Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 20:31
Static task
static1
Behavioral task
behavioral1
Sample
1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe
Resource
win10v2004-20241007-en
General
-
Target
1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe
-
Size
1.1MB
-
MD5
be53f22f667f5cad38dfdc078260b795
-
SHA1
2c71d39f61d00a0c2e73c6221c6a5e9ec8fdbd01
-
SHA256
1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca
-
SHA512
3b5664e3983833608c316576270787b9ba7ebf6cc6f5640719e7b6a9ba4aafd4f9352a89ddd473dbf4a0cb467fe2e57676dfb784dcf7c10fab02ac35f38acc94
-
SSDEEP
24576:OeXB1m0LifI3DB8nv4Ieje3ZMLyHZIA4Nm5EDCIc78cO4:Oo1m0L+RwHjkUfAum5EDCTgc
Malware Config
Extracted
remcos
RemoteHost
172.93.189.76:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-4EQLNI
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/1156-101-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/2008-96-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral1/memory/1652-103-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/1652-103-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/2008-96-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2564 powershell.exe 3064 powershell.exe 1300 powershell.exe 2700 powershell.exe -
Executes dropped EXE 6 IoCs
pid Process 2524 remcos.exe 564 remcos.exe 1944 remcos.exe 2008 remcos.exe 1652 remcos.exe 1156 remcos.exe -
Loads dropped DLL 2 IoCs
pid Process 2392 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 2392 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts remcos.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-4EQLNI = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-4EQLNI = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-4EQLNI = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-4EQLNI = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2172 set thread context of 2392 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 36 PID 2524 set thread context of 564 2524 remcos.exe 47 PID 564 set thread context of 2008 564 remcos.exe 53 PID 564 set thread context of 1652 564 remcos.exe 54 PID 564 set thread context of 1156 564 remcos.exe 55 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 2152 reg.exe 2928 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2720 schtasks.exe 2304 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2564 powershell.exe 2700 powershell.exe 3064 powershell.exe 1300 powershell.exe 2008 remcos.exe 2008 remcos.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 564 remcos.exe 564 remcos.exe 564 remcos.exe 564 remcos.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2564 powershell.exe Token: SeDebugPrivilege 2700 powershell.exe Token: SeDebugPrivilege 3064 powershell.exe Token: SeDebugPrivilege 1300 powershell.exe Token: SeDebugPrivilege 1156 remcos.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 564 remcos.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2700 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 30 PID 2172 wrote to memory of 2700 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 30 PID 2172 wrote to memory of 2700 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 30 PID 2172 wrote to memory of 2700 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 30 PID 2172 wrote to memory of 2564 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 32 PID 2172 wrote to memory of 2564 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 32 PID 2172 wrote to memory of 2564 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 32 PID 2172 wrote to memory of 2564 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 32 PID 2172 wrote to memory of 2720 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 34 PID 2172 wrote to memory of 2720 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 34 PID 2172 wrote to memory of 2720 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 34 PID 2172 wrote to memory of 2720 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 34 PID 2172 wrote to memory of 2392 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 36 PID 2172 wrote to memory of 2392 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 36 PID 2172 wrote to memory of 2392 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 36 PID 2172 wrote to memory of 2392 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 36 PID 2172 wrote to memory of 2392 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 36 PID 2172 wrote to memory of 2392 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 36 PID 2172 wrote to memory of 2392 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 36 PID 2172 wrote to memory of 2392 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 36 PID 2172 wrote to memory of 2392 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 36 PID 2172 wrote to memory of 2392 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 36 PID 2172 wrote to memory of 2392 2172 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 36 PID 2392 wrote to memory of 2020 2392 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 