Analysis
-
max time kernel
899s -
max time network
896s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 13:00
Behavioral task
behavioral1
Sample
antivirus by emil v1.0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
antivirus by emil v1.0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
antivirus by emil v1.0.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
antivirus by emil v1.0.exe
-
Size
43KB
-
MD5
04b503df0753a8a4bf74035949215a47
-
SHA1
fde82e54526910d082a80853730969888d86befd
-
SHA256
81abb1776a5da5c7844a18f50a4f254eed232c6164b62e2a5fd69d4494c4b943
-
SHA512
4608a20bfb499bc6a0ca89cab7d080f76f3d7fb2c730492bfa6d7f6301bd50b24af7f228c6a1b5ac06f033c7367fb580279446407bfdad0004669dbdfeb82da2
-
SSDEEP
384:FZyd5ctOnwtOyW60GmciXEFdZBEk0z2I1zgIij+ZsNO3PlpJKkkjh/TzF7pWn3J8:PuqAwt/W6NmciXEF3p0zxuXQ/oI6+L
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
both-foundations.gl.at.ply.gg:60732
Microsoft Edge Updater
-
reg_key
Microsoft Edge Updater
-
splitter
|Hassan|
Signatures
-
Njrat family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java Update.exe MicrosoftEdgeUpdater.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java Update.exe MicrosoftEdgeUpdater.exe -
Executes dropped EXE 16 IoCs
pid Process 1752 MicrosoftEdgeUpdater.exe 2960 Server.exe 2992 Server.exe 1056 Server.exe 1292 Server.exe 1824 Server.exe 2580 Server.exe 292 Server.exe 3032 Server.exe 2116 Server.exe 1280 Server.exe 2072 Server.exe 2984 Server.exe 1312 Server.exe 1608 Server.exe 2220 Server.exe -
Loads dropped DLL 1 IoCs
pid Process 2912 antivirus by emil v1.0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antivirus by emil v1.0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eacae212c705744db1a5d9ba171c515a000000000200000000001066000000010000200000004c161695407fb0c749803c3d372044b0eb8c449a58678536b6825327e90aca00000000000e80000000020000200000002d27d23e69d89ac184556daf13d22cc31234c042e1fb8e22e7281054c3fca40020000000569e4f04bf2f5c515262ad3d06bfa85d6006051f74fca2d24509e3c730ec13ed400000003d6bb7ed7b7b2ef6f759a15008098ef8e81af894ee33e36a53d6294fe97efa594625e32c5cc8cc795b7d175a1563475b1f0bcfbde68b80f121d3e1aad8aee46a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9055ab0b725fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442243970" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34BD0141-CB65-11EF-9109-7694D31B45CA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2832 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 2912 antivirus by emil v1.0.exe 1752 MicrosoftEdgeUpdater.exe 1292 Server.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 1752 MicrosoftEdgeUpdater.exe Token: 33 1752 MicrosoftEdgeUpdater.