Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 14:42
Behavioral task
behavioral1
Sample
26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf.exe
Resource
win7-20240903-en
General
-
Target
26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf.exe
-
Size
286KB
-
MD5
b988c49b9654ec30906a781cac1ebaaf
-
SHA1
85f7f7274e6a134870f309c2b3d06b71807e7626
-
SHA256
26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf
-
SHA512
c4454fe6dff339982370a842133db79dba3fb641688d43a47ce4bdfb158a15eff3cad37c34ec4d881ca01e408af43e00f6f36c254f1bc7d93321b9d5f9028ad5
-
SSDEEP
6144:EhVZx2zU1Ypil1TQxqhzu4nkhdVwbjJ1ybkCrrpo:+xT1tY4Idc1ybkCho
Malware Config
Extracted
quasar
1.4.0.0
FakeCreal
espinyskibidi-40205.portmap.host:40205
CdrjrrWbtRopP1ic7E
-
encryption_key
HXEHSwyN1GHqlZUqunrd
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Client
-
subdirectory
Microsoft
Signatures
-
description flow ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf.exe 14 ip-api.com Process not Found 52 ip-api.com Process not Found 68 ip-api.com Process not Found -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/4952-1-0x0000000000A60000-0x0000000000AAE000-memory.dmp family_quasar behavioral2/files/0x0008000000023c6f-10.dat family_quasar -
Checks computer location settings 2 TTPs 14 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 14 IoCs
pid Process 980 Client.exe 4680 Client.exe 4460 Client.exe 4560 Client.exe 3604 Client.exe 976 Client.exe 5072 Client.exe 1944 Client.exe 3400 Client.exe 3308 Client.exe 4836 Client.exe 2176 Client.exe 216 Client.exe 4008 Client.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 68 ip-api.com 14 ip-api.com 52 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 14 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4520 PING.EXE 3532 PING.EXE 2388 PING.EXE 2212 PING.EXE 3484 PING.EXE 1336 PING.EXE 964 PING.EXE 4880 PING.EXE 2284 PING.EXE 4188 PING.EXE 4068 PING.EXE 4400 PING.EXE 2772 PING.EXE 2388 PING.EXE -
Runs ping.exe 1 TTPs 14 IoCs
pid Process 4068 PING.EXE 4400 PING.EXE 2212 PING.EXE 2772 PING.EXE 2284 PING.EXE 4188 PING.EXE 964 PING.EXE 3532 PING.EXE 2388 PING.EXE 3484 PING.EXE 1336 PING.EXE 2388 PING.EXE 4880 PING.EXE 4520 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2468 schtasks.exe 4680 schtasks.exe 3848 schtasks.exe 3008 schtasks.exe 4104 schtasks.exe 1464 schtasks.exe 4020 schtasks.exe 1948 schtasks.exe 3440 schtasks.exe 3020 schtasks.exe 448 schtasks.exe 4280 schtasks.exe 2056 schtasks.exe 3900 schtasks.exe 2276 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 4952 26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf.exe Token: SeDebugPrivilege 980 Client.exe Token: SeDebugPrivilege 4680 Client.exe Token: SeDebugPrivilege 4460 Client.exe Token: SeDebugPrivilege 4560 Client.exe Token: SeDebugPrivilege 3604 Client.exe Token: SeDebugPrivilege 976 Client.exe Token: SeDebugPrivilege 5072 Client.exe Token: SeDebugPrivilege 1944 Client.exe Token: SeDebugPrivilege 3400 Client.exe Token: SeDebugPrivilege 3308 Client.exe Token: SeDebugPrivilege 4836 Client.exe Token: SeDebugPrivilege 2176 Client.exe Token: SeDebugPrivilege 216 Client.exe Token: SeDebugPrivilege 4008 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4952 wrote to memory of 1464 4952 26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf.exe 84 PID 4952 wrote to memory of 1464 4952 26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf.exe 84 PID 4952 wrote to memory of 1464 4952 26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf.exe 84 PID 4952 wrote to memory of 980 4952 26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf.exe 86 PID 4952 wrote to memory of 980 4952 26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf.exe 86 PID 4952 wrote to memory of 980 4952 26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf.exe 86 PID 980 wrote to memory of 3440 980 Client.exe 88 PID 980 wrote to memory of 3440 980 Client.exe 88 PID 980 wrote to memory of 3440 980 Client.exe 88 PID 980 wrote to memory of 696 980 Client.exe 90 PID 980 wrote to memory of 696 980 Client.exe 90 PID 980 wrote to memory of 696 980 Client.exe 90 PID 696 wrote to memory of 2916 696 cmd.exe 92 PID 696 wrote to memory of 2916 696 cmd.exe 92 PID 696 wrote to memory of 2916 696 cmd.exe 92 PID 696 wrote to memory of 3532 696 cmd.exe 93 PID 696 wrote to memory of 3532 