Analysis
-
max time kernel
31s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 13:25
Behavioral task
behavioral1
Sample
__IL Spammer.EXE - עותק.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
__IL Spammer.EXE - עותק.exe
Resource
win10v2004-20241007-en
General
-
Target
__IL Spammer.EXE - עותק.exe
-
Size
395.3MB
-
MD5
5d80b902c3df6038228ddc6c8f56d405
-
SHA1
6fceb0d778451c1711f07a47c3f932ca005dd9a5
-
SHA256
2f78b8b815c6c55a7c368252c4cffe15350b3942bbda2b50db3fc63cec333cfc
-
SHA512
9cc316a81a5746d72a026cc1833239abab87b501fa108fe79a6b45f6ce0c3b14f2859ab1a6c649b900b89df1bfa8801a10da8dfa93572cc061b96b16846036a6
-
SSDEEP
393216:6raewq3Obs2ClPBXMCHWUjvrRQ7XbFsn6xEahVbGTbo1N:6Oewq3ObRqPBXMb8vrRQ766xhZGT8v
Malware Config
Signatures
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 3516 netsh.exe 4756 netsh.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 5112 cmd.exe 4896 powershell.exe -
Loads dropped DLL 34 IoCs
pid Process 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe 224 __IL Spammer.EXE - עותק.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 33 discord.com 34 discord.com 35 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 ip-api.com -
pid Process 60 cmd.exe 1296 ARP.EXE -
Enumerates processes with tasklist 1 TTPs 5 IoCs
pid Process 4956 tasklist.exe 1296 tasklist.exe 4200 tasklist.exe 4128 tasklist.exe 2904 tasklist.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 408 cmd.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4992 sc.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 1268 cmd.exe 3956 netsh.exe -
System Network Connections Discovery 1 TTPs 1 IoCs
Attempt to get a listing of network connections.
pid Process 3488 NETSTAT.EXE -
Collects information from the system 1 TTPs 1 IoCs
Uses WMIC.exe to find detailed system information.
pid Process 1612 WMIC.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1124 WMIC.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 1068 ipconfig.exe 3488 NETSTAT.EXE -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 3216 systeminfo.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4896 powershell.exe 4896 powershell.exe 4896 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1124 WMIC.exe Token: SeSecurityPrivilege 1124 WMIC.exe Token: SeTakeOwnershipPrivilege 1124 WMIC.exe Token: SeLoadDriverPrivilege 1124 WMIC.exe Token: SeSystemProfilePrivilege 1124 WMIC.exe Token: SeSystemtimePrivilege 1124 WMIC.exe Token: SeProfSingleProcessPrivilege 1124 WMIC.exe Token: SeIncBasePriorityPrivilege 1124 WMIC.exe Token: SeCreatePagefilePrivilege 1124 WMIC.exe Token: SeBackupPrivilege 1124 WMIC.exe Token: SeRestorePrivilege 1124 WMIC.exe Token: SeShutdownPrivilege 1124 WMIC.exe Token: SeDebugPrivilege 1124 WMIC.exe Token: SeSystemEnvironmentPrivilege 1124 WMIC.exe Token: SeRemoteShutdownPrivilege 1124 WMIC.exe Token: SeUndockPrivilege 1124 WMIC.exe