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1820 iexplore.exe 2452 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1820 iexplore.exe 1820 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2912 wrote to memory of 1752 2912 antivirus by emil v1.0.exe 30 PID 2912 wrote to memory of 1752 2912 antivirus by emil v1.0.exe 30 PID 2912 wrote to memory of 1752 2912 antivirus by emil v1.0.exe 30 PID 2912 wrote to memory of 1752 2912 antivirus by emil v1.0.exe 30 PID 2912 wrote to memory of 1752 2912 antivirus by emil v1.0.exe 30 PID 2912 wrote to memory of 1752 2912 antivirus by emil v1.0.exe 30 PID 2912 wrote to memory of 1752 2912 antivirus by emil v1.0.exe 30 PID 1752 wrote to memory of 2832 1752 MicrosoftEdgeUpdater.exe 32 PID 1752 wrote to memory of 2832 1752 MicrosoftEdgeUpdater.exe 32 PID 1752 wrote to memory of 2832 1752 MicrosoftEdgeUpdater.exe 32 PID 1752 wrote to memory of 2832 1752 MicrosoftEdgeUpdater.exe 32 PID 2900 wrote to memory of 2960 2900 taskeng.exe 35 PID 2900 wrote to memory of 2960 2900 taskeng.exe 35 PID 2900 wrote to memory of 2960 2900 taskeng.exe 35 PID 2900 wrote to memory of 2960 2900 taskeng.exe 35 PID 1752 wrote to memory of 1820 1752 MicrosoftEdgeUpdater.exe 37 PID 1752 wrote to memory of 1820 1752 MicrosoftEdgeUpdater.exe 37 PID 1752 wrote to memory of 1820 1752 MicrosoftEdgeUpdater.exe 37 PID 1752 wrote to memory of 1820 1752 MicrosoftEdgeUpdater.exe 37 PID 1820 wrote to memory of 2448 1820 iexplore.exe 38 PID 1820 wrote to memory of 2448 1820 iexplore.exe 38 PID 1820 wrote to memory of 2448 1820 iexplore.exe 38 PID 1820 wrote to memory of 2448 1820 iexplore.exe 38 PID 2900 wrote to memory of 2992 2900 taskeng.exe 40 PID 2900 wrote to memory of 2992 2900 taskeng.exe 40 PID 2900 wrote to memory of 2992 2900 taskeng.exe 40 PID 2900 wrote to memory of 2992 2900 taskeng.exe 40 PID 2900 wrote to memory of 1056 2900 taskeng.exe 42 PID 2900 wrote to memory of 1056 2900 taskeng.exe 42 PID 2900 wrote to memory of 1056 2900 taskeng.exe 42 PID 2900 wrote to memory of 1056 2900 taskeng.exe 42 PID 2900 wrote to memory of 1292 2900 taskeng.exe 43 PID 2900 wrote to memory of 1292 2900 taskeng.exe 43 PID 2900 wrote to memory of 1292 2900 taskeng.exe 43 PID 2900 wrote to memory of 1292 2900 taskeng.exe 43 PID 2900 wrote to memory of 1824 2900 taskeng.exe 44 PID 2900 wrote to memory of 1824 2900 taskeng.exe 44 PID 2900 wrote to memory of 1824 2900 taskeng.exe 44 PID 2900 wrote to memory of 1824 2900 taskeng.exe 44 PID 2900 wrote to memory of 2580 2900 taskeng.exe 45 PID 2900 wrote to memory of 2580 2900 taskeng.exe 45 PID 2900 wrote to memory of 2580 2900 taskeng.exe 45 PID 2900 wrote to memory of 2580 2900 taskeng.exe 45 PID 2900 wrote to memory of 292 2900 taskeng.exe 46 PID 2900 wrote to memory of 292 2900 taskeng.exe 46 PID 2900 wrote to memory of 292 2900 taskeng.exe 46 PID 2900 wrote to memory of 292 2900 taskeng.exe 46 PID 2900 wrote to memory of 3032 2900 taskeng.exe 47 PID 2900 wrote to memory of 3032 2900 taskeng.exe 47 PID 2900 wrote to memory of 3032 2900 taskeng.exe 47 PID 2900 wrote to memory of 3032 2900 taskeng.exe 47 PID 2900 wrote to memory of 2116 2900 taskeng.exe 48 PID 2900 wrote to memory of 2116 2900 taskeng.exe 48 PID 2900 wrote to memory of 2116 2900 taskeng.exe 48 PID 2900 wrote to memory of 2116 2900 taskeng.exe 48 PID 2900 wrote to memory of 1280 2900 taskeng.exe 49 PID 2900 wrote to memory of 1280 2900 taskeng.exe 49 PID 2900 wrote to memory of 1280 2900 taskeng.exe 49 PID 2900 wrote to memory of 1280 2900 taskeng.exe 49 PID 2900 wrote to memory of 2072 2900 taskeng.exe 50 PID 2900 wrote to memory of 2072 2900 taskeng.exe 50 PID 2900 wrote to memory of 2072 2900 taskeng.exe 50 PID 2900 wrote to memory of 2072 2900 taskeng.exe 50 PID 2900 wrote to memory of 2984 2900 taskeng.