Overview
overview
10Static
static
1010b20d5ab6...1c.bat
windows7-x64
810b20d5ab6...1c.bat
windows10-2004-x64
813b53797e8...62.exe
windows7-x64
1013b53797e8...62.exe
windows10-2004-x64
1015d55e8865...ec.exe
windows7-x64
1015d55e8865...ec.exe
windows10-2004-x64
101b5f4adeca...0d.exe
windows7-x64
31b5f4adeca...0d.exe
windows10-2004-x64
33dc30eca9e...04.exe
windows7-x64
103dc30eca9e...04.exe
windows10-2004-x64
1056cd7a444e...40.exe
windows7-x64
356cd7a444e...40.exe
windows10-2004-x64
35ee74cad24...f9.exe
windows7-x64
105ee74cad24...f9.exe
windows10-2004-x64
105ff273f03e...43.exe
windows7-x64
105ff273f03e...43.exe
windows10-2004-x64
1060b98a0907...1c.exe
windows7-x64
760b98a0907...1c.exe
windows10-2004-x64
106a91052845...3f.exe
windows7-x64
106a91052845...3f.exe
windows10-2004-x64
106c4bf8dc2f...d6.exe
windows7-x64
36c4bf8dc2f...d6.exe
windows10-2004-x64
3807ebe7580...38.exe
windows7-x64
10807ebe7580...38.exe
windows10-2004-x64
1086abfdc360...b3.exe
windows7-x64
1086abfdc360...b3.exe
windows10-2004-x64
1089463c1b87...a6.exe
windows7-x64
489463c1b87...a6.exe
windows10-2004-x64
49bdc43df16...87.ps1
windows7-x64
39bdc43df16...87.ps1
windows10-2004-x64
109d11b8db73...e1.exe
windows7-x64
109d11b8db73...e1.exe
windows10-2004-x64
10Analysis
-
max time kernel
138s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 05:30
Behavioral task
behavioral1
Sample
10b20d5ab63333029b484bf4fc528e6cd4dc755c99c31c24054d63f9e3447c1c.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10b20d5ab63333029b484bf4fc528e6cd4dc755c99c31c24054d63f9e3447c1c.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
13b53797e8ae8969a0fe2fa57463fae3727af51fe094904b0bd5c4ba22bfd262.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
13b53797e8ae8969a0fe2fa57463fae3727af51fe094904b0bd5c4ba22bfd262.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
15d55e886566f3da849370afa83b54cf3be37b95be32bfab0ef36ae56663c6ec.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
15d55e886566f3da849370afa83b54cf3be37b95be32bfab0ef36ae56663c6ec.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
1b5f4adeca66e96ef076cfe25b53be7b9a3bb5a0cb50e69001e8985abe8f580d.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
1b5f4adeca66e96ef076cfe25b53be7b9a3bb5a0cb50e69001e8985abe8f580d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
3dc30eca9e2605ee856852687b05a74a8b9463de51a223b8344098ba7b402804.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
3dc30eca9e2605ee856852687b05a74a8b9463de51a223b8344098ba7b402804.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
56cd7a444e3f0c16d2b245d5e23f475bc69645bba2aa3d6c9bd22d34dddeb540.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
56cd7a444e3f0c16d2b245d5e23f475bc69645bba2aa3d6c9bd22d34dddeb540.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
5ee74cad243bc459b9068894fa0fc05d40cc8466322315f0132c8275a78112f9.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
5ee74cad243bc459b9068894fa0fc05d40cc8466322315f0132c8275a78112f9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
5ff273f03e88a8b0a1f58c85dfa28fee6f44766eb09d53c421eb770d6b965e43.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
5ff273f03e88a8b0a1f58c85dfa28fee6f44766eb09d53c421eb770d6b965e43.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
60b98a0907f9721cf28ccd684b565f7f77a90565e9a2bd47f75c419472c25a1c.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