Token: SeManageVolumePrivilege 1124 WMIC.exe Token: 33 1124 WMIC.exe Token: 34 1124 WMIC.exe Token: 35 1124 WMIC.exe Token: 36 1124 WMIC.exe Token: SeIncreaseQuotaPrivilege 928 WMIC.exe Token: SeSecurityPrivilege 928 WMIC.exe Token: SeTakeOwnershipPrivilege 928 WMIC.exe Token: SeLoadDriverPrivilege 928 WMIC.exe Token: SeSystemProfilePrivilege 928 WMIC.exe Token: SeSystemtimePrivilege 928 WMIC.exe Token: SeProfSingleProcessPrivilege 928 WMIC.exe Token: SeIncBasePriorityPrivilege 928 WMIC.exe Token: SeCreatePagefilePrivilege 928 WMIC.exe Token: SeBackupPrivilege 928 WMIC.exe Token: SeRestorePrivilege 928 WMIC.exe Token: SeShutdownPrivilege 928 WMIC.exe Token: SeDebugPrivilege 928 WMIC.exe Token: SeSystemEnvironmentPrivilege 928 WMIC.exe Token: SeRemoteShutdownPrivilege 928 WMIC.exe Token: SeUndockPrivilege 928 WMIC.exe Token: SeManageVolumePrivilege 928 WMIC.exe Token: 33 928 WMIC.exe Token: 34 928 WMIC.exe Token: 35 928 WMIC.exe Token: 36 928 WMIC.exe Token: SeDebugPrivilege 4956 tasklist.exe Token: SeIncreaseQuotaPrivilege 1124 WMIC.exe Token: SeSecurityPrivilege 1124 WMIC.exe Token: SeTakeOwnershipPrivilege 1124 WMIC.exe Token: SeLoadDriverPrivilege 1124 WMIC.exe Token: SeSystemProfilePrivilege 1124 WMIC.exe Token: SeSystemtimePrivilege 1124 WMIC.exe Token: SeProfSingleProcessPrivilege 1124 WMIC.exe Token: SeIncBasePriorityPrivilege 1124 WMIC.exe Token: SeCreatePagefilePrivilege 1124 WMIC.exe Token: SeBackupPrivilege 1124 WMIC.exe Token: SeRestorePrivilege 1124 WMIC.exe Token: SeShutdownPrivilege 1124 WMIC.exe Token: SeDebugPrivilege 1124 WMIC.exe Token: SeSystemEnvironmentPrivilege 1124 WMIC.exe Token: SeRemoteShutdownPrivilege 1124 WMIC.exe Token: SeUndockPrivilege 1124 WMIC.exe Token: SeManageVolumePrivilege 1124 WMIC.exe Token: 33 1124 WMIC.exe Token: 34 1124 WMIC.exe Token: 35 1124 WMIC.exe Token: 36 1124 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4112 wrote to memory of 224 4112 __IL Spammer.EXE - עותק.exe 85 PID 4112 wrote to memory of 224 4112 __IL Spammer.EXE - עותק.exe 85 PID 224 wrote to memory of 2372 224 __IL Spammer.EXE - עותק.exe 87 PID 224 wrote to memory of 2372 224 __IL Spammer.EXE - עותק.exe 87 PID 224 wrote to memory of 2264 224 __IL Spammer.EXE - עותק.exe 88 PID 224 wrote to memory of 2264 224 __IL Spammer.EXE - עותק.exe 88 PID 224 wrote to memory of 4460 224 __IL Spammer.EXE - עותק.exe 89 PID 224 wrote to memory of 4460 224 __IL Spammer.EXE - עותק.exe 89 PID 224 wrote to memory of 972 224 __IL Spammer.EXE - עותק.exe 90 PID 224 wrote to memory of 972 224 __IL Spammer.EXE - עותק.exe 90 PID 2372 wrote to memory of 1124 2372 cmd.exe 95 PID 2372 wrote to memory of 1124 2372 cmd.exe 95 PID 972 wrote to memory of 4956 972 cmd.exe 96 PID 972 wrote to memory of 4956 972 cmd.exe 96 PID 2264 wrote to memory of 928 2264 cmd.exe 97 PID 2264 wrote to memory of 928 2264 cmd.exe 97 PID 224 wrote to memory