Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 17:18
Static task
static1
Behavioral task
behavioral1
Sample
9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe
Resource
win7-20240903-en
General
-
Target
9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe
-
Size
759KB
-
MD5
ab5e0c9fbbf7cd002742a751c290a0c0
-
SHA1
ef61e32aadd9ebfc674c4f951c860f2d952b639d
-
SHA256
9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821
-
SHA512
7e79dae7dc598113d4488d7b2460c174284b4b0ad530c49a091d987c1c42c323edb769c030510613023c569924f5036878a133f8dd81050f17ae3c15bcd5f2f8
-
SSDEEP
12288:qM3iXBPCO36urpV5HODRH0xh9W1gx7K8hiz1v8hvwxUj1ShwONxyibDwdB:oqEdTE0X9WSxG8IZv8hI21ShFNxyoMj
Malware Config
Extracted
darkcomet
MusicAGO
mantrust.noip.me:3013
DC_MUTEX-80DX6FJ
-
gencode
5GYC98Amy0Ur
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation SamSs.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation takshost.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation SamSs.exe -
Executes dropped EXE 6 IoCs
pid Process 2096 wmiApSrv.exe 5040 SamSs.exe 1364 wmiApSrv.exe 4468 wmiApSrv.exe 1728 SamSs.exe 2492 wmiApSrv.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/files/0x000a000000023b67-17.dat agile_net -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\WMI Performance Adapter = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft FxCop\\wmiApSrv.exe" wmiApSrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\WMI Performance Adapter = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft FxCop\\wmiApSrv.exe" wmiApSrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\WMI Performance Adapter = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft FxCop\\wmiApSrv.exe" wmiApSrv.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1208 set thread context of 392 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 97 PID 5040 set thread context of 2544 5040 SamSs.exe 106 PID 4336 set thread context of 4232 4336 takshost.exe 108 PID 1728 set thread context of 460 1728 SamSs.exe 111 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiApSrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiApSrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SamSs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiApSrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SamSs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takshost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiApSrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe Token: SeIncreaseQuotaPrivilege 392 AppLaunch.exe Token: SeSecurityPrivilege 392 AppLaunch.exe Token: SeTakeOwnershipPrivilege 392 AppLaunch.exe Token: SeLoadDriverPrivilege 392 AppLaunch.exe Token: SeSystemProfilePrivilege 392 AppLaunch.exe Token: SeSystemtimePrivilege 392 AppLaunch.exe Token: SeProfSingleProcessPrivilege 392 AppLaunch.exe Token: SeIncBasePriorityPrivilege 392 AppLaunch.exe Token: SeCreatePagefilePrivilege 392 AppLaunch.exe Token: SeBackupPrivilege 392 AppLaunch.exe Token: SeRestorePrivilege 392 AppLaunch.exe Token: SeShutdownPrivilege 392 AppLaunch.exe Token: SeDebugPrivilege 392 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 392 AppLaunch.exe Token: SeChangeNotifyPrivilege 392 AppLaunch.exe Token: SeRemoteShutdownPrivilege 392 AppLaunch.exe Token: SeUndockPrivilege 392 AppLaunch.exe Token: SeManageVolumePrivilege 392 AppLaunch.exe Token: SeImpersonatePrivilege 392 AppLaunch.exe Token: SeCreateGlobalPrivilege 392 AppLaunch.exe Token: 33 392 AppLaunch.exe Token: 34 392 AppLaunch.exe Token: 35 392 AppLaunch.exe Token: 36 392 AppLaunch.exe Token: SeDebugPrivilege 2096 wmiApSrv.exe Token: SeDebugPrivilege 5040 SamSs.exe Token: SeIncreaseQuotaPrivilege 2544 AppLaunch.exe Token: SeSecurityPrivilege 2544 AppLaunch.exe Token: SeTakeOwnershipPrivilege 2544 AppLaunch.exe Token: SeLoadDriverPrivilege 2544 AppLaunch.exe Token: SeSystemProfilePrivilege 2544 AppLaunch.exe Token: SeSystemtimePrivilege 2544 AppLaunch.exe Token: SeProfSingleProcessPrivilege 2544 AppLaunch.exe Token: SeIncBasePriorityPrivilege 2544 AppLaunch.exe Token: SeCreatePagefilePrivilege 2544 AppLaunch.exe Token: SeBackupPrivilege 2544 AppLaunch.exe Token: SeRestorePrivilege 2544 AppLaunch.exe Token: SeShutdownPrivilege 2544 AppLaunch.exe Token: SeDebugPrivilege 2544 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 2544 AppLaunch.exe Token: SeChangeNotifyPrivilege 2544 AppLaunch.exe Token: SeRemoteShutdownPrivilege 2544 AppLaunch.exe Token: SeUndockPrivilege 2544 AppLaunch.exe Token: SeManageVolumePrivilege 2544 AppLaunch.exe Token: SeImpersonatePrivilege 2544 AppLaunch.exe Token: SeCreateGlobalPrivilege 2544 AppLaunch.exe Token: 33 2544 AppLaunch.exe Token: 34 2544 AppLaunch.exe Token: 35 2544 AppLaunch.exe Token: 36 2544 AppLaunch.exe Token: SeDebugPrivilege 4336 takshost.exe Token: SeIncreaseQuotaPrivilege 4232 AppLaunch.exe Token: SeSecurityPrivilege 4232 AppLaunch.exe Token: SeTakeOwnershipPrivilege 4232 AppLaunch.exe Token: SeLoadDriverPrivilege 4232 AppLaunch.exe Token: SeSystemProfilePrivilege 4232 AppLaunch.exe Token: SeSystemtimePrivilege 4232 AppLaunch.exe Token: SeProfSingleProcessPrivilege 4232 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4232 AppLaunch.exe Token: SeCreatePagefilePrivilege 4232 AppLaunch.exe Token: SeBackupPrivilege 4232 AppLaunch.exe Token: SeRestorePrivilege 4232 AppLaunch.exe Token: SeShutdownPrivilege 4232 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 392 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1208 wrote to memory of 392 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 97 PID 1208 wrote to memory of 392 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 97 PID 1208 wrote to memory of 392 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 97 PID 1208 wrote to memory of 392 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 97 PID 1208 wrote to memory of 392 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 97 PID 1208 wrote to memory of 392 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 97 PID 1208 wrote to memory of 392 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 97 PID 1208 wrote to memory of 392 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 97 PID 1208 wrote to memory of 392 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 97 PID 1208 wrote to memory of 392 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 97 PID 1208 wrote to memory of 392 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 97 PID 1208 wrote to memory of 392 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 97 PID 1208 wrote to memory of 2096 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 98 PID 1208 wrote to memory of 2096 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 98 PID 1208 wrote to memory of 2096 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 98 PID 2096 wrote to memory of 5040 2096 wmiApSrv.exe 103 PID 2096 wrote to memory of 5040 2096 wmiApSrv.exe 103 PID 2096 wrote to memory of 5040 2096 wmiApSrv.exe 103 PID 1208 wrote to memory of 4336 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 105 PID 1208 wrote to memory of 4336 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 105 PID 1208 wrote to memory of 4336 1208 9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe 105 PID 5040 wrote to memory of 2544 5040 SamSs.exe 106 PID 5040 wrote to memory of 2544 5040 SamSs.exe 106 PID 5040 wrote to memory of 2544 5040 SamSs.exe 106 PID 5040 wrote to memory of 2544 5040 SamSs.exe 106 PID 5040 wrote to memory of 2544 5040 SamSs.exe 106 PID 5040