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\antivirus by emil v1.0.exe"C:\Users\Admin\AppData\Local\Temp\antivirus by emil v1.0.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeUpdater.exe"C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeUpdater.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn Server /tr C:\Users\Admin\AppData\Local\Temp/Server.exe3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2832
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://meatspin.com/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {34ADF08B-CA39-4C67-A85A-25D3F9466341} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1056
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:1292
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1824
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:292
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3032
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1312
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1608
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2220
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD512124cb02954e7acbcbce6d1b75f3592
SHA1060cb5fa68929e274352ebb68a91311ac0319cc8
SHA256d6721daffb746919d10785e705763567f4456e52d4fbf8e5b1d77bb4ce7769e4
SHA512dbf35233a77cb95a2c92f2f5c6560d38c8ab88265ff333b805600dc52a0c60666cb1dc29801bf942d9c6541cca20c60494ff3e128be11060932d73ed81571063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507af24f4348234c4a6ed22cc41f2fcc6
SHA16d07680ea0a207d872af84f7b138627cbf22fab0
SHA256fc31fb96db8f17c90109ddd3a3f1ddab1595eba740ec2eccd2a0075838eef692
SHA512e327011eecb7ae6c78e80a47df7caf772bc6a6ff7a1d225d06affc936c6fc75f15d4430d1c2ee385885632518c3287c9e43613568f3166d65c347d45e7bddd4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b1853b37f1a7460e2e0eba1536490dd
SHA191cb12baeb31dbded88613dfc77bdf4b2dfdfc20
SHA256e3b4ed9cb453ea737a92ac4ac5d7732248b8691d0946586065c94889ea0a52e7
SHA5129990985f3c17db496d2c22c6b98af2b66529185c3f7f9eb610da15ed4a98ab062015a00b9b5191a3549e0333da2e4e9179c47de227a36c2cc63ea6d3a445f0b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5021da21a3df222359e56659377d6cc3c
SHA12285e5a98208a9d6cd84fe8d2699fa15567ec182
SHA256ef0e6147dc85ff7018f9637f78fc9bcc3cc2befe3f7bebfbc57abbe9df3f4a6e
SHA5129bf273ba741839469549215003a087f1d4c62147ad20fe6bdbf15705d826fd7bf5379115df8b2042071b00203ef78a86d1a7ad34f8d0d88f99aa6bfa17543352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5c028393737d99324b439330c96d4c1
SHA16b3ace4a688256e11460f5e26dd83cf7bee13b57
SHA256696f3e2f05ac593e37e248fa016896b1fbf934534e7da5b025015578934dc887