of 3600 224 __IL Spammer.EXE - עותק.exe 98 PID 224 wrote to memory of 3600 224 __IL Spammer.EXE - עותק.exe 98 PID 3600 wrote to memory of 1480 3600 cmd.exe 100 PID 3600 wrote to memory of 1480 3600 cmd.exe 100 PID 224 wrote to memory of 3456 224 __IL Spammer.EXE - עותק.exe 101 PID 224 wrote to memory of 3456 224 __IL Spammer.EXE - עותק.exe 101 PID 224 wrote to memory of 3488 224 __IL Spammer.EXE - עותק.exe 102 PID 224 wrote to memory of 3488 224 __IL Spammer.EXE - עותק.exe 102 PID 3456 wrote to memory of 4368 3456 cmd.exe 105 PID 3456 wrote to memory of 4368 3456 cmd.exe 105 PID 3488 wrote to memory of 1296 3488 cmd.exe 106 PID 3488 wrote to memory of 1296 3488 cmd.exe 106 PID 224 wrote to memory of 408 224 __IL Spammer.EXE - עותק.exe 107 PID 224 wrote to memory of 408 224 __IL Spammer.EXE - עותק.exe 107 PID 408 wrote to memory of 1860 408 cmd.exe 109 PID 408 wrote to memory of 1860 408 cmd.exe 109 PID 224 wrote to memory of 4280 224 __IL Spammer.EXE - עותק.exe 112 PID 224 wrote to memory of 4280 224 __IL Spammer.EXE - עותק.exe 112 PID 224 wrote to memory of 628 224 __IL Spammer.EXE - עותק.exe 114 PID 224 wrote to memory of 628 224 __IL Spammer.EXE - עותק.exe 114 PID 628 wrote to memory of 4200 628 cmd.exe 116 PID 628 wrote to memory of 4200 628 cmd.exe 116 PID 4280 wrote to memory of 3188 4280 cmd.exe 117 PID 4280 wrote to memory of 3188 4280 cmd.exe 117 PID 224 wrote to memory of 4988 224 __IL Spammer.EXE - עותק.exe 118 PID 224 wrote to memory of 4988 224 __IL Spammer.EXE - עותק.exe 118 PID 224 wrote to memory of 1620 224 __IL Spammer.EXE - עותק.exe 119 PID 224 wrote to memory of 1620 224 __IL Spammer.EXE - עותק.exe 119 PID 224 wrote to memory of 2300 224 __IL Spammer.EXE - עותק.exe 120 PID 224 wrote to memory of 2300 224 __IL Spammer.EXE - עותק.exe 120 PID 224 wrote to memory of 5112 224 __IL Spammer.EXE - עותק.exe 121 PID 224 wrote to memory of 5112 224 __IL Spammer.EXE - עותק.exe 121 PID 1620 wrote to memory of 4156 1620 cmd.exe 126 PID 1620 wrote to memory of 4156 1620 cmd.exe 126 PID 4988 wrote to memory of 556 4988 cmd.exe 127 PID 4988 wrote to memory of 556 4988 cmd.exe 127 PID 4156 wrote to memory of 1104 4156 cmd.exe 128 PID 4156 wrote to memory of 1104 4156 cmd.exe 128 PID 2300 wrote to memory of 4128 2300 cmd.exe 129 PID 2300 wrote to memory of 4128 2300 cmd.exe 129 PID 556 wrote to memory of 4552 556 cmd.exe 130 PID 556 wrote to memory of 4552 556 cmd.exe 130 PID 5112 wrote to memory of 4896 5112 cmd.exe 131 PID 5112 wrote to memory of 4896 5112 cmd.exe 131 PID 224 wrote to memory of 1268 224 __IL Spammer.EXE - עותק.exe 132 PID 224 wrote to memory of 1268 224 __IL Spammer.EXE - עותק.exe 132 PID 224 wrote to memory of 60 224 __IL Spammer.EXE - עותק.exe 134 PID 224 wrote to memory of 60 224 __IL Spammer.EXE - עותק.exe 134 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1860 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\__IL Spammer.EXE - עותק.exe"C:\Users\Admin\AppData\Local\Temp\__IL Spammer.EXE - עותק.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\__IL Spammer.EXE - עותק.exe"C:\Users\Admin\AppData\Local\Temp\__IL Spammer.EXE - עותק.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer"3⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get Manufacturer4⤵
