Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 14:06
Behavioral task
behavioral1
Sample
spoolsv.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
spoolsv.exe
Resource
win10v2004-20241007-en
General
-
Target
spoolsv.exe
-
Size
135KB
-
MD5
fcfae4fdcc273f8a46c51d49fa8a4a03
-
SHA1
3a0e314b7bbdf5467df8b92a348c1b464fd502b0
-
SHA256
49ff687dbb13ed84815f3f57c660a0a4fc5cb21c82b605ce53338538a864586d
-
SHA512
50e6960d98dbc8d63975b0514deb6e9f7266a054e129902ac2ecf7c8500c84e5125d4896c9ec54a4187971832abfe2c575fd4c166baea39712b35f2f35e000f7
-
SSDEEP
3072:pG+KeZW7bSWaWDbkDOrZBRHQbPRyZ2pPYU:pU17buWDbkiBR8AZ2
Malware Config
Extracted
xworm
78.70.235.238:7000
f8terat.ddns.net:7000
-
Install_directory
%Temp%
-
install_file
spoolsv.exe
-
telegram
https://api.telegram.org/bot7742194912:AAGSH51C4BpkbbvEQlO-cv-lDoJZMVxqyN4/sendMessage?chat_id=5456205643
Extracted
redline
l3monlogs
78.70.235.238:1912
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/916-295-0x00000000023A0000-0x00000000023AE000-memory.dmp disable_win_def -
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/916-1-0x00000000003B0000-0x00000000003D8000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x000400000000073d-328.dat family_redline behavioral2/memory/1192-335-0x0000000000A80000-0x0000000000AD2000-memory.dmp family_redline -
Redline family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1512 powershell.exe 1516 powershell.exe 1496 powershell.exe 2640 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation spoolsv.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\spoolsv.lnk spoolsv.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\spoolsv.lnk spoolsv.exe -
Executes dropped EXE 1 IoCs
pid Process 1192 jrrjiw.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\spoolsv.exe" spoolsv.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\XBackground.bmp" spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrrjiw.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1900 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 1516 powershell.exe 1516 powershell.exe 1496 powershell.exe 1496 powershell.exe 2640 powershell.exe 2640 powershell.exe 1512 powershell.exe 1512 powershell.exe 916 spoolsv.exe 1512 msedge.exe 1512 msedge.exe 4424 msedge.exe 4424 msedge.exe 2792 identity_helper.exe 2792 identity_helper.exe 916 spoolsv.exe 916 spoolsv.exe 1192 jrrjiw.exe 1192 jrrjiw.exe 1192 jrrjiw.exe 1192 jrrjiw.exe 1192 jrrjiw.exe 1192 jrrjiw.exe 1192 jrrjiw.exe 1192 jrrjiw.exe 1192 jrrjiw.exe 1192 jrrjiw.exe 1192 jrrjiw.exe 1192 jrrjiw.exe 1192 jrrjiw.exe 1192 jrrjiw.exe 1192 jrrjiw.exe 1192 jrrjiw.exe 1192 jrrjiw.exe 1192 jrrjiw.exe 1192 jrrjiw.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 916 spoolsv.exe Token: SeDebugPrivilege 1516 powershell.exe Token: SeDebugPrivilege 1496 powershell.exe Token: SeDebugPrivilege 2640 powershell.exe Token: SeDebugPrivilege 1512 powershell.exe Token: SeDebugPrivilege 916 spoolsv.exe Token: SeDebugPrivilege 2032 spoolsv.exe Token: SeDebugPrivilege 1440 spoolsv.exe Token: SeDebugPrivilege 1192 jrrjiw.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 916 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 916 wrote to memory of 1516 916 spoolsv.exe 83 PID 916 wrote to memory of 1516 916 spoolsv.exe 83 PID 916 wrote to memory of 1496 916 spoolsv.exe 85 PID 916 wrote to memory of 1496 916 spoolsv.exe 85 PID 916 wrote to memory of 2640 916 spoolsv.exe 87 PID 916 wrote to memory of 2640 916 spoolsv.exe 87 PID 916 wrote to memory of 1512 916 spoolsv.exe 89 PID 916 wrote to memory of 1512 916 spoolsv.exe 89 PID 916 wrote to memory of 1900 916 spoolsv.exe 91 PID 916 wrote to memory of 1900 916 spoolsv.exe 91 PID 916 wrote to memory of 4424 916 spoolsv.exe 101 PID 916 wrote to memory of 4424 916 spoolsv.exe 101 PID 4424 wrote to memory of 1548 4424 msedge.exe 102 PID 4424 wrote to memory of 1548 4424 msedge.exe 102 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1516 4424 msedge.exe 103 PID 4424 wrote to memory of 1512 4424 msedge.exe 104 PID 4424 wrote to memory of 1512 4424 msedge.exe 104 PID 4424 wrote to memory of 2184 4424 msedge.exe 105 PID 4424 wrote to memory of 2184 4424 msedge.exe 105 PID 4424 wrote to memory of 2184 4424 msedge.exe 105 PID 4424 wrote to memory of 2184 4424 msedge.exe 105 PID 4424 wrote to memory of 2184 4424 msedge.exe 105 PID 4424 wrote to memory of 2184 4424 msedge.exe 105 PID 4424 wrote to memory of 2184 4424 msedge.exe 105 PID 4424 wrote to memory of 2184 4424 msedge.