SHA512b626c0b71a3009a728b6c6da76f2b16e916b470093b275195cb73810859b9b6c99fbd4c17458eeedbfb84beec8f8cfedd0255385f03df191998ade3d2a8e205e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a46df1c7ac052cd59bc3bc11d1c1f3f8
SHA19c1a07014be4faf6226af88968528c5ee67b04fe
SHA2561fb206f51c233dd853509061c1cd5773eb8d31cb2885636e44c3533b3ff8597b
SHA512aaea5bbb3b6c21fa26f86f42c1d8da583cf13efc8333c036ca675461728774c8dc07612123de00772b9fd040def29da063ea78aed70a0490476595ceea789fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d7aa47de6da355dce1a1ad1570640e4
SHA1a191f781ff22660c2a746f0eed5bece2f8ebbd18
SHA25604f8ca7908a607234cd149d7bce03806fbe885fa0c791e41a798a420389d0b0d
SHA51276e0c3f9565fcca2d761a6c71207c3e8c709db5e39fc07a8608597bdc11e1b8e14bae2c7cbe6d38dc3634c1e2681e053f502ac457d8ea78a7edfd95f19094695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50619b75e0987c6b977821c0778a01553
SHA1631931e826ca3899b3380db3ae53b69231ab651b
SHA256cffac679c2ed3e2c1e9e8fab9a161a75567976c2bf946de0f0b6323443c54abb
SHA512893599777b36a30bc5b718374d39ab0db0299cc16738ec7932af8a8fcb55b21ebaff21fd6d9cd7385c099303ae081911cf3c0ba27ef2b8046eafcdc6c4cd9cad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d0082e09d834a10a1f67a89213ae127
SHA1d80aa2d15a2f827a683b71381ee1f9d2fef46cae
SHA25623ea3ec67e40263acf17562a14716140c9a9d36b78641589b4cb6447193c769c
SHA5124b6bba55cbc1e8903c2f07d3e3dca94d48ca60ff635419ea25da46c0e81b797f5f3fa5485f1a550b09c5b4bd178b0f2354ff1a44e03d21ab1700bcd0b92581ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cab445a46ee5570bd8d251b386a52d3
SHA1320df28f90c8ab543ebd5c633264826b0ea748b8
SHA256ffca2ac7c38dd57c54e99fabfee87b72d58b59abeef46b06f3241f660cfabdc5
SHA512a2cbcd0cbe4da00a6fa3d66ef66db7e42c8a3701a35f4865a06c840a62e2662f4c1263c0f62a317539e5ad6f0bea07b8c5fe6f0de2bb31a8bcae8b50b3c3e4c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec82acb77f358c95fa484d0c8f1e0528
SHA170abd0dfef879952ac07325ad1248d4ce284aeb9
SHA2567feb815e3329acd4f086a06f50b68823513aa448d1e3f3186f5908343f945002
SHA5120c604fb198f122a91854d3deebd75d614b1b33b65e1b45623045d7bca87a18ffc6b6e779bee4c5f9ba64d40f713a2c793b64a3646b5098e01949c3edf0d81a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5eeef19f95b0153f7923bb93683b8a0
SHA1b9852922f228251df7ce430810d3e440f448d7ce
SHA256d15296936a8dd90b36f2655167feef0e683ca0696c36150389ee5b250a042c34
SHA5121106ebb3eadd62a54e406a30accb97887a5e702c706ad1444eabd9d04ce3bd31b3d744b1b9e670938505046f02a4a05d9c9a496554d2210b8df9270e04bda220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d53e2611836619a60520ffa9b231ee7d
SHA1d02da67e2d72fe4f987dae963da42e44a17de8b0
SHA256c26d8687fafba1f9fee692e60606326d8a096958466429a5a04ce5ecea93dc52
SHA512dd9c97e6e1e1789b9e0307e7f8da616e15505af369487ff7ec212987e38c3f4a1e077109bd21d13cc74dabafe0ca5e82efce0ddc0334ff1e55ac322db14cb290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53680c5a611fa4cbbd3eb6a38befb9e24
SHA12fbe03d9382d47b413b3d2ac16e252092c8405f5
SHA2565b4208e2ef2283072e7788ce3236deda961274bda09128a64e20589dd19336f6