696 cmd.exe 93 PID 696 wrote to memory of 3532 696 cmd.exe 93 PID 696 wrote to memory of 4680 696 cmd.exe 106 PID 696 wrote to memory of 4680 696 cmd.exe 106 PID 696 wrote to memory of 4680 696 cmd.exe 106 PID 4680 wrote to memory of 4020 4680 Client.exe 108 PID 4680 wrote to memory of 4020 4680 Client.exe 108 PID 4680 wrote to memory of 4020 4680 Client.exe 108 PID 4680 wrote to memory of 848 4680 Client.exe 110 PID 4680 wrote to memory of 848 4680 Client.exe 110 PID 4680 wrote to memory of 848 4680 Client.exe 110 PID 848 wrote to memory of 2056 848 cmd.exe 112 PID 848 wrote to memory of 2056 848 cmd.exe 112 PID 848 wrote to memory of 2056 848 cmd.exe 112 PID 848 wrote to memory of 2772 848 cmd.exe 113 PID 848 wrote to memory of 2772 848 cmd.exe 113 PID 848 wrote to memory of 2772 848 cmd.exe 113 PID 848 wrote to memory of 4460 848 cmd.exe 115 PID 848 wrote to memory of 4460 848 cmd.exe 115 PID 848 wrote to memory of 4460 848 cmd.exe 115 PID 4460 wrote to memory of 1948 4460 Client.exe 117 PID 4460 wrote to memory of 1948 4460 Client.exe 117 PID 4460 wrote to memory of 1948 4460 Client.exe 117 PID 4460 wrote to memory of 1384 4460 Client.exe 119 PID 4460 wrote to memory of 1384 4460 Client.exe 119 PID 4460 wrote to memory of 1384 4460 Client.exe 119 PID 1384 wrote to memory of 5064 1384 cmd.exe 121 PID 1384 wrote to memory of 5064 1384 cmd.exe 121 PID 1384 wrote to memory of 5064 1384 cmd.exe 121 PID 1384 wrote to memory of 4880 1384 cmd.exe 122 PID 1384 wrote to memory of 4880 1384 cmd.exe 122 PID 1384 wrote to memory of 4880 1384 cmd.exe 122 PID 1384 wrote to memory of 4560 1384 cmd.exe 127 PID 1384 wrote to memory of 4560 1384 cmd.exe 127 PID 1384 wrote to memory of 4560 1384 cmd.exe 127 PID 4560 wrote to memory of 2468 4560 Client.exe 129 PID 4560 wrote to memory of 2468 4560 Client.exe 129 PID 4560 wrote to memory of 2468 4560 Client.exe 129 PID 4560 wrote to memory of 1800 4560 Client.exe 131 PID 4560 wrote to memory of 1800 4560 Client.exe 131 PID 4560 wrote to memory of 1800 4560 Client.exe 131 PID 1800 wrote to memory of 980 1800 cmd.exe 133 PID 1800 wrote to memory of 980 1800 cmd.exe 133 PID 1800 wrote to memory of 980 1800 cmd.exe 133 PID 1800 wrote to memory of 2284 1800 cmd.exe 134 PID 1800 wrote to memory of 2284 1800 cmd.exe 134 PID 1800 wrote to memory of 2284 1800 cmd.exe 134 PID 1800 wrote to memory of 3604 1800 cmd.exe 136
Processes
-
C:\Users\Admin\AppData\Local\Temp\26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf.exe"C:\Users\Admin\AppData\Local\Temp\26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf.exe"1⤵
- Quasar RAT
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf.exe" /rl HIGHEST /f2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1464
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZkH9kYana1Mc.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:2916
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3532
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4020
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6pNjkjHbkh6l.bat" "5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
- System Location Discovery: System Language Discovery
PID:2056
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2772
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QByb0ywa31VY.bat" "7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
- System Location Discovery: System Language Discovery
PID:5064
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4880
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f9⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2468
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ItV5LwSfliNc.bat" "9⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
- System Location Discovery: System Language Discovery
PID:980
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2284
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3604 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f11⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3020
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aI2jhdI5y6j4.bat" "11⤵
- System Location Discovery: System Language Discovery
PID:4012 -
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
- System Location Discovery: System Language Discovery
PID:4532
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2388
