Resubmissions
25-11-2024 10:00
241125-l129jaxlhr 1025-11-2024 09:58
241125-lzk9ma1kg1 1025-11-2024 09:56
241125-lyt55s1kew 1025-11-2024 09:46
241125-lrsnqswral 10Analysis
-
max time kernel
1769s -
max time network
1800s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
25-11-2024 10:00
Behavioral task
behavioral1
Sample
EXECUTOR METEOR .exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
EXECUTOR METEOR .exe
Resource
win11-20241007-en
General
-
Target
EXECUTOR METEOR .exe
-
Size
1.1MB
-
MD5
e5be94d6e847bb7656e80201cacf67fb
-
SHA1
cc1ce69eea609b5fc9ff18f09407b934690bcff3
-
SHA256
be5c49fa94be78520ee83ed6230a80aaf0ae9dd4bb2d6053aa8f843131f2f506
-
SHA512
306c26f1e72a32c479b8d9112e2e0c5d22fd0e46b02ae5fa7ffff51191c9d79a52a2dbe7d200e0dc9cccf0919cba3693905c8b2dc6c6fc8f3d7eaf883e388100
-
SSDEEP
24576:U2G/nvxW3Ww0tiUfTyqyg1hIZ9XWp7wJO:UbA30L+ixx
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2372 236 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2596 236 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4808 236 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2592 236 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2128 236 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4352 236 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2508 236 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2452 236 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3064 236 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1872 236 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4628 236 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2216 236 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3648 236 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 964 236 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3748 236 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2936 236 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4904 236 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4364 236 schtasks.exe 84 -
resource yara_rule behavioral1/files/0x002900000004502d-12.dat dcrat behavioral1/memory/1492-16-0x0000000000270000-0x0000000000346000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation EXECUTOR METEOR .exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation surrogateRuntime.exe -
Executes dropped EXE 23 IoCs
pid Process 1492 surrogateRuntime.exe 2968 upfc.exe 4548 wininit.exe 3480 unsecapp.exe 2152 MoUsoCoreWorker.exe 3652 upfc.exe 4336 wininit.exe 3532 unsecapp.exe 4072 surrogateRuntime.exe 636 RuntimeBroker.exe 3244 wininit.exe 3352 MoUsoCoreWorker.exe 3844 upfc.exe 4396 unsecapp.exe 2948 wininit.exe 472 surrogateRuntime.exe 2276 MoUsoCoreWorker.exe 828 unsecapp.exe 2356 wininit.exe 4392 upfc.exe 1136 RuntimeBroker.exe 116 unsecapp.exe 980 wininit.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\it-IT\wininit.exe surrogateRuntime.exe File created C:\Program Files (x86)\Windows Mail\upfc.exe surrogateRuntime.exe File created C:\Program Files (x86)\Windows Mail\ea1d8f6d871115 surrogateRuntime.exe File created C:\Program Files (x86)\Windows Media Player\ja-JP\unsecapp.exe surrogateRuntime.exe File created C:\Program Files (x86)\Internet Explorer\it-IT\56085415360792 surrogateRuntime.exe File created C:\Program Files\WindowsApps\Mutable\StartMenuExperienceHost.exe surrogateRuntime.exe File created C:\Program Files (x86)\Windows Media Player\ja-JP\29c1c3cc0f7685 surrogateRuntime.exe File created C:\Program Files (x86)\Windows Mail\surrogateRuntime.exe surrogateRuntime.exe File created C:\Program Files (x86)\Windows Mail\ab877d4da5431a surrogateRuntime.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\PLA\Templates\RuntimeBroker.exe surrogateRuntime.exe File created C:\Windows\PLA\Templates\9e8d7a4ca61bd9 surrogateRuntime.exe File created C:\Windows\twain_32\MoUsoCoreWorker.exe surrogateRuntime.exe File created C:\Windows\twain_32\1f93f77a7f4778 surrogateRuntime.exe File created C:\Windows\schemas\EAPHost\winlogon.exe surrogateRuntime.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXECUTOR METEOR .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings EXECUTOR METEOR .exe Key created \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000_Classes\Local Settings surrogateRuntime.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2508 schtasks.exe 2452 schtasks.exe 4628 schtasks.exe 4364 schtasks.exe 2596 schtasks.exe 4808 schtasks.exe 1872 schtasks.exe 4904 schtasks.exe 2936 schtasks.exe 4352 schtasks.exe 3064 schtasks.exe 3648 schtasks.exe 3748 schtasks.exe 964 schtasks.exe 2372 schtasks.exe 2592 schtasks.exe 2128 schtasks.exe 2216 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1492 surrogateRuntime.exe 1492 surrogateRuntime.exe 1492 surrogateRuntime.exe 1492 surrogateRuntime.exe 1492 surrogateRuntime.exe 1492 surrogateRuntime.exe 2968 upfc.exe 2968 upfc.exe 2968 upfc.exe 2968 upfc.exe 2968 upfc.exe 2968 upfc.exe 2968 upfc.exe 2968 upfc.exe 2968 upfc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2968 upfc.