- Suspicious use of AdjustPrivilegeToken
PID:928
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "gdb --version"3⤵PID:4460
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer"3⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_ComputerSystem get Manufacturer4⤵PID:1480
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:4368
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
PID:1296
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\WaltuhiumUpdateService\Waltuhium.exe""3⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\WaltuhiumUpdateService\Waltuhium.exe"4⤵
- Views/modifies file attributes
PID:1860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()""3⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\system32\mshta.exemshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()"4⤵PID:3188
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
PID:4200
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"3⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\system32\cmd.execmd.exe /c chcp4⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\system32\chcp.comchcp5⤵PID:4552
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"3⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\system32\cmd.execmd.exe /c chcp4⤵
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\system32\chcp.comchcp5⤵PID:1104
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:4128
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"3⤵
- Clipboard Data
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Get-Clipboard4⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"3⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1268 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3956
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"3⤵
- Network Service Discovery
PID:60 -
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:3216
-
-
C:\Windows\system32\HOSTNAME.EXEhostname4⤵PID:4908
-
-
C:\Windows\System32\Wbem\WMIC.exewmic logicaldisk get caption,description,providername4⤵
- Collects information from the system
PID:1612
-
-
C:\Windows\system32\net.exenet user4⤵PID:792
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user5⤵PID:4680
-
-
-
C:\Windows\system32\query.exequery user4⤵PID:3648
-
C:\Windows\system32\quser.exe"C:\Windows\system32\quser.exe"5⤵PID:3768
-
-
-
C:\Windows\system32\net.exenet localgroup4⤵PID:2312
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup5⤵PID:4264
-
-
-
C:\Windows\system32\net.exenet localgroup administrators4⤵PID:4668
