Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2024, 00:31
Static task
static1
Errors
General
-
Target
123.txt
-
Size
178B
-
MD5
f59cb95df607d6cc5547a698e079ddd3
-
SHA1
5c327be38230b1bdece8264001c88c257a1d8087
-
SHA256
c1ad7b461fde9e52ca6f2d2263f3f829940ced1538ffd7758e790faa129b3635
-
SHA512
7284c78d69cd6f47a2451defadd4b7bffb17d75dbed1a43df0e780f9d740992751190548831806c830fa5c5ac88e39fbef3c404354a822ef46528e9a95f1c3e5
Malware Config
Extracted
asyncrat
0.5.8
nigger
147.185.221.24:13562
w6Aqn6QGMtjM
-
delay
3
-
install
true
-
install_file
msvisualstudio.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000023cf6-100.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation msvisualstudio.exe -
Executes dropped EXE 1 IoCs
pid Process 2912 msvisualstudio.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msvisualstudio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5032 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "232" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings msedge.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 4876 NOTEPAD.EXE 4308 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1104 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4856 msedge.exe 4856 msedge.exe 2000 identity_helper.exe 2000 identity_helper.exe 2348 msedge.exe 2348 msedge.exe 700 vs.exe 700 vs.exe 700 vs.exe 700 vs.exe 700 vs.exe 700 vs.exe 700 vs.exe 700 vs.exe 700 vs.exe 700 vs.exe 700 vs.exe 700 vs.exe 700 vs.exe 700 vs.exe 700 vs.exe 700 vs.exe 700 vs.exe 700 vs.exe 700 vs.exe 700 vs.exe 700 vs.exe 700 vs.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 700 vs.exe Token: SeDebugPrivilege 2912 msvisualstudio.exe Token: SeShutdownPrivilege 3624 shutdown.exe Token: SeRemoteShutdownPrivilege 3624 shutdown.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4876 NOTEPAD.EXE -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5052 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4856 wrote to memory of 3152 4856 msedge.exe 88 PID 4856 wrote to memory of 3152 4856 msedge.exe 88 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4592 4856 msedge.exe 89 PID 4856 wrote to memory of 4612 4856 msedge.exe 90 PID 4856 wrote to memory of 4612 4856 msedge.exe 90 PID 4856 wrote to memory of 3436 4856 msedge.exe 91 PID 4856 wrote to memory of 3436 4856 msedge.exe 91 PID 4856 wrote to memory of 3436 4856 msedge.exe 91 PID 4856 wrote to memory of 3436 4856 msedge.exe 91 PID 4856 wrote to memory of 3436 4856 msedge.exe 91 PID 4856 wrote to memory of 3436 4856 msedge.exe 91 PID 4856 wrote to memory of 3436 4856 msedge.exe 91 PID 4856 wrote to memory of 3436 4856 msedge.exe 91 PID 4856 wrote to memory of 3436 4856 msedge.exe 91 PID 4856 wrote to memory of 3436 4856 msedge.exe 91 PID 4856 wrote to memory of 3436 4856 msedge.exe 91 PID 4856 wrote to memory of 3436 4856 msedge.exe 91 PID 4856 wrote to memory of 3436 4856 msedge.exe 91 PID 4856 wrote to memory of 3436 4856 msedge.exe 91 PID 4856 wrote to memory of 3436 4856 msedge.exe 91 PID 4856 wrote to memory of 3436 4856 msedge.exe 91 PID 4856 wrote to memory of 3436 4856 msedge.exe 91 PID 4856 wrote to memory of 3436 4856 msedge.exe 91 PID 4856 wrote to memory of 3436 4856 msedge.exe 91 PID 4856 wrote to memory of 3436 4856 msedge.exe 91
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\123.txt1⤵
- Opens file in notepad (likely ransom note)
PID:4308
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa110f46f8,0x7ffa110f4708,0x7ffa110f47182⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,11390649629533735521,322368657945026896,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,11390649629533735521,322368657945026896,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,11390649629533735521,322368657945026896,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11390649629533735521,322368657945026896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11390649629533735521,322368657945026896,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11390649629533735521,322368657945026896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,11390649629533735521,322368657945026896,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:82⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,11390649629533735521,322368657945026896,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11390649629533735521,322368657945026896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2144,11390649629533735521,322368657945026896,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11390649629533735521,322368657945026896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2144,11390649629533735521,322368657945026896,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11390649629533735521,322368657945026896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11390649629533735521,322368657945026896,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:4456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4560