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:976 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f13⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Irypw3jAxHnG.bat" "13⤵PID:3176
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
- System Location Discovery: System Language Discovery
PID:2092
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2212
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5072 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:3848
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ySqhHvMhqXp7.bat" "15⤵
- System Location Discovery: System Language Discovery
PID:1556 -
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
- System Location Discovery: System Language Discovery
PID:5048
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4188
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1944 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f17⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3008
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MOLtCZyWGimN.bat" "17⤵PID:1956
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵PID:1636
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4068
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3400 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f19⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\91pE7vvgAaC3.bat" "19⤵
- System Location Discovery: System Language Discovery
PID:3540 -
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
- System Location Discovery: System Language Discovery
PID:2440
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3484
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3308 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f21⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Gqq4EjUcFWcD.bat" "21⤵
- System Location Discovery: System Language Discovery
PID:4680 -
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
- System Location Discovery: System Language Discovery
PID:3720
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4520
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4836 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f23⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3900
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\akWWMdw89sra.bat" "23⤵
- System Location Discovery: System Language Discovery
PID:892 -
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
- System Location Discovery: System Language Discovery
PID:4696
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1336
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2176 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f25⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:448
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iZXMTQV4DoHk.bat" "25⤵
- System Location Discovery: System Language Discovery
PID:3832 -
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
- System Location Discovery: System Language Discovery
PID:736
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4400
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:216 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f27⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2276
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BHa6XBMJnjpo.bat" "27⤵
- System Location Discovery: System Language Discovery
PID:3632 -
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
- System Location Discovery: System Language Discovery
PID:3296
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:964
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4008 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f29⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4280
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YD4HRpy8Dtl5.bat" "29⤵PID:3924
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵PID:2372
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2388
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD510eab9c2684febb5327b6976f2047587
SHA1a12ed54146a7f5c4c580416aecb899549712449e
SHA256f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928
SHA5127e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50
-
Filesize
210B
MD53a713285675e93114a89060c1d464a26
SHA186737b32ac6761959aabb5f40399370d36c8a61c
SHA2560e2cc11eb8544b2e944aeb0b91c27f1a1136d289c94ec6692ab0b5d950e4f1cb