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators5⤵PID:2264
-
-
-
C:\Windows\system32\net.exenet user guest4⤵PID:4332
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user guest5⤵PID:3948
-
-
-
C:\Windows\system32\net.exenet user administrator4⤵PID:4508
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user administrator5⤵PID:4956
-
-
-
C:\Windows\System32\Wbem\WMIC.exewmic startup get caption,command4⤵PID:972
-
-
C:\Windows\system32\tasklist.exetasklist /svc4⤵
- Enumerates processes with tasklist
PID:2904
-
-
C:\Windows\system32\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:1068
-
-
C:\Windows\system32\ROUTE.EXEroute print4⤵PID:3200
-
-
C:\Windows\system32\ARP.EXEarp -a4⤵
- Network Service Discovery
PID:1296
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -ano4⤵
- System Network Connections Discovery
- Gathers network information
PID:3488
-
-
C:\Windows\system32\sc.exesc query type= service state= all4⤵
- Launches sc.exe
PID:4992
-
-
C:\Windows\system32\netsh.exenetsh firewall show state4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3516
-
-
C:\Windows\system32\netsh.exenetsh firewall show config4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4756
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:1524
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:1864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:2660
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:2460
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1System Information Discovery
3System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD5862f820c3251e4ca6fc0ac00e4092239
SHA1ef96d84b253041b090c243594f90938e9a487a9a
SHA25636585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153
SHA5122f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e
-
Filesize
48KB
MD568156f41ae9a04d89bb6625a5cd222d4
SHA13be29d5c53808186eba3a024be377ee6f267c983
SHA25682a2f9ae1e6146ae3cb0f4bc5a62b7227e0384209d9b1aef86bbcc105912f7cd
SHA512f7bf8ad7cd8b450050310952c56f6a20b378a972c822ccc253ef3d7381b56ffb3ca6ce3323bea9872674ed1c02017f78ab31e9eb9927fc6b3cba957c247e5d57
-
Filesize
71KB
MD5142e957ae9fe9dd8514e1781c9a35c2b
SHA166d587f8b3a9f8cf237fc682c6e6d3d0929f1df9
SHA2564c6d6690e91974804c1eaf77827ea63882711689baff0718a246796ff40b2a23
SHA512874a827a6183bfe9898c80c25db4336eb58273a0ec701bc5f497364afe3084d6634bf6db7f9dc02ef593c6a751e678be419e9af050bd51c4bbb89d98f53c5f0b
-
Filesize
83KB
MD5c17dcb7fc227601471a641ec90e6237f
SHA1c93a8c2430e844f40f1d9c880aa74612409ffbb9
SHA25655894b2b98d01f37b9a8cf4daf926d0161ff23c2fb31c56f9dbbac3a61932712
SHA51238851cbd234a51394673a7514110eb43037b4e19d2a6fb79471cc7d01dbcf2695e70df4ba2727c69f1fed56fc7980e3ca37fddff73cc3294a2ea44facdeb0fa9
-
Filesize
175KB
MD55cba92e7c00d09a55f5cbadc8d16cd26
SHA10300c6b62cd9db98562fdd3de32096ab194da4c8
SHA2560e3d149b91fc7dc3367ab94620a5e13af6e419f423b31d4800c381468cb8ad85