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2056
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\d.txt1⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:4876
-
C:\Users\Admin\Desktop\vs.exe"C:\Users\Admin\Desktop\vs.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:700 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "msvisualstudio" /tr '"C:\Users\Admin\AppData\Roaming\msvisualstudio.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
PID:3988 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "msvisualstudio" /tr '"C:\Users\Admin\AppData\Roaming\msvisualstudio.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6C80.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5032
-
-
C:\Users\Admin\AppData\Roaming\msvisualstudio.exe"C:\Users\Admin\AppData\Roaming\msvisualstudio.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2912 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c Shutdown /s /f /t 004⤵
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Windows\SysWOW64\shutdown.exeShutdown /s /f /t 005⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
-
-
-
-
C:\Users\Admin\Desktop\vs.exe"C:\Users\Admin\Desktop\vs.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3624
-
C:\Users\Admin\Desktop\vs.exe"C:\Users\Admin\Desktop\vs.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1864
-
C:\Users\Admin\Desktop\vs.exe"C:\Users\Admin\Desktop\vs.exe"1⤵
- System Location Discovery: System Language Discovery
PID:380
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa38f9855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
522B
MD5acc9090417037dfa2a55b46ed86e32b8
SHA153fa6fb25fb3e88c24d2027aca6ae492b2800a4d
SHA2562412679218bb0a7d05ceee32869bbb223619bde9966c4c460a68304a3367724b
SHA512d51f7085ec147c708f446b9fb6923cd2fb64596d354ed929e125b30ace57c8cb3217589447a36960e5d3aea87a4e48aaa82c7509eced6d6c2cecd71fcfe3697b
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
256B
MD53e4bde6a5aca6b0392df55a37873a693
SHA1d1c08046bbdc846f9b59d35c1d1ce7249a99c0a7
SHA256de5eda5cc54db1b36e864ae9d7a49089d813a135abf27ac41d3ee9997b604386
SHA512303b50c9131db42635cbef9b49bc4deabfa9713d3513fae9047c21ee34c3dea3c7795f2e2e1f7eb4ca0e11f1f759787441245c8e618ef5ce2e0ce9dc3cf48d42
-
Filesize
5KB
MD5bab4c6ea7c1ceff7580885e62baee42a
SHA14542e9a85f9440be141483afaae2a7621851a6e0
SHA256a62098dbf101178d9f274500850c91fd52fe429e172eb62d4162c29377258c8c
SHA5124d82ee40b42012f9f091ffcc619f9ed35673b88a52ea058695b99bf81d253b809470939f63c96b7e8ff775bce59f35cf089e71898d43aa2e62de26df321d2503
-
Filesize
6KB
MD50afba01bcc3326f0204d47368f1760f0
SHA111f1330ccf881a96b95aa8ec4c022d94588a2962
SHA2562b3b5957abeb200a2cbcca2069324f048b215f7475da7900cfbcb1ae3b60ef46
SHA51227dae385fc429cc0ef1b97496d1ac2ea5176705d2e90f87eae8d5af183b2f2b45e061587d15501a27e01515034e72c8a8a58c3209b9eba9b129e4c49eed236f9
-
Filesize
6KB
MD58a7edb36e5326084cf782f8fcc73516c
SHA105cb21ef0a971d999d7b218e93eedb6a03b2e267
SHA256c9a359f4e262a2551342040e581fa0186764760bf090c3e5389312d9a0780e43
SHA51299e0de91b1238fd92f836daa4355e9bd9e5ea7623053122df76cf22848580a1a47fdf85ca0c861d3067ca7fe026b3803ba7ff486a69e03369b9dd9b625dd27b8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50e545187fffc65dfba82c8eb5dcc5b98
SHA1f6c23c31d0aa1b0b0cd1966eddffc707fa5d460f
SHA25660bfbf2496e6919833fb31324961fb70539062b00813799ac722eac1715fb308
SHA512ff5252be61ae656cc7101a010f23a3f84276a5027622a4c1ccf5c18ee8c048f49b45d79aed58776010d566571b9364a18f7935cec4a1abadbf99c7c5b29a7626
-
Filesize
10KB
MD59fb8c09662350dd09292f3f708193e55
SHA1694cebe5700b2ef4249d7c4333d612f8372dd867
SHA25606791d4ffacf864be908dbae5b79a83dedd2eaa838de085ee77f68e431b8c365
SHA512a85b973a41003e287c6111b3fdfc47e0259e6d31d8bc36417ecf9fc55b8f4133faa54f85e407f3aa02508a31c66d46fa36f506aa63ed93cee0ff203eb7825144
-
Filesize
158B
MD51f11044d6720ecb5a92b52ccf646b60e
SHA12ad65ec90ce471540e5768d39f6d045907632bbb
SHA2561344600ca7ae7f5924615fc7424c96b9ec68fe4c47359426982b7fd0e75b94c7
SHA5125c24c4742696f54242502c45f766c61f0665a69dd0d5869849352f288c9685ae698ea6e4a2ca3b3912fb9ebc7f5ce1bebf6720cf23128cf53e1b800e87df2d87
-
Filesize
45KB
MD58b54c6c8bb9b9c81dcdf7d2f2aa8b8e9
SHA1d04a143fba6d90174a7d198844eb713c67c41715
SHA25614284b23ceff3e81fe721b8560d215519dd4232febd1267b3bb0617384f8d22b
SHA512877e18078c8fe03a5ed84a879cf4feaf0d71e0aab7446f14a7b0e4c70272ee08ef6ff4eb8c3607c465eee1da0f21375f15e8a33761b7cd86315a06fa80ea1ca7
-
Filesize
21KB
MD5ed6cbadf9b5f6ac7ab1a113af7934e5b
SHA13cbed16c54f77952ab69497fa1dbe477313d186b
SHA2565a78eb7d4063def1de1b25d2c73baea2fdb71fcb3d1c15b286516dab26959b20
SHA5128e932a5bdeb3a17c7e2136d26905e7da15a2b92424613747fde418db74551e55b3ba7bea9ef2497cff10d2ff60afab53c33e90747cb08b70e34defa5fda157c1