60b98a0907f9721cf28ccd684b565f7f77a90565e9a2bd47f75c419472c25a1c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
6a910528454646f73cbab1b93c854a0322111c61063711e49257ff9f6317d13f.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
6a910528454646f73cbab1b93c854a0322111c61063711e49257ff9f6317d13f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
6c4bf8dc2f2c1cccb9a2470f1610c11397fe168e55972eb0aaee7e77afd5d3d6.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
6c4bf8dc2f2c1cccb9a2470f1610c11397fe168e55972eb0aaee7e77afd5d3d6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
807ebe758087a724108a1ab37dc3c954e2cd8aff85c36a8b849f2fc62929e538.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
86abfdc3601520afa34d06dec50f9f71716cc6fde9fb3f47523454115cc894b3.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
86abfdc3601520afa34d06dec50f9f71716cc6fde9fb3f47523454115cc894b3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
89463c1b87a5f32ab2ba59d536134516fa593c29bc0a6eda9e3da390d7f05ea6.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
89463c1b87a5f32ab2ba59d536134516fa593c29bc0a6eda9e3da390d7f05ea6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
9bdc43df16cff6db219f2d3dd4a1e4b650262e73f98d2264926b90664942c187.ps1
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
9bdc43df16cff6db219f2d3dd4a1e4b650262e73f98d2264926b90664942c187.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
9d11b8db730658666dad535182ea248063dd23966344d458250219652dc392e1.exe
Resource
win7-20240903-en
General
-
Target
9bdc43df16cff6db219f2d3dd4a1e4b650262e73f98d2264926b90664942c187.ps1
-
Size
446KB
-
MD5
b5c90bb64c65c7dc4bb82301d04cb3a5
-
SHA1
dc608bf3c1f20d5584a4c4fafc353e5569b6ac2b
-
SHA256
9bdc43df16cff6db219f2d3dd4a1e4b650262e73f98d2264926b90664942c187
-
SHA512
06154870d8c572c3687c6bdc44546c0642fde0d4554380a103712c2c8045b56743459af525e374acd6241b66c28c7102ebb101e786b08a725280384bcef6073c
-
SSDEEP
3072:dqslZ+EZdDeUqAR2xEU2kwom+weekljaPC7b8fjEfxkBtXuVDLQ4:dq0+CdDeU/2xD2kxm+J5l14jEH
Malware Config
Extracted
asyncrat
AWS | 3Losh
FOCO-WINPAX
cdt2023.ddns.net:6606
cdt2023.ddns.net:7707
cdt2023.ddns.net:8808
cdt2023.ddns.net:3313
cdt2023.ddns.net:3314
cdt2023.ddns.net:9441
cdt2023.ddns.net:9442
cdt2023.ddns.net:9443
cdt2023.ddns.net:2900
cdt2023.ddns.net:1018
cdt2023.ddns.net:2019
cdt2023.ddns.net:2020
cdt2023.ddns.net:2021
cdt2023.ddns.net:5155
cdt2023.ddns.net:6666
cdt2023.ddns.net:9999
cdt2023.ddns.net:5505
chromedata.accesscam.org:6606
chromedata.accesscam.org:7707
chromedata.accesscam.org:8808
chromedata.accesscam.org:3313
chromedata.accesscam.org:3314
chromedata.accesscam.org:9441
chromedata.accesscam.org:9442
chromedata.accesscam.org:9443
chromedata.accesscam.org:2900
chromedata.accesscam.org:1018
chromedata.accesscam.org:2019
chromedata.accesscam.org:2020
chromedata.accesscam.org:2021
chromedata.accesscam.org:5155
chromedata.accesscam.org:6666
chromedata.accesscam.org:9999
chromedata.accesscam.org:5505
chromedata.webredirect.org:6606
chromedata.webredirect.org:7707
chromedata.webredirect.org:8808
chromedata.webredirect.org:3313
chromedata.webredirect.org:3314
chromedata.webredirect.org:9441
chromedata.webredirect.org:9442
chromedata.webredirect.org:9443
chromedata.webredirect.org:2900
chromedata.webredirect.org:1018
chromedata.webredirect.org:2019
chromedata.webredirect.org:2020
chromedata.webredirect.org:2021
chromedata.webredirect.org:5155
chromedata.webredirect.org:6666
chromedata.webredirect.org:9999
chromedata.webredirect.org:5505