37 PID 2392 wrote to memory of 2020 2392 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 37 PID 2392 wrote to memory of 2020 2392 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 37 PID 2392 wrote to memory of 2020 2392 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 37 PID 2020 wrote to memory of 2928 2020 cmd.exe 39 PID 2020 wrote to memory of 2928 2020 cmd.exe 39 PID 2020 wrote to memory of 2928 2020 cmd.exe 39 PID 2020 wrote to memory of 2928 2020 cmd.exe 39 PID 2392 wrote to memory of 2524 2392 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 40 PID 2392 wrote to memory of 2524 2392 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 40 PID 2392 wrote to memory of 2524 2392 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 40 PID 2392 wrote to memory of 2524 2392 1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe 40 PID 2524 wrote to memory of 3064 2524 remcos.exe 41 PID 2524 wrote to memory of 3064 2524 remcos.exe 41 PID 2524 wrote to memory of 3064 2524 remcos.exe 41 PID 2524 wrote to memory of 3064 2524 remcos.exe 41 PID 2524 wrote to memory of 1300 2524 remcos.exe 43 PID 2524 wrote to memory of 1300 2524 remcos.exe 43 PID 2524 wrote to memory of 1300 2524 remcos.exe 43 PID 2524 wrote to memory of 1300 2524 remcos.exe 43 PID 2524 wrote to memory of 2304 2524 remcos.exe 45 PID 2524 wrote to memory of 2304 2524 remcos.exe 45 PID 2524 wrote to memory of 2304 2524 remcos.exe 45 PID 2524 wrote to memory of 2304 2524 remcos.exe 45 PID 2524 wrote to memory of 564 2524 remcos.exe 47 PID 2524 wrote to memory of 564 2524 remcos.exe 47 PID 2524 wrote to memory of 564 2524 remcos.exe 47 PID 2524 wrote to memory of 564 2524 remcos.exe 47 PID 2524 wrote to memory of 564 2524 remcos.exe 47 PID 2524 wrote to memory of 564 2524 remcos.exe 47 PID 2524 wrote to memory of 564 2524 remcos.exe 47 PID 2524 wrote to memory of 564 2524 remcos.exe 47 PID 2524 wrote to memory of 564 2524 remcos.exe 47 PID 2524 wrote to memory of 564 2524 remcos.exe 47 PID 2524 wrote to memory of 564 2524 remcos.exe 47 PID 564 wrote to memory of 2200 564 remcos.exe 48 PID 564 wrote to memory of 2200 564 remcos.exe 48 PID 564 wrote to memory of 2200 564 remcos.exe 48 PID 564 wrote to memory of 2200 564 remcos.exe 48 PID 2200 wrote to memory of 2152 2200 cmd.exe 50 PID 2200 wrote to memory of 2152 2200 cmd.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe"C:\Users\Admin\AppData\Local\Temp\1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\agxxwOQO.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\agxxwOQO" /XML "C:\Users\Admin\AppData\Local\Temp\tmp953D.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe"C:\Users\Admin\AppData\Local\Temp\1afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2928
-
-
-
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Remcos\remcos.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\agxxwOQO.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\agxxwOQO" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD327.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2304
-
-
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2152
-
-
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe /stext "C:\Users\Admin\AppData\Local\Temp\yuiwbof"5⤵
- Executes dropped EXE
PID:1944
-
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe /stext "C:\Users\Admin\AppData\Local\Temp\yuiwbof"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe /stext "C:\Users\Admin\AppData\Local\Temp\iovobgqwtmn"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:1652
-
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe /stext "C:\Users\Admin\AppData\Local\Temp\trazcybxhufoal"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5be53f22f667f5cad38dfdc078260b795
SHA12c71d39f61d00a0c2e73c6221c6a5e9ec8fdbd01
SHA2561afaba7255b072d5b5459d784a332cefe16f39b880ae5544f546cb95f1220dca
SHA5123b5664e3983833608c316576270787b9ba7ebf6cc6f5640719e7b6a9ba4aafd4f9352a89ddd473dbf4a0cb467fe2e57676dfb784dcf7c10fab02ac35f38acc94
-
Filesize
1KB
MD5faa296619750d7c39354ce41ef6a7093
SHA199f55a91c034b9eed1829376f75d8dd768121c96
SHA2565923d5e6c1ba202359f40c1e2bc2e0ffd754ef2f65d7ce60d826da3e97b70f3b
SHA512f1a99248d422a4be8f51d01ed87306fa35599e8edf8e79b4a5f116f766b41ab368b41bfc7d828ef548e0575eb3269f8f49c9e855ecb2e81ffd90b5f1465349bf
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\M6QN3EJRXRM0XKWAVZC0.temp
Filesize7KB
MD5fa964a166bd599e0b44b8f6cc6671ac0
SHA148feb36e28516ae45efd098828fc07701dc9503f
SHA256c590743521cbc4d8e4fc5b122703afccf585a6d35acc87da303e0d89849342a8
SHA5128c7c1444c9b00c4c3334cc372c5a4a52ac8bf9b291e8ed92d07882b52195d6b4d57e56d92dd58fdc92d222f3c283e8d66b7560bc527496b52c56c522ab525241
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\R8T3XC1QJQA102NDCIBQ.temp
Filesize7KB
MD5d014a88a57a8be2556a69b4d43d84f36
SHA16835cd58c123938b79c9461063fe55f7bee4253c
SHA2569f36d8a790e8aacf163c480d5f0b51a5f4f53360e8583c4231135dd2ace6972a
SHA512c3064912d50a6edd2dd41992e1f82ad1ac854355169ad814836ae48d2b8e21b46121f2d14af3a746172a9684d29b1412672b17ed0fe45ddb97e7003b86b12471