤵
                    PID:4612
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:8
                    2⤵
                      PID:1596
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                      2⤵
                      • Drops file in Program Files directory
                      PID:8
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff67f135460,0x7ff67f135470,0x7ff67f135480
                        3⤵
                          PID:2568
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2336
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:1
                        2⤵
                          PID:1860
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:1
                          2⤵
                            PID:1744
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6352 /prefetch:1
                            2⤵
                              PID:5500
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:1
                              2⤵
                                PID:4708
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6684 /prefetch:1
                                2⤵
                                  PID:4536
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6260 /prefetch:1
                                  2⤵
                                    PID:3348
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6792 /prefetch:1
                                    2⤵
                                      PID:2860
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6204 /prefetch:1
                                      2⤵
                                        PID:1596
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=7108 /prefetch:8
                                        2⤵
                                          PID:3376
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6352 /prefetch:1
                                          2⤵
                                            PID:3820
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4032 /prefetch:8
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:4004
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6752 /prefetch:8
                                            2⤵
                                              PID:6052
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17897740614449474920,3231435532636084388,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5036 /prefetch:2
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:3480
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:2936
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:3796
                                              • C:\Windows\System32\rundll32.exe
                                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                1⤵
                                                  PID:2408
                                                • C:\Users\Admin\Downloads\gyat.exe
                                                  "C:\Users\Admin\Downloads\gyat.exe"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1636
                                                • C:\Windows\System32\oobe\UserOOBEBroker.exe
                                                  C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
                                                  1⤵
                                                  • Drops file in Windows directory
                                                  PID:2716
                                                • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
                                                  C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
                                                  1⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2532
                                                • C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\SecHealthUI.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\SecHealthUI.exe" -ServerName:SecHealthUI.AppXep4x2tbtjws1v9qqs0rmb3hxykvkpqtn.mca
                                                  1⤵
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3176
                                                • C:\Windows\System32\SecurityHealthHost.exe
                                                  C:\Windows\System32\SecurityHealthHost.exe {E041C90B-68BA-42C9-991E-477B73A75C90} -Embedding
                                                  1⤵
                                                    PID:624
                                                  • C:\Windows\System32\SecurityHealthHost.exe
                                                    C:\Windows\System32\SecurityHealthHost.exe {E041C90B-68BA-42C9-991E-477B73A75C90} -Embedding
                                                    1⤵
                                                      PID:5772
                                                    • C:\Windows\System32\SecurityHealthHost.exe
                                                      C:\Windows\System32\SecurityHealthHost.exe {E041C90B-68BA-42C9-991E-477B73A75C90} -Embedding
                                                      1⤵
                                                        PID:5432
                                                      • C:\Windows\system32\mspaint.exe
                                                        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Pictures\My Wallpaper.jpg"
                                                        1⤵
                                                        • Drops file in Windows directory
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:4440
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
                                                        1⤵
                                                          PID:4140
                                                        • C:\Windows\System32\oobe\UserOOBEBroker.exe
                                                          C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
                                                          1⤵
                                                          • Drops file in Windows directory
                                                          PID:3788
                                                        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
                                                          C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
                                                          1⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3988
                                                        • C:\Windows\SysWOW64\DllHost.exe
                                                          C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                                                          1⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3284
                                                        • C:\Windows\explorer.exe
                                                          C:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding
                                                          1⤵
                                                          • Modifies Internet Explorer settings
                                                          • Modifies registry class
                                                          • Suspicious behavior: AddClipboardFormatListener
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • Suspicious use of FindShellTrayWindow
                                                          PID:2112
                                                        • C:\Windows\SysWOW64\DllHost.exe
                                                          C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                                                          1⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1920
                                                        • C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\SecHealthUI.exe
                                                          "C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\SecHealthUI.exe" -ServerName:SecHealthUI.AppXep4x2tbtjws1v9qqs0rmb3hxykvkpqtn.mca
                                                          1⤵
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2076
                                                        • C:\Windows\System32\SecurityHealthHost.exe
                                                          C:\Windows\System32\SecurityHealthHost.exe {E041C90B-68BA-42C9-991E-477B73A75C90} -Embedding
                                                          1⤵
                                                            PID:2880
                                                          • C:\Windows\System32\SecurityHealthHost.exe
                                                            C:\Windows\System32\SecurityHealthHost.exe {E041C90B-68BA-42C9-991E-477B73A75C90} -Embedding
                                                            1⤵
                                                              PID:1608
                                                            • C:\Windows\System32\SecurityHealthHost.exe
                                                              C:\Windows\System32\SecurityHealthHost.exe {E041C90B-68BA-42C9-991E-477B73A75C90} -Embedding
                                                              1⤵
                                                                PID:1932
                                                              • C:\Windows\System32\SecurityHealthHost.exe
                                                                C:\Windows\System32\SecurityHealthHost.exe {E041C90B-68BA-42C9-991E-477B73A75C90} -Embedding
                                                                1⤵
                                                                  PID:6028
                                                                • C:\Windows\system32\mmc.exe
                                                                  "C:\Windows\system32\mmc.exe" "C:\Windows\system32\WF.msc"
                                                                  1⤵
                                                                  • Drops file in System32 directory
                                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:5560
                                                                • C:\Users\Admin\Downloads\gyat.exe
                                                                  "C:\Users\Admin\Downloads\gyat.exe"
                                                                  1⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:4108