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1492 surrogateRuntime.exe Token: SeDebugPrivilege 2968 upfc.exe Token: SeDebugPrivilege 4548 wininit.exe Token: SeDebugPrivilege 3480 unsecapp.exe Token: SeDebugPrivilege 2152 MoUsoCoreWorker.exe Token: SeDebugPrivilege 3652 upfc.exe Token: SeDebugPrivilege 4336 wininit.exe Token: SeDebugPrivilege 3532 unsecapp.exe Token: SeDebugPrivilege 4072 surrogateRuntime.exe Token: SeDebugPrivilege 636 RuntimeBroker.exe Token: SeDebugPrivilege 3244 wininit.exe Token: SeDebugPrivilege 3352 MoUsoCoreWorker.exe Token: SeDebugPrivilege 3844 upfc.exe Token: SeDebugPrivilege 4396 unsecapp.exe Token: SeDebugPrivilege 2948 wininit.exe Token: SeDebugPrivilege 472 surrogateRuntime.exe Token: SeDebugPrivilege 2276 MoUsoCoreWorker.exe Token: SeDebugPrivilege 828 unsecapp.exe Token: SeDebugPrivilege 2356 wininit.exe Token: SeDebugPrivilege 4392 upfc.exe Token: SeDebugPrivilege 1136 RuntimeBroker.exe Token: SeDebugPrivilege 116 unsecapp.exe Token: SeDebugPrivilege 980 wininit.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2136 2896 EXECUTOR METEOR .exe 80 PID 2896 wrote to memory of 2136 2896 EXECUTOR METEOR .exe 80 PID 2896 wrote to memory of 2136 2896 EXECUTOR METEOR .exe 80 PID 2136 wrote to memory of 4160 2136 WScript.exe 88 PID 2136 wrote to memory of 4160 2136 WScript.exe 88 PID 2136 wrote to memory of 4160 2136 WScript.exe 88 PID 4160 wrote to memory of 1492 4160 cmd.exe 90 PID 4160 wrote to memory of 1492 4160 cmd.exe 90 PID 1492 wrote to memory of 4068 1492 surrogateRuntime.exe 109 PID 1492 wrote to memory of 4068 1492 surrogateRuntime.exe 109 PID 4068 wrote to memory of 1520 4068 cmd.exe 111 PID 4068 wrote to memory of 1520 4068 cmd.exe 111 PID 4068 wrote to memory of 2968 4068 cmd.exe 112 PID 4068 wrote to memory of 2968 4068 cmd.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\EXECUTOR METEOR .exe"C:\Users\Admin\AppData\Local\Temp\EXECUTOR METEOR .exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\comReviewrefPerf\Elw8H.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\comReviewrefPerf\8WD994.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\comReviewrefPerf\surrogateRuntime.exe"C:\comReviewrefPerf\surrogateRuntime.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\J3XLPkuAvI.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1520
-
-
C:\Program Files (x86)\Windows Mail\upfc.exe"C:\Program Files (x86)\Windows Mail\upfc.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Internet Explorer\it-IT\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\it-IT\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Internet Explorer\it-IT\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Windows\PLA\Templates\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\PLA\Templates\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Windows\PLA\Templates\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4352
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Mail\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Mail\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorkerM" /sc MINUTE /mo 7 /tr "'C:\Windows\twain_32\MoUsoCoreWorker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorker" /sc ONLOGON /tr "'C:\Windows\twain_32\MoUsoCoreWorker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorkerM" /sc MINUTE /mo 8 /tr "'C:\Windows\twain_32\MoUsoCoreWorker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Media Player\ja-JP\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\ja-JP\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Media Player\ja-JP\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "surrogateRuntimes" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Mail\surrogateRuntime.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "surrogateRuntime" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\surrogateRuntime.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "surrogateRuntimes" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Mail\surrogateRuntime.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4364
-
C:\Program Files (x86)\Internet Explorer\it-IT\wininit.exe"C:\Program Files (x86)\Internet Explorer\it-IT\wininit.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
C:\Program Files (x86)\Windows Media Player\ja-JP\unsecapp.exe"C:\Program Files (x86)\Windows Media Player\ja-JP\unsecapp.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