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\spoolsv.exe"C:\Users\Admin\AppData\Local\Temp\spoolsv.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\spoolsv.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'spoolsv.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\spoolsv.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'spoolsv.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "spoolsv" /tr "C:\Users\Admin\AppData\Local\Temp\spoolsv.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\How To Decrypt My Files.html2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff374a46f8,0x7fff374a4708,0x7fff374a47183⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,8666919775905449649,7667465553708692983,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:23⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,8666919775905449649,7667465553708692983,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,8666919775905449649,7667465553708692983,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:83⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8666919775905449649,7667465553708692983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:13⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8666919775905449649,7667465553708692983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:13⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,8666919775905449649,7667465553708692983,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:83⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,8666919775905449649,7667465553708692983,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8666919775905449649,7667465553708692983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:13⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8666919775905449649,7667465553708692983,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:13⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8666919775905449649,7667465553708692983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:13⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8666919775905449649,7667465553708692983,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:13⤵PID:944
-
-
-
C:\Users\Admin\AppData\Local\Temp\jrrjiw.exe"C:\Users\Admin\AppData\Local\Temp\jrrjiw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\spoolsv.exeC:\Users\Admin\AppData\Local\Temp\spoolsv.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
C:\Users\Admin\AppData\Local\Temp\spoolsv.exeC:\Users\Admin\AppData\Local\Temp\spoolsv.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1440
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a43e653ffb5ab07940f4bdd9cc8fade4
SHA1af43d04e3427f111b22dc891c5c7ee8a10ac4123
SHA256c4c53abb13e99475aebfbe9fec7a8fead81c14c80d9dcc2b81375304f3a683fe
SHA51262a97e95e1f19a8d4302847110dae44f469877eed6aa8ea22345c6eb25ee220e7d310fa0b7ec5df42356815421c0af7c46a0f1fee8933cc446641800eda6cd1b
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
5KB
MD5f123d62b443d0f3e2a3c654889bc8218
SHA1d3f6f77967cc367ee05500d0e05a25596b5ed330
SHA2560a0f54657e40beea16c6c6863e79a81ada6a549302af2e6aeb2566c4d3fd26b8
SHA512b64621aaca4f7eeddf51a6064ad420ef01ea3118f4e0c77bb451be7c9d8b776ebfb4816b5a8ef3ebad85b261de6b5a40d2b5a8450fdb1c08808ebc520ce33000
-
Filesize
6KB
MD5362e090a900d9b385a205b23537aa09f
SHA177cfc30db9ab32689ae9cbc4f1a8b42961acffa1
SHA256cd8d665d11e76f2cce5765fa1dde497d3100e2643a4a20c66ef922acabdb9b6d
SHA51273aa976bdcf81d3ed11911c4506ba46394ef06bf019f814577801cf91b7348abe731a84c5c7c19bacce87e50610a3192eba1a2cc9b8c9382a7225b72dd790627
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51b66a43d24bf5d95c9b5019dfffcc42d
SHA152c244868331eaad74a780840d811d3721241e32
SHA256560d3eec4be38c5d16398929e33df1bfbd1447640a86d34d04645024722e3daa