                                                                Network

                                                                MITRE ATT&CK Enterprise v15

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                  Filesize

                                                                  152B

                                                                  MD5

                                                                  467bc167b06cdf2998f79460b98fa8f6

                                                                  SHA1

                                                                  a66fc2b411b31cb853195013d4677f4a2e5b6d11

                                                                  SHA256

                                                                  3b19522cb9ce73332fa1c357c6138b97b928545d38d162733eba68c8c5e604bd

                                                                  SHA512

                                                                  0eb63e6cacbec78b434d976fa2fb6fb44b1f9bc31001857c9bcb68c041bb52df30fbc7e1353f81d336b8a716821876fcacf3b32a107b16cec217c3d5d9621286

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                  Filesize

                                                                  152B

                                                                  MD5

                                                                  cc10dc6ba36bad31b4268762731a6c81

                                                                  SHA1

                                                                  9694d2aa8b119d674c27a1cfcaaf14ade8704e63

                                                                  SHA256

                                                                  d0d1f405097849f8203095f0d591e113145b1ce99df0545770138d772df4997f

                                                                  SHA512

                                                                  0ed193fdcc3f625221293bfd6af3132a5ce7d87138cd7df5e4b89353c89e237c1ff81920a2b17b7e0047f2cc8b2a976f667c7f12b0dcc273ddc3b4c8323b1b56

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                  Filesize

                                                                  48B

                                                                  MD5

                                                                  6d7b5284d035c0db7b68a09b4546bac4

                                                                  SHA1

                                                                  019c6e2e715111a16717b92c3b816bafa34f17f3

                                                                  SHA256

                                                                  390ebe566e24e9e120dd6880fe81478b7314fbc555c29acd13a412b66bac6a2d

                                                                  SHA512

                                                                  9cd3694940aaaa735dd643dc1357efd2a7e855c4ae2e41966d8030adae50277c895a132594276a73d2a74dafdab5e8dd883a7433975f6118d92a23cfa8a14ffa

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                  Filesize

                                                                  696B

                                                                  MD5

                                                                  93bc808ae15bd75fb289f093e6b26f90

                                                                  SHA1

                                                                  b26d51bf6510d84fbd3644b6245b8db147a503c1

                                                                  SHA256

                                                                  880dc4c135cff5ece7ac6e045d960700f3bc4465fd47b946e7378084dfb3d31e

                                                                  SHA512

                                                                  12de51ac5e27f0de76f002c4a88cd3a71b628961b84077968f1189b1ef79abb03a28723b645131724a2f4c2cc6fc3ae4b8164f0cf1dcb0e14c612a887967aed1

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                  Filesize

                                                                  528B

                                                                  MD5

                                                                  f39164fe02da01ea026a7f3003520042

                                                                  SHA1

                                                                  c5fea7d53e9338a3a250af0eec40bd3410c05717

                                                                  SHA256

                                                                  19f85522ef1d5b3d2102b518e25fa9a9e3c47fb65be2412bada588bb3a6be7e2

                                                                  SHA512

                                                                  f2f2f80b0a91434340c00da0deb2af860b4595a97e87c1c32b878ef43bf6b2de217eeae193e931c74733c1222a371509612a1f6c9d53bfc4296262baf7587802