SHA512facdfc145b18046869a602cbb7fb7d3364d5385929a697a72ecf59481fbe3b0ea6dc6740002e9cf67d763e769e9a373eda6decf80e577ec79ce7bca3783a3f43
-
Filesize
210B
MD5543cd78bd0e0eea79d4f89db2c440a68
SHA11d933603f6019308ea16cc0c60df58f03ccfb267
SHA256e0b72d63816349c727898b67515ecb16de1766e39f5cd8a68163bf52d0ae8a52
SHA512155c1a3037be65fe2de6aca866da115fe6601118a193fe20ec86b99c1913541bb002798c9b9ad85144346f37b1c29eef889f16976e533ae79ae265f0ea721d18
-
Filesize
210B
MD5cd5c42865a1264e1f0445f3c3d366a38
SHA1732e557b16b18dca2db2f6843debe54cf4b7a831
SHA256504a1b27f3ec153286a4b315eba793ce9b0efcfabab9301d324e4f3dd0a005de
SHA51218f035a235830f7f595ef700f0582086a312d5b22aac62f5424c101d1e9ea751e4f23c33d78a1e18f13fa822b922741a0cb356b41df8fccb5e110bb952b44911
-
Filesize
210B
MD59d04ff77edb05e9086f74c8187f86a71
SHA1b96428a01fff756f81454cb5c1ef911f915c9d21
SHA256427a1fcdb8c39694d89780cc807ff86f33fe48b48910e2aad05bde635939a8d3
SHA5122621a5b5319458f811745cbde51e7630e69b0964f05c41d3ce45d4e8b9851e2d8575f8c3ed4a7c74382728d76cf8c4f32b665946115d6ad947e0c86003294a44
-
Filesize
210B
MD58097ba68ae7c4e1f9e5b72040c05f776
SHA1b15deadea4c479ec2d83b782218a67355d7e7714
SHA25654abf87ea74ea242c0c2349acab73e8adfb62a6a2f2bb186bc954402daf5b56b
SHA51276b6c5ab496b3630366bc91652f692fbc9ca9483ebf8f646bc91a16d8e3eaeb47c27c5be356d1f5efe3fd166ab82e51d08cab4604c82916b75c9ceb2a95baaad
-
Filesize
210B
MD57e4d1f13288f959dbe4252159e6b917c
SHA19c27a1b7c4cc9c380dec046d96a0cb53caf67f1f
SHA25608002f5cb7670a8d73e1b787d3fca963893cd8880f0836e09b78c33dad428908
SHA5128aeef7ebe37d35e6b7214535a486d9f14f81a500942f44771795d8dda61094facec689b75287ab852a6b2c03b587ce54f1f948b47909d994a7335bd2ba6c2a64
-
Filesize
210B
MD5e741ec19f4d207feb5e962d3f0fe1ef9
SHA1a7410d0d04668ec024aa7ff386504cb46dc163e9
SHA256c19dff3c145793463153671ce84fbd1d82a2fb63002c2ab1a34f58fed326b113
SHA5120ed64bdbdbca6968330fa2345fb02941358b295db80ca06a2a7749a51651163b4d9d814a99aa9e624d7a9a33e8450e4f0603d56f918bd3bd7b5a359e9c1adb60
-
Filesize
210B
MD58cc134ec3520969e299dab8227397a01
SHA167fc9c2f285db9207d10f48f3060963c1cef7851
SHA2561ab00420d4c174c9aa398fe81143ac7c0668ffb509cccb606a74797c18393dc0
SHA5121d339adc2ca1aeb8c63821a6fd38dc79d336c5f63556f1e8a0f547eb94f90c3ec8a812d2d847da0336bdec980bbc1cdb2242180273070c5c71914374aa8bd49c
-
Filesize
210B
MD51c4d21a421b905cdbf37d6e9c642c0a0
SHA17f1c89541fd8eb135e4963423a82b2708e2462b9
SHA256751fdbcd989040f2d19d5a4a9f48e8aa08d7631de3bfec43d24dffd09f38f297
SHA5122478a847eefd56eff6da82cc0162752d3cd0cc8ef6e9515010b63d5c7b05cc9bc1a86944fc042e107981bbbe7f62917b4f3ee907dba7e4d6f5617182904f4ac1
-
Filesize
210B
MD5aed87a06501e476767f60b5af61a8b87
SHA116df7394094424488efd8888745780314f11258a
SHA256f62b5d2936e96b8331e88b0b4533943e41a2e72a78b54581251e0de83c30ee0c
SHA512d260f0e4e447701f6cd254482b54473fc8defd3f13470773c150d735d83aab83724a6400ad53a45fcfe39c25b3112d398145b15a3618288ab0bf3c35ae943ae6
-
Filesize
210B
MD54078f32b836d4ca0b73d607de70d94f6
SHA12694fab0fbc20b2d2ebd64681cb4cbe836cb7967
SHA25663a55d24ee9dee9dcb7fba8ac271a115af380bc5ba3765a4e53e70add2addc0e
SHA512ed794e5126ef556fcf45f026315a538f8a10d8b62475621b07fd34a9eab6a5248194c4f782f51360a3665c30d70320d7b355a375767c7d39d49070dc4d77c07a
-
Filesize
210B
MD560d3309e22e949cdae698d5484fcc600
SHA19b71091fdc44cd063fc7c6eb9ed755ea005e6550
SHA256ecf8a7b659949bbb4bdfc57496206e84b18444ab74907a2577dbf6af0ee1647b
SHA51242894cd08a7cea6172a4078353f1ba1251a76484a162564f1a598304c95db4a1daccbf676dc84b2b44eb1d4c9389701c473f35e2c51f1f988af87549999669fd
-
Filesize
210B
MD51cf40334b23c07966d1e5904f7365c92
SHA116cdbfc3683f7fc441473305068cb02b7ec816b6
SHA25648b4aa85714bdfbbd78003050c562a129c47494c098045e57252551b645b57d9
SHA512bd497bb51fd2b02ed38db850942503cd3a7754125967950dd2a1d50fd941ac8fe5c7e8f81c9bbbaafb66c4b1950df9c5bf4c9b5d5539fdcd0e4fa16c6ede6f60
-
Filesize
210B
MD50c7ce69b40ca2084461f7f36f75866db
SHA1b9ea5cddbcdade92623b95210fafb428b31800b1
SHA256bc5f781f8c0ec4312d8e9e4df02fb7c8896d823523c0f67090b43fb2ddb0410a
SHA5129b9f594177bcc600ead04bdf5bc830fa645fe8c128fe86b89cbf13cc2efeca28aa31d0af76df97ef97daa23e3e1fa3837bf14d06149728c509aa7181d8424b3f
-
Filesize
286KB
MD5b988c49b9654ec30906a781cac1ebaaf
SHA185f7f7274e6a134870f309c2b3d06b71807e7626
SHA25626bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf
SHA512c4454fe6dff339982370a842133db79dba3fb641688d43a47ce4bdfb158a15eff3cad37c34ec4d881ca01e408af43e00f6f36c254f1bc7d93321b9d5f9028ad5