SHA5127ab432c8774a10f04ddd061b57d07eba96481b5bb8c663c6ade500d224c6061bc15d17c74da20a7c3cec8bbf6453404d553ebab22d37d67f9b163d7a15cf1ded
-
Filesize
129KB
MD52bd5dabbb35398a506e3406bc01eba26
SHA1af3ab9d8467e25367d03cb7479a3e4324917f8d0
SHA2565c4c489ac052795c27af063c96bc4db5ab250144d4839050cfa9bb3836b87c32
SHA512c07860d86ae0d900e44945da77e3b620005667304c0715985f06000f3d410fffb7e38e1bc84e4e6d24889d46b9dac6bf18861c95b2b09e760012edc5406b3838
-
Filesize
274KB
MD5ad4324e5cc794d626ffccda544a5a833
SHA1ef925e000383b6cad9361430fc38264540d434a5
SHA256040f361f63204b55c17a100c260c7ddfadd00866cc055fbd641b83a6747547d5
SHA5120a002b79418242112600b9246da66a5c04651aecb2e245f0220b2544d7b7df67a20139f45ddf2d4e7759ce8cc3d6b4be7f98b0a221c756449eb1b6d7af602325
-
Filesize
63KB
MD5422e214ca76421e794b99f99a374b077
SHA158b24448ab889948303cdefe28a7c697687b7ebc
SHA25678223aef72777efc93c739f5308a3fc5de28b7d10e6975b8947552a62592772b
SHA51203fcccc5a300cc029bef06c601915fa38604d955995b127b5b121cb55fb81752a8a1eec4b1b263ba12c51538080335dabaef9e2b8259b4bf02af84a680552fa0
-
Filesize
155KB
MD566a9028efd1bb12047dafce391fd6198
SHA1e0b61ce28ea940f1f0d5247d40abe61ae2b91293
SHA256e44dea262a24df69fd9b50b08d09ae6f8b051137ce0834640c977091a6f9fca8
SHA5123c2a4e2539933cbeb1d0b3c8ef14f0563675fd53b6ef487c7a5371dfe2ee1932255f91db598a61aaadacd8dc2fe2486a91f586542c52dfc054b22ad843831d1e
-
Filesize
35KB
MD522d20bd3946419ecf0882315ae1f96de
SHA1f3c07bef75fa372a6905e971ca8350d1e3e48058
SHA2569da721822a592f8c4e9a96ebaa4517c45768d7737582e0e5b933066f453a2e5e
SHA512a3bec1f99240b9e9d823405eecc1c511c46f11c7d844229a0dad7e23edb69df365874c184fe9b2637f12a94132e44acecc3a434810d0ff5c819f8207f1ddde9f
-
Filesize
55KB
MD54df3728d404e0b1607a80b32c6c93bcc
SHA1d6ebd687de4d5fd8037f0775d6ea88b84f6a8287
SHA256c8a0e2c0d7f82cedb839d2c0b827cf139113faa4aba05f2345c80e2cf3335b8a
SHA512f9f51ac1f82e2fa799249336a927a84b0a44055ada0a136e318d9073633c2595445a933fbc74b0b3c16cbad6c253d1df76cad031389d89daf9a789de1526e265
-
Filesize
34KB
MD5955b197c38ea5bd537ce9c7cb2109802
SHA18feffcb11740ddafc4479fc008cc06c6b570a8bc
SHA25673cade82ee139459fe5841e5631274fc9caf7f579418b613f278125435653539
SHA512cab0d8d10fb3bff72d20b287901ccd9be685796142cd2e45e4712cd6f4551dec69180490c2fdfad262c6927a3c7f4fefe68187f64c066731fe17012f78a0ed69
-
Filesize
82KB
MD5abf998769f3cba685e90fa06e0ec8326
SHA1daa66047cf22b6be608127f8824e59b30c9026bf
SHA25662d0493ced6ca33e2fd8141649dd9889c23b2e9afc5fdf56edb4f888c88fb823
SHA51208c6b3573c596a15accf4936533567415198a0daab5b6e9824b820fd1f078233bbc3791fde6971489e70155f7c33c1242b0b0a3a17fe2ec95b9fadae555ed483
-
Filesize
126KB
MD58a8ed31d0a082bcdfb7d5a3249689890
SHA1ff9c7529ed7636fa0cda44d8c9d043c84d8f55f2
SHA256c2161b71db9ce8c518d65e8a36c9ec67cd6d039ff732203b8adbe2c7ea883f6d
SHA512075aa2ccb70041ffc66c5bc672dbf05aac1bf8f1f33f86d2fa2578fe9be3731689686dae6e69d59515028390ba0da1ea452f3bd2d46b9cce3f26106084db074f