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                                                  Filesize

                                                                  70KB

                                                                  MD5

                                                                  e5e3377341056643b0494b6842c0b544

                                                                  SHA1

                                                                  d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                                                  SHA256

                                                                  e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                                                  SHA512

                                                                  83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  9a751236541ae480a4b88903e98c164e

                                                                  SHA1

                                                                  8832bffbb1e1271ee804f10f92e83c0e588df3bb

                                                                  SHA256

                                                                  5a701264c79cd01ca530b92363ff495a5c71918fda98723d9c270b165cb26f9d

                                                                  SHA512

                                                                  868f786980d17d1e861af672f668be8356182385a2eec7aa7787995da1fbfe1475d8cbef5a328a0fc7e7bcc5c9923f1150be8a324b8dd8e60fdc58b12aaf7968

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe58b968.TMP

                                                                  Filesize

                                                                  59B

                                                                  MD5

                                                                  2800881c775077e1c4b6e06bf4676de4

                                                                  SHA1

                                                                  2873631068c8b3b9495638c865915be822442c8b

                                                                  SHA256

                                                                  226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                                                  SHA512

                                                                  e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                  Filesize

                                                                  5KB

                                                                  MD5

                                                                  4dc2d2ee0880cf7e646f890a5387c6af

                                                                  SHA1

                                                                  6dff11c198422f181ff42905e49a44a8dfc56db8

                                                                  SHA256

                                                                  e1b9a6a0a60df325bd5b831480d1dd195bfde2626d3e4b73b497496d2fb8a7e7

                                                                  SHA512

                                                                  dc6c7ddaca1e8bffc88abf7d544578f5a4dafa50b0224e30bb74c879531fe5520b8a7d8bd540662a220fd595c93a3ea5d38328234e4c1b517d343c32ca75337d

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                  Filesize

                                                                  6KB

                                                                  MD5

                                                                  c5d4558852ecadebcdc04ecd0bfaa0bc

                                                                  SHA1

                                                                  1526315c35a9c3b7225e52c20579b9cbc920188b

                                                                  SHA256

                                                                  32f007bb33ed44de35af1ba558cec47f92070741a340f9398da49abd30aac7ff

                                                                  SHA512

                                                                  16ed7c22fc4cd9caca441c2cb155fffb7294582843a3dfea561dee6eca256c94d1c74b7c54a57ee302eed53e1e1cb74e092db08d0cec582b1560cd01872bd044

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                  Filesize

                                                                  5KB

                                                                  MD5

                                                                  cf31cf04d508545c69ae6d79a6e5bc04

                                                                  SHA1

                                                                  ead24d4598b51907691edb6fb2eb04877e56476d

                                                                  SHA256

                                                                  e9baef4b51d8c234ba7cce6da8d07ececc8fdc932946e9d434dcfb8f18c9fe7c

                                                                  SHA512

                                                                  c4b99e2eff0c4f3ee837db839b18bc1b0db01eadcf3951e14706a596ad898a500a8cabe5e42ae1aa1f2f85d4656d6f7c3e7d961e07cd8ad819b3646997837350

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                  Filesize

                                                                  6KB

                                                                  MD5

                                                                  9cc224df48c01c9f20c1523b3beef488

                                                                  SHA1

                                                                  c3222d25242a5b6aea499f881356963b2aeff6a0

                                                                  SHA256

                                                                  99263f9801b17934741a4a7d6e818e39685c226ebedbdfa83bb9f4c95b82003e

                                                                  SHA512

                                                                  4b8e3df1507743cca09eb64430b925f940ea36b298d0f1a7fc11feafda3ad263c6ca851ebc1eb24b56dde7d1a124366cfa54e69ae694f9f0878d7383cd15f1bc

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                  Filesize

                                                                  24KB

                                                                  MD5

                                                                  3b964859deef3a6f470b8021df49b34d

                                                                  SHA1

                                                                  62023dacf1e4019c9f204297c6be7e760f71a65d

                                                                  SHA256

                                                                  087debdcfba4666c03a5ea699e9bb31cf22ef4e0fad7c961cb0b500e5d262fb5

                                                                  SHA512

                                                                  c30b7e1b28820a5815b52634b46cb210c241704e33e41304400cb3ed29e82ec547a1068fc819350b368456bcabd27034afade5add3251dc74e4174f51b6c7adf