SHA512d4ce82c88ea62d08659bc0e9910dcddd4bab81467d8442bd9123c071c65016524722f4ec8af950d17a9e4cc63ef21d3ce6ca7693a574e8c5b048ee3898a91355
-
Filesize
10KB
MD5f5c9b94c69055d4e4075c272295a7998
SHA1266323a2606a8dca597f2db5ac79ccf9f83f891f
SHA256b46e34809d0ae9f85efdebe5fb395c1d63b9c9ad40981175f2611853ed0b922c
SHA512f260b35de4fa8386ab3211c9848e644ef9c3c363a05ed5d39899a845fc34fd73ecc47e5235c1bc42aa524954b883e8c67b0a8b4dc79c16e095d4b96995c69e90
-
Filesize
944B
MD520facdc59d6af53a06c681d7b5a6ea61
SHA15c9504eee397780dfba2937818b713a2636d2581
SHA25648af54c77587784dfe95b9d61043e90b14f4f9f11d4d4cfd5f73df647cf58a03
SHA512b292fc1e8d041bb6c9299a0dc0136ae78b9a931f7dbfb2739b7a717ee347cdee20f9f54c3d108f64ad4d4272698862015ba4f26d63e00b60848d61f74f034ff4
-
Filesize
944B
MD5993af531f0b57e8128ec273731c3a8e2
SHA1a42ea55876f4f390837dd2c95fb7ff2344b6e9e1
SHA256fff934d70d813381536d272c5b8ac6ad70acd054267b13592da767c9bd1dda62
SHA512bdf5970ff2ee314dc297fce5c0f44765e77acbf269cd9ad9e7448a391d5f80d66a0c5426f99bc3480851e8763413aa180b3b3b6b22ef0e86a365450cb8c334e4
-
Filesize
944B
MD534f595487e6bfd1d11c7de88ee50356a
SHA14caad088c15766cc0fa1f42009260e9a02f953bb
SHA2560f9a4b52e01cb051052228a55d0515911b7ef5a8db3cf925528c746df511424d
SHA51210976c5deaf9fac449e703e852c3b08d099f430de2d7c7b8e2525c35d63e28b890e5aab63feff9b20bca0aaf9f35a3ba411aee3fbeee9ea59f90ed25bd617a0b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
300KB
MD5dfefdd2e554fd23f3b87f68c3e0f9622
SHA18be107d3c7e0aba6346ccdac289e29e3a8127af2
SHA256f47c2bb84ce619d0d69445b0a1dce760482f2dd508815ba2667bab5c3a3541e9
SHA5128f11525da059c6aa655d5ad2c41f89ce535ebb7a2bd4d7ce197c2ea244f28947e2338b1f97378130179490e49fd73402ee3dcdc507901f48b41ce9acf79ca182
-
Filesize
639B
MD5d2dbbc3383add4cbd9ba8e1e35872552
SHA1020abbc821b2fe22c4b2a89d413d382e48770b6f
SHA2565ca82cbc4d582a4a425ae328ad12fd198095e2854f4f87b27a4b09e91173a3be
SHA512bb5e1bbf28c10c077644136b98d8d02bfec3b3e49c0829b4d4570b30e0aea0276eb748f749a491587a5e70141a7653be1d03c463a22e44efecde2e5a6c6e5e66
-
Filesize
15KB
MD5ae4276a2250ad577227b0e67d7a65d1c
SHA19bebed79dc768e2450bf0bc7b8088cb18aa3a2b8
SHA25630ffd1205a43b08278f895cd5fdc6aed1a2202b67505063c933a6332218bce67
SHA512b34ece299dcf269df181d228dce36fc096f4a9b3bfc0a0d919a6095f6cae358c6f55361e9cf0846737a9c5d39a5ef6cb8aa0c2dae7a5c4e0de8513714de2ff6d
-
Filesize
173KB
MD5014027b9db0e85b3dbb70d9c76b898bd
SHA15ec4596e71d49af533aa1f9bd2f0d1c53ec2ceb7
SHA2569337965b131d7b9614fc4e4651e97617f36aa96968a0a090d3f357b57f1301fd
SHA512ffea680e5a6a6d7b509e7896bbf0944d8aa0510f12bf67bd7b9104782f1085a398687505428c4dd963eb91c92bbd8d182bb13c85198448d9f98c58f504508f1a
-
Filesize
14KB
MD54135e27afc6b2459c09ddf6d87564823
SHA1700958592302938a93a4b118fc6692c51df8376e
SHA256607cb7c3cec7284a04b8805a7976b02f05231d348ccbd6fea04ad1eb2627657e
SHA512417862154e815f754bc08821a2009b7519e3ee31024adc76bce72fdc3b48549581ba62fb4ba647c429caacb5706a1c08af8685b1ab126fc297be2a91144ad70d
-
Filesize
395KB
MD5e97ee2e6496cc98ad3a44e9f15329f23
SHA14dc5e17c1b5b0fb4d5431981507bfe13d06143b1
SHA25633eaa92a02d2d54175dfe041f1507b8f8831b369e08697c62e7330829f57d3be
SHA5127da3ae5e069f084cf0b83f319b08e618dd0807d38e54c2eac04cdb21cecf3bec42b43c6d7392bce24a4d1f21ab559c796eed122f35251d0efab1fe203619b25e
-
Filesize
284KB
MD505a8ecc6d2dd0166b206ba293d4257c1
SHA183b0e6e90eb40498b53e0dfbe09441962f29319a
SHA256797b3652292211e7c53b9437b9a54ad2c75fa53c36441320d3275828473f65fb
SHA51277d9b35fb9b5868950a5a3b56648e592939f0d978560aacacaed45489e3ce87fc1d1659205decc6de565dad8271b74824b324b45befae5a741cedcd0bc79daae
-
Filesize
18KB
MD5352f88d279201527161f30a0f705e577
SHA1bab57b93a859531c1864853deb3f8b4ee4a46ff1
SHA256740729ce9f8a08a2d1d26c87e5a3ca620a8fab88ed68bc74b09c8dde2a3567e3
SHA5121e6718078a8196254784d70288b6157b243548e5c1815cf7540eadbbbef90f9cb07f952b7da8b27b4b45c13f8826c3617a8f63af35569d78dda9873c7f9d7179
-
C:\Users\Admin\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000001.regtrans-ms.ENC
Filesize16B
MD5de3020618d72a952b930f10bd4dc3905
SHA10dbf5d2e4db5a420358586cc7ec31ef18ad579c7
SHA256551e03fdf31664b4ff20712e828c717422fa1372855d9baa61fd615f6a52f993
SHA51207486557ef8b6706ddbc4bf817d529a833d742e32e3ef9d01ad7d809ff4012872c4fa3f42eb90e80267643ce09df21b8e74ef12bea95a2deb5c79b70c69608be