-
Filesize
178KB
MD5cf541cc288ac0bec9b682a2e0011d1ff
SHA1ef0dd009fdad14b3f6063619112dcdfafb17186d
SHA256e94f0195363c5c9babfc4c17ec6fb1aa8bbabf59e377db66ce6a79c4c58bbd07
SHA512f97e7fc644356bebe7e3deaa46b7de61118b13af99c9e91d0fbcbe3caea0c941265bcb28fee31a22fc3031c6428517c5202c1425654f3c2cd234979c9e3c04b8
-
Filesize
27KB
MD5b5f2d9353f758e1a60e67dac33debdd2
SHA1edae6378d70b76846329fa609483de89531bcf16
SHA256cde836ef0bde1c15c1c3750de54b50d2285864c512abbfc9e2c94f0ff5aa5ca2
SHA5129d780a8ec760c6bae3b53079c9a0670c7cbf2af6aababda0234ee71c5e0546b501cbe9666d973eaa28fb7fb7285814ecfece98d20cf4a86d3aea9a61a8120397
-
Filesize
39KB
MD5c629ce084fc76ac60b7a77479cb2225c
SHA1fe80955f217162ce9d4910202bbe30f7601d254a
SHA256afad80f9e62a57814779cf3e48352b583c1a0697b11a23cc9db3f4e43f7f8664
SHA5129863767981508f458c61553e5a50b6c5d70956676fee92e15b5ab08b1770ba0f640392fa12feddd6ab1eac5a418f3f8cd057c608e33653a2825ca36edded78b6
-
Filesize
257KB
MD53d5b5e6a36927ec78a1e4716b23eb3b6
SHA14bb9c47ad4be457f92fda1a0c15794dfc9d2f617
SHA256311b8f4aa9656fa2a2e728b4f34137e79767199e5eb0b2f8d9b1e9df614b387b
SHA5120dce3a58a0b6c2d2270d62d3ba2fdc6c5e5cc53f2b1072db5c2b7dbc2a303a4141d66d402ec9baa4c0d49e7e125f8481e1f40ce0550f5ad1a9f82e52b1e4b867
-
Filesize
47KB
MD573432d154eeea2102e1d140767bf5b65
SHA12bc59507522021fab2d1be19bf3478dc2f6012f9
SHA256beaf5290cff140934c2c34293da92985096306d6c7c7614c870fd9b59114c7bc
SHA5123fd6fa9734f02ea08f96f3a62954bc36b2bcefed6ee8a29432ecbfc449b7c6db905cb526bde72a8b0d3731d041e1d157b469554bcd192e479bc64620ea079dc4
-
Filesize
34KB
MD578bda19210370777e1ab3840b0b16a32
SHA1e848cb17a5ecc42b0f8a5588348a427fa781ab8f
SHA256aaeecd93142b34ea1b4ff473c88365cf5b8fd7bec7d83e6bfde12a0f836d38b9
SHA512ddb54fb256eafed024ea950277a6e1e7d6bcc38905de883d3e35a79238ff11621f15ec8a4724ec9e74093b2d213aa0cc961e9dc56a8c868c185b44ae61387223
-
Filesize
1.3MB
MD518c3f8bf07b4764d340df1d612d28fad
SHA1fc0e09078527c13597c37dbea39551f72bbe9ae8
SHA2566e30043dfa5faf9c31bd8fb71778e8e0701275b620696d29ad274846676b7175
SHA512135b97cd0284424a269c964ed95b06d338814e5e7b2271b065e5eabf56a8af4a213d863dd2a1e93c1425fadb1b20e6c63ffa6e8984156928be4a9a2fbbfd5e93
-
Filesize
7.9MB
MD534293b976da366d83c12d8ee05de7b03
SHA182b8eb434c26fcc3a5d9673c9b93663c0ff9bf15
SHA256a2285c3f2f7e63ba8a17ab5d0a302740e6adf7e608e0707a7737c1ec3bd8cecc
SHA5120807ec7515186f0a989bb667150a84ff3bebcc248625597ba0be3c6f07ad60d70cf8a3f65191436ec16042f446d4248bf92fcd02212e459405948db10f078b8e
-
Filesize
5.0MB
MD5123ad0908c76ccba4789c084f7a6b8d0
SHA186de58289c8200ed8c1fc51d5f00e38e32c1aad5
SHA2564e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43
SHA51280fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
774KB
MD54ff168aaa6a1d68e7957175c8513f3a2
SHA1782f886709febc8c7cebcec4d92c66c4d5dbcf57
SHA2562e4d35b681a172d3298caf7dc670451be7a8ba27c26446efc67470742497a950