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                  Filesize

                                                                  24KB

                                                                  MD5

                                                                  5c2d5c900312f44e72209416d45723cb

                                                                  SHA1

                                                                  68fb8909308589149399c3fb74605600833fbbc1

                                                                  SHA256

                                                                  56f7a77549e5fc45bd4b1f7c2db3e8b4bd1dd9234545207613a80342cee8e7d8

                                                                  SHA512

                                                                  07c2920cff7c1125e3a2fe66bf21d8606a1f2a3d36be2d8e136da0d2a21130242ac8324f18cedfb0040304cf804815861767c969a6923d8db851312bf9b4348b

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  ba47e5d26bb0899dbfd259fa56604550

                                                                  SHA1

                                                                  f2aacb2fda0a85adaf814d8b2f74e732bf81d652

                                                                  SHA256

                                                                  8e6ff959dade6f4ea463aeb2535d75fe19575dee730d9594ce37443dd9dca59c

                                                                  SHA512

                                                                  22538c537b59f0bcf6c1951068fa7af3a440901b5ba092ce1ba0091ae2c0dc186bfc8cb2bbcfb260a96070760294fb6397716a1f67dd566ca90fb1e17d202363

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  820b2ac3c28fcf6e548a3f55a789fc22

                                                                  SHA1

                                                                  a5309648c252349ade840e7e7e816ca9355aec39

                                                                  SHA256

                                                                  dd9618885181114552f158bd932431baf83b38b8181b7cf490d4b265c609ba25

                                                                  SHA512

                                                                  6b10e1d3e557ebca8fccfb2bc220ed2ee1bf8912ec43d35be4f2b86737a840c7826d19e10b9eb0ad224a9f25ec3984b5b503325b29793a577b74cd64fbe56d7e

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe582e7d.TMP

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  04f46c3e090d5a35f6758ab381aaaece

                                                                  SHA1

                                                                  d630c76f3cd373f89b53fd25021ee9778eec1441

                                                                  SHA256

                                                                  5277d24ff03e794bdcc2bcaaeb4a621130d6e42f2ce3e77803597904fda9a6d7

                                                                  SHA512

                                                                  f465dd883e25afc053e6aef8daa31169ffe5b85009bad18227b033a2f2f4f71bb70472c445bc8cfbb55975384215511347187209a1b9c2fe6b31cde0f9dc07bb

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                  Filesize

                                                                  16B

                                                                  MD5

                                                                  206702161f94c5cd39fadd03f4014d98

                                                                  SHA1

                                                                  bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                  SHA256

                                                                  1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                  SHA512

                                                                  0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001

                                                                  Filesize

                                                                  41B

                                                                  MD5

                                                                  5af87dfd673ba2115e2fcf5cfdb727ab

                                                                  SHA1

                                                                  d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                  SHA256

                                                                  f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                  SHA512

                                                                  de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT

                                                                  Filesize

                                                                  16B

                                                                  MD5

                                                                  46295cac801e5d4857d09837238a6394

                                                                  SHA1

                                                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                  SHA256

                                                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                  SHA512

                                                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                  Filesize

                                                                  10KB

                                                                  MD5

                                                                  427a3629af44e5761c6c447fc788dccc

                                                                  SHA1

                                                                  bea3f297c78400b054ddb851cac66f5934524841

                                                                  SHA256

                                                                  a2fad50bacfb82443a0e71443feb2561d60f56b0b131540446e5f908206491c9

                                                                  SHA512

                                                                  64673b28a003c020b2c4bcc05c0675fe20508df941b97d64bd2ce35c98191301e1e58fb4e93e75d5af7e8495f7c22dc5269b30854a69fa43a920f85e4893461a