cepas2023.duckdns.org:6606
cepas2023.duckdns.org:7707
cepas2023.duckdns.org:8808
cepas2023.duckdns.org:3313
cepas2023.duckdns.org:3314
cepas2023.duckdns.org:9441
cepas2023.duckdns.org:9442
cepas2023.duckdns.org:9443
cepas2023.duckdns.org:2900
cepas2023.duckdns.org:1018
cepas2023.duckdns.org:2019
cepas2023.duckdns.org:2020
cepas2023.duckdns.org:2021
cepas2023.duckdns.org:5155
cepas2023.duckdns.org:6666
cepas2023.duckdns.org:9999
cepas2023.duckdns.org:5505
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:3313
127.0.0.1:3314
127.0.0.1:9441
127.0.0.1:9442
127.0.0.1:9443
127.0.0.1:2900
127.0.0.1:1018
127.0.0.1:2019
127.0.0.1:2020
127.0.0.1:2021
127.0.0.1:5155
127.0.0.1:6666
127.0.0.1:9999
127.0.0.1:5505
45.40.96.97:6606
45.40.96.97:7707
45.40.96.97:8808
45.40.96.97:3313
45.40.96.97:3314
45.40.96.97:9441
45.40.96.97:9442
45.40.96.97:9443
45.40.96.97:2900
45.40.96.97:1018
45.40.96.97:2019
45.40.96.97:2020
45.40.96.97:2021
45.40.96.97:5155
45.40.96.97:6666
45.40.96.97:9999
45.40.96.97:5505
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
svchost.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 5048 set thread context of 1372 5048 powershell.exe 85 PID 5048 set thread context of 3024 5048 powershell.exe 86 PID 5048 set thread context of 3508 5048 powershell.exe 87 PID 5048 set thread context of 3020 5048 powershell.exe 88 PID 5048 set thread context of 2320 5048 powershell.exe 89 PID 5048 set thread context of 2912 5048 powershell.exe 90 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
pid Process 5048 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regbrowsers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regbrowsers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 5048 powershell.exe 5048 powershell.exe 5048 powershell.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 5048 powershell.exe Token: SeRestorePrivilege 664 dw20.exe Token: SeBackupPrivilege 664 dw20.exe Token: SeRestorePrivilege 1640 dw20.exe Token: SeBackupPrivilege 1640 dw20.exe Token: SeBackupPrivilege 1640 dw20.exe Token: SeBackupPrivilege 1600 dw20.exe Token: SeBackupPrivilege 1476 dw20.exe Token: SeBackupPrivilege 1600 dw20.exe Token: SeBackupPrivilege 1476 dw20.exe Token: SeBackupPrivilege 1600 dw20.exe Token: SeBackupPrivilege 1600 dw20.exe Token: SeBackupPrivilege 1476 dw20.exe Token: SeBackupPrivilege 1476 dw20.exe Token: SeBackupPrivilege 1640 dw20.exe Token: SeBackupPrivilege 1640 dw20.exe Token: SeBackupPrivilege 1476 dw20.exe Token: SeBackupPrivilege 1600 dw20.exe Token: SeBackupPrivilege 664 dw20.exe Token: SeBackupPrivilege 664 dw20.exe Token: SeDebugPrivilege 3024 aspnet_regbrowsers.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 5048 wrote to memory of 1372 5048 powershell.exe 85 PID 5048 wrote to memory of 1372 5048 powershell.exe 85 PID 5048 wrote to memory of 1372 5048 powershell.exe 85 PID 5048 wrote to memory of 1372 5048 powershell.exe 85 PID 5048 wrote to memory of 1372 5048 powershell.exe 85 PID 5048 wrote to memory of 1372 5048 powershell.exe 85 PID 5048 wrote to memory of 1372 5048 powershell.exe 85 PID 5048 wrote to memory of 1372 5048 powershell.exe 85 PID 5048 wrote to memory of 3024 5048 powershell.exe 86 PID 5048 wrote to memory of 3024 5048 powershell.exe 86 PID 5048 wrote to memory of 3024 5048 powershell.exe 86 PID 5048 wrote to memory of 3024 5048 powershell.exe 86 PID 5048 wrote to memory of 3024 5048 powershell.exe 86 PID 5048 wrote to