C:\Windows\twain_32\MoUsoCoreWorker.exe"C:\Windows\twain_32\MoUsoCoreWorker.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
C:\Program Files (x86)\Windows Mail\upfc.exe"C:\Program Files (x86)\Windows Mail\upfc.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
C:\Program Files (x86)\Internet Explorer\it-IT\wininit.exe"C:\Program Files (x86)\Internet Explorer\it-IT\wininit.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
C:\Program Files (x86)\Windows Media Player\ja-JP\unsecapp.exe"C:\Program Files (x86)\Windows Media Player\ja-JP\unsecapp.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
C:\Program Files (x86)\Windows Mail\surrogateRuntime.exe"C:\Program Files (x86)\Windows Mail\surrogateRuntime.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
C:\Windows\PLA\Templates\RuntimeBroker.exe"C:\Windows\PLA\Templates\RuntimeBroker.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:636
-
C:\Program Files (x86)\Internet Explorer\it-IT\wininit.exe"C:\Program Files (x86)\Internet Explorer\it-IT\wininit.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
C:\Windows\twain_32\MoUsoCoreWorker.exe"C:\Windows\twain_32\MoUsoCoreWorker.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
C:\Program Files (x86)\Windows Mail\upfc.exe"C:\Program Files (x86)\Windows Mail\upfc.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3844
-
C:\Program Files (x86)\Windows Media Player\ja-JP\unsecapp.exe"C:\Program Files (x86)\Windows Media Player\ja-JP\unsecapp.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
C:\Program Files (x86)\Internet Explorer\it-IT\wininit.exe"C:\Program Files (x86)\Internet Explorer\it-IT\wininit.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
C:\Program Files (x86)\Windows Mail\surrogateRuntime.exe"C:\Program Files (x86)\Windows Mail\surrogateRuntime.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:472
-
C:\Windows\twain_32\MoUsoCoreWorker.exe"C:\Windows\twain_32\MoUsoCoreWorker.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
C:\Program Files (x86)\Windows Media Player\ja-JP\unsecapp.exe"C:\Program Files (x86)\Windows Media Player\ja-JP\unsecapp.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:828
-
C:\Program Files (x86)\Internet Explorer\it-IT\wininit.exe"C:\Program Files (x86)\Internet Explorer\it-IT\wininit.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
C:\Program Files (x86)\Windows Mail\upfc.exe"C:\Program Files (x86)\Windows Mail\upfc.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
C:\Windows\PLA\Templates\RuntimeBroker.exe"C:\Windows\PLA\Templates\RuntimeBroker.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
C:\Program Files (x86)\Windows Media Player\ja-JP\unsecapp.exe"C:\Program Files (x86)\Windows Media Player\ja-JP\unsecapp.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:116
-
C:\Program Files (x86)\Internet Explorer\it-IT\wininit.exe"C:\Program Files (x86)\Internet Explorer\it-IT\wininit.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fcbbff8eeb93ad014bf73143a67cbdce
SHA179cd0f544ba90184d14911c68dc2314f2225a020
SHA2564f3945ae2db9e60f191a1dc16b1e156710f81037869b5515e0c8ed0b31070d01
SHA512f5c8342c814d31d561642a0218011b86adcac40a068acdfe1870fd26c0b63927a4bcb53fedacb1bfd8f3ae6fde75ddd66ff5ed49dced4a39bfce575f51603ef5
-
Filesize
1KB
MD5b08c36ce99a5ed11891ef6fc6d8647e9
SHA1db95af417857221948eb1882e60f98ab2914bf1d
SHA256cc9248a177495f45ec70b86c34fc5746c56730af36ace98ac7eb365dbafda674
SHA51207e62581eace395b0a9699d727761648103180c21155d84ea09140f9e1c9690705c419118545aa67a564334bbde32710225fe3aa92b0b4b4210cb91f0058b1ea
-
Filesize
209B
MD524368e580e5415b8662e00bcc0f4cc0f
SHA19fcfcc8313ffbe4d431528d6c4c199b3f0e74bcb
SHA256f00d69c0991d2d547e6e9d87d2b400add2a7382574c3649a3d09e4c31c926e70
SHA512489f2efdb69b068119fcbf79dc40ee536a7f5aa7494c2195665ad92e4b4db131d9fd2bb7ff4d86c9188a2d181c54fc1286022f0fc9dcb1ecac6ccf45959d7cbe
-
Filesize
42B
MD5ff1d6e65d0b458accf2d7e9cf078f012
SHA14a7a0831b061ce2c72dfe5dbb8d3e06ef48fb9c4
SHA2562a3d5e93e6c1c94626f81d252cf9e831a94337a8fc871efa3560fbe966e35580
SHA5121888c69ad30ab13f71aee80de86aaebb04c1ee7b08bc4f8f5e41dc325399cdc1c3bb956d9401ea6c51b425305d2835fffcae60fc4b8644fab255c03f37431d15
-
Filesize
200B
MD5a44fada9f313e0d6008aef960aeae861
SHA19217e79ff49d67baca484f5a5e9418cca3fb9b2e
SHA2561e5c949fd2059fda331f7cd178a359f2ac4d4dd8cdae76543f21493b2ffb9d44
SHA512800052e7c0cd62433bde0084b94ac3b44ddece5adc144c8e02a2e7dc8629b683ac3a94c6218bf61a595731d2dc1adf596c5bf101fc2d9c3723c3a099d2c853f7
-
Filesize
828KB
MD5422e6efd4d4c62a97c78be894b85a535
SHA16de90977b41153d67fdca7a9119edf382d7e5414
SHA256fddbbd909aeb6e9466e3c926f7773f23f84d392604a2619caa3f5a4c9d63eb8c
SHA5121c545785df5e6be6b1142adb94cc6779020d409fddd429743eb69646b35a7acafadb2445218445bbc7e5c02171f1b531d9a7c623d834c18dd49161708529d388