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                  Filesize

                                                                  8KB

                                                                  MD5

                                                                  b6a113af80161566b839f2a612ef5e08

                                                                  SHA1

                                                                  bd7d32111070f4f3c927269caafe8bc51f04a8f7

                                                                  SHA256

                                                                  0b7abefc0fe29442910001ff36973fef0fbc8f90f635e03197d92486ee7f339e

                                                                  SHA512

                                                                  70002c3f259d28f04aa67b2294b11ea9796e6026e3562978820b0f2035334690a40257f571c79b26f623b0f634d9b6d8afb42698b716279861ec40a467f6f8ff

                                                                • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\logs\Common\FileCoAuth-2024-11-24.118.2532.1.odl

                                                                  Filesize

                                                                  706B

                                                                  MD5

                                                                  94c39c8389b8be0118f61c8beb7a5343

                                                                  SHA1

                                                                  e0b1244d32108927f0785a0c5abea901ade1d1b8

                                                                  SHA256

                                                                  642b3baa7736255ebd83f3aa56b549c8435273da43e4f6042e2f500821dcd070

                                                                  SHA512

                                                                  d1c13730a71a16a083a9f3dc0fee83214920713e80bb4547d7d6f96a010267617053e9660a18c8d65572e1b9d8e12c46545c1b01887e61629dbd4289feb333aa

                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                                  Filesize

                                                                  3KB

                                                                  MD5

                                                                  fe196408580645adaa6e7649d3e1ee0a

                                                                  SHA1

                                                                  b50c48063141c80ffabb5986e36388b70fff8c2e

                                                                  SHA256

                                                                  099c2e8029c108ec15ce966c04984954e2697498a61bd10202617f0e824c74e9

                                                                  SHA512

                                                                  36c78d87c1891dd4df50096f001542d621d009d1ed121403e192dba6a09d84db2eb9f4e209dec9c715cbb31bdf7d0cc02707b1a57b0dd3667ded049f90c49a3f

                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                                  Filesize

                                                                  3KB

                                                                  MD5

                                                                  e2e4b6a0766c51d017deeea9f2e27418

                                                                  SHA1

                                                                  b57af2b9a13b7535f98dfe23022640fd437f5650

                                                                  SHA256

                                                                  b142101bca90a52027fd28c0417b9f69d185e1b3790657f7fe9a1bdfc68e211e

                                                                  SHA512

                                                                  d39c986a8f6cef578d60def0f37709b6ac428d9fa2b6d3862617b4a10d4bbd20512debcbb0fa7c3828d95df6b2afe38d40eef7fb00d66b00548ad91e0d6ee138

                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                                  Filesize

                                                                  8KB

                                                                  MD5

                                                                  2d7bf2c4976d6c9644c04ae072cb9339

                                                                  SHA1

                                                                  463c5a2c32a8a45b9ceedb4a486fa8b7fc232e2d

                                                                  SHA256

                                                                  97cf38e0b0a915aa32e1a3ab0e44cc7b436f1c272d2bcaec427c19028f067164

                                                                  SHA512

                                                                  0a19901fe54c402bd9018d678e5856df7ab215bf1247465315aa18e0426c6e07c602b581fbd59ede1d329bf86b78659891f8bdeb03ebb4cabd72a0a324a7bee4

                                                                • C:\Users\Admin\Downloads\Unconfirmed 224039.crdownload

                                                                  Filesize

                                                                  45KB

                                                                  MD5

                                                                  2541779f4721f47090af7740e951fa2b

                                                                  SHA1

                                                                  7a7ec8a327d2facb1c02b1ce1354b519e6159d0a

                                                                  SHA256

                                                                  b559a8fc40ac83843685fdb8735f445a72dcfd4fc5441b33ad8332e1e1bb52fe

                                                                  SHA512

                                                                  c5e2527547218ace005df0c9e3c8ff6d50a562af4a89ae52b0fed1d9c65c305051d9516831957197d57eb7cd2a8d2732af3b5a5c5994730f4d33c0f7d0031d86

                                                                • memory/1636-376-0x00000000004F0000-0x0000000000502000-memory.dmp

                                                                  Filesize

                                                                  72KB

                                                                • memory/5560-439-0x000000001E1D0000-0x000000001E6B6000-memory.dmp

                                                                  Filesize

                                                                  4.9MB

                                                                • memory/5560-440-0x00000000204B0000-0x00000000204D2000-memory.dmp

                                                                  Filesize

                                                                  136KB