memory of 3024 5048 powershell.exe 86 PID 5048 wrote to memory of 3024 5048 powershell.exe 86 PID 5048 wrote to memory of 3024 5048 powershell.exe 86 PID 5048 wrote to memory of 3508 5048 powershell.exe 87 PID 5048 wrote to memory of 3508 5048 powershell.exe 87 PID 5048 wrote to memory of 3508 5048 powershell.exe 87 PID 5048 wrote to memory of 3508 5048 powershell.exe 87 PID 5048 wrote to memory of 3508 5048 powershell.exe 87 PID 5048 wrote to memory of 3508 5048 powershell.exe 87 PID 5048 wrote to memory of 3508 5048 powershell.exe 87 PID 5048 wrote to memory of 3508 5048 powershell.exe 87 PID 5048 wrote to memory of 3020 5048 powershell.exe 88 PID 5048 wrote to memory of 3020 5048 powershell.exe 88 PID 5048 wrote to memory of 3020 5048 powershell.exe 88 PID 5048 wrote to memory of 3020 5048 powershell.exe 88 PID 5048 wrote to memory of 3020 5048 powershell.exe 88 PID 5048 wrote to memory of 3020 5048 powershell.exe 88 PID 5048 wrote to memory of 3020 5048 powershell.exe 88 PID 5048 wrote to memory of 3020 5048 powershell.exe 88 PID 5048 wrote to memory of 2320 5048 powershell.exe 89 PID 5048 wrote to memory of 2320 5048 powershell.exe 89 PID 5048 wrote to memory of 2320 5048 powershell.exe 89 PID 5048 wrote to memory of 2320 5048 powershell.exe 89 PID 5048 wrote to memory of 2320 5048 powershell.exe 89 PID 5048 wrote to memory of 2320 5048 powershell.exe 89 PID 5048 wrote to memory of 2320 5048 powershell.exe 89 PID 5048 wrote to memory of 2320 5048 powershell.exe 89 PID 5048 wrote to memory of 2912 5048 powershell.exe 90 PID 5048 wrote to memory of 2912 5048 powershell.exe 90 PID 5048 wrote to memory of 2912 5048 powershell.exe 90 PID 5048 wrote to memory of 2912 5048 powershell.exe 90 PID 5048 wrote to memory of 2912 5048 powershell.exe 90 PID 5048 wrote to memory of 2912 5048 powershell.exe 90 PID 5048 wrote to memory of 2912 5048 powershell.exe 90 PID 5048 wrote to memory of 2912 5048 powershell.exe 90 PID 2320 wrote to memory of 664 2320 Msbuild.exe 91 PID 2320 wrote to memory of 664 2320 Msbuild.exe 91 PID 2320 wrote to memory of 664 2320 Msbuild.exe 91 PID 3508 wrote to memory of 1600 3508 RegSvcs.exe 92 PID 3508 wrote to memory of 1600 3508 RegSvcs.exe 92 PID 3508 wrote to memory of 1600 3508 RegSvcs.exe 92 PID 3020 wrote to memory of 1640 3020 RegSvcs.exe 93 PID 3020 wrote to memory of 1640 3020 RegSvcs.exe 93 PID 3020 wrote to memory of 1640 3020 RegSvcs.exe 93 PID 2912 wrote to memory of 1476 2912 Msbuild.exe 94 PID 2912 wrote to memory of 1476 2912 Msbuild.exe 94 PID 2912 wrote to memory of 1476 2912 Msbuild.exe 94
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\9bdc43df16cff6db219f2d3dd4a1e4b650262e73f98d2264926b90664942c187.ps11⤵
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1372
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7803⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7763⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7603⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:664
-
-
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7723⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5db00ea2c920d737bef7468b5bc5d01f9
SHA164fd7d0a677d52e870d69ebeb3249db1e97b4a1a
SHA25615fa48fc2c9da72944c97feea919e154ac7550bbaf6294c015eed325fa1b9860
SHA512814c69b9efccb95e534b12e298df6ba6a5b28c106085150cd07537f85b1913cabd0b135aa1a38200f1e98734220a6e49ca507aa9a72916e3af0d87a9fc7a238c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82