SHA512c1341f0eaa987f9cc20284566e2ad33298c8a439be797f9626ea414a815f64a57d33737465619db6b156bad3211853d0c6cd0d0b4d4747d2b16959756c2478a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfe2aabbd9dd1d6367e05ccb226c752a
SHA1b8975a10f154420de6a6369fa609b940a463b064
SHA25697db9a71bb0101b1cf71132ccda5dd3d6ec4a4a7640b30cc454bfa936b5c58d2
SHA5123d6f34dcbb150fc223cbe5d72f1d34939d8cce8ed310d6999bee7b50d9c83222771e7a7971a97645480568e2bdf4d7c6fcdbde15bbbf2962ea50a2885316fb28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5065ea484339fce48e07b7b16bbc0ec17
SHA10ded5f433fabf86bcd579b1e8a3017c3cbb44db2
SHA25623d0f30f0eac261fddd356c919e0384bbd33bafeec5dd3a94f811025c23e4da2
SHA512e151366cba9e01d5814f1672a43eec450c4f3f51bd3670fea6fb3824f1af69f30dfb6ba4f64d65e6690b0d908ee52218b63e55f5c122f6886cdceba9f3eb1c06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e77392f9270074391e8d1b36b3d4029
SHA18ddb394a252c9f55b2a6b9a31d3659b7df775fec
SHA256caf0bf891132e7e36e51d9d809eb761c084765f6800cdde35acb5617c6a5a80c
SHA51205d1a675220d48d5e178a643605705ec8654d0b06c2bd5006aa2046b09b959e91fb9dc904fbcc65f6203b99a74685dce4cb1db56cb4466111716697f5228d96d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512fca481ab2d48030f0c2d6684b9e7f8
SHA1959ff3e92b8213c9ed28275287acb30ea2372de6
SHA256dd1020ad445f33d4d7f31caa9dda59b295c4f82bed168656ba39fd79473041a2
SHA51280ab9273f28d541746d0a5870c0eb55039b70df7f1afc833c0c5c135ffc16d02bb06b39cf50dfb7d6a6b4c8c964b22ce5c63e8b919dd3b81c62d283d80c66430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fafb85924aaa110dc72a5d6b83bb2c0b
SHA1b4323fb04a3a771b058a38baa914761ccf792bf2
SHA25644a3e1eed92f85fd1825fb26095d128e887c7bb824d597bccb869b25a5644d34
SHA512b31f0bdb7d0dad2cc043b67187cfc5e4f6558fe0b47958dac70f91f611f196c3582d07fb48ced34e16c6c47d3449ed1b89e381653bccd5e08048f52d95c4e9dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58caf9dde3cf3f7d5e4794c2c89e3b541
SHA1b66bf03168d2ecd01893795ddeccebab7ba9eaf3
SHA256fefb55a1942a53991efd878d0adbf01d0d9ec01f0ec2bc56b45fd1e6c498deb0
SHA5122b500af2f1aeb6c8a11fd6cd9ae580212371e64d419b71e2138f8b8f09d63171ca2146389a83895d42a00a3987d18834ba1fc8579052a94466ce7a12fcab3b7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53f5eacfcd516d47a434be82346597460
SHA1a68938454a1312d55cc9b734efb88cfab0c7aea4
SHA256b9fe9d75ba2f2e2cacf85792e626d65a5149dec7848359be43d8f3af22906249
SHA51253c46306447d45db03930f23cff5bf8f9619155e4346ec6ee1a7bca7ea59972fcc5057f46638007fb3b5c68fc3e0ba478c8785b266acb674ee7d1c16cc9b3915
-
Filesize
76KB
MD5f1ed2a0d6c1fc0e47943bd2fd7f37c5e
SHA1a1acda91022667db1af5d07a79849dcd35220e24
SHA256a28dfd7051102d4bfa464a7fa2ee0304eea3883bbf64335fd86f84e2f91d33e1
SHA512ada9c4c1042bbaa13bcc51deb37693518403b24ef426cb5c0423de7cb5f4d4c9f9473508306bd9803e1108b15f26fe262fd91adbf3b1db253873715552892ca9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
43KB
MD504b503df0753a8a4bf74035949215a47
SHA1fde82e54526910d082a80853730969888d86befd
SHA25681abb1776a5da5c7844a18f50a4f254eed232c6164b62e2a5fd69d4494c4b943
SHA5124608a20bfb499bc6a0ca89cab7d080f76f3d7fb2c730492bfa6d7f6301bd50b24af7f228c6a1b5ac06f033c7367fb580279446407bfdad0004669dbdfeb82da2