SHA512c372b759b8c7817f2cbb78eccc5a42fa80bdd8d549965bd925a97c3eebdce0335fbfec3995430064dead0f4db68ebb0134eb686a0be195630c49f84b468113e3
-
Filesize
46KB
MD5113a209e8167ddd2da9b4b73ef0b0229
SHA1198b613a362b6432bd42a668ad27c744cde9c348
SHA2569470add15fae0be67f79d2abe2e9eefe6b573cc2254b688565161b8e7561e6ab
SHA512eda70a5f8af14a84d0c59e795c4df42af34b1ba6ea0185a01709d8f04a658f25f3f88164d1b9594c0e487963cdc3a02bc5bffd5e0976aa30813b359af78ace1f
-
Filesize
71KB
MD5e780c9eebe237208cd71987ac15d94e2
SHA1257da5d8a050ee2609b19b8e3e57601abc4d76ed
SHA2563a5a51c8fb2555f9d78886fd78c84eb62e3da342cd8c0f3f73929d82719bcd64
SHA512643372f0d5b2be441db6f21049aba350f21a8ed93a65159156dafd2c46d3eff9f3549ef7178775d32ba67ba552827ae866098a69004204906f48107fe373b6b8
-
Filesize
197KB
MD503493d1441671abe9339af942253dac3
SHA10d8800be2733bb56fb2909a6f9389c00eb00f612
SHA2563a4830342ab562e41ab93b4bc2dc45fe0ab760815e7c3ec4a7fddc914ec99982
SHA5121b092a9e2e9e64533e7436c239961cee4ffde0fa6fed4c6e0ca2a9f72fc72065d457968dc92e74f4e052cd2557f6d380a86046117b6a450306a16ac6e885a036
-
Filesize
70KB
MD5ad2c4784c3240063eeaa646fd59be62c
SHA15efab563725781ab38a511e3f26e0406d5d46e8d
SHA256c1de4bfe57dc4a5be8c72c865d617dc39dfd8162fcd2ce1fac9f401cf9efb504
SHA512c964d4289206d099310bd5299f71a32c643311e0e8445e35ae3179772136d0ca9b75f5271eaf31efc75c055cd438799cef836ed87797589629b0e9f247424676
-
Filesize
5.8MB
MD53aad23292404a7038eb07ce5a6348256
SHA135cac5479699b28549ebe36c1d064bfb703f0857
SHA25678b1dd211c0e66a0603df48da2c9b67a915ab3258701b9285d3faa255ed8dc25
SHA512f5b6ef04e744d2c98c1ef9402d7a8ce5cda3b008837cf2c37a8b6d0cd1b188ca46585a40b2db7acf019f67e6ced59eff5bc86e1aaf48d3c3b62fecf37f3aec6b
-
Filesize
31KB
MD562fe3761d24b53d98cc9b0cbbd0feb7c
SHA1317344c9edf2fcfa2b9bc248a18f6e6acedafffb
SHA25681f124b01a85882e362a42e94a13c0eff2f4ccd72d461821dc5457a789554413
SHA512a1d3da17937087af4e5980d908ed645d4ea1b5f3ebfab5c572417df064707cae1372b331c7096cc8e2e041db9315172806d3bc4bb425c6bb4d2fa55e00524881
-
Filesize
1.5MB
MD531a0332fa7a20a91e0ae0ee2e2b3e179
SHA1a26f8e51b200cc222ba8a8cc14df6926a577132a
SHA256afb50a080d3c79d9c89d134b006fb2b0779b5ffeeb703762d163141b15eb03bb
SHA512ebb50a5611b9e82161ab813acdc21d7bcb0b5d98587b67cc82a0fdd18df5a8415406e1a06c1c0a95e9eebff3909d6104756ff73ae965efc49ffff04ec4210e30
-
Filesize
695KB
MD543b8b61debbc6dd93124a00ddd922d8c
SHA15dee63d250ac6233aac7e462eee65c5326224f01
SHA2563f462ee6e7743a87e5791181936539642e3761c55de3de980a125f91fe21f123
SHA512dd4791045cf887e6722feae4442c38e641f19ec994a8eaf7667e9df9ea84378d6d718caf3390f92443f6bbf39840c150121bb6fa896c4badd3f78f1ffe4de19d
-
Filesize
94KB
MD58fb4a79b2c7cfe657adffff4c3d2859e
SHA13d44aeebb7de1789f04d89d221febf9fea4f27d2
SHA2561ddb9fc16b1afbb73e1415054dd13e187369b1d456ddcd31bd88bbd3e5006c3e
SHA5120a307a1ff593e86dd2c69f1a4aaf6de8d4ae5e9c4fab4353226e2853de7bc524d794ffa29c853694dd6c588803b26c1b801bb6b23712cfdea9f8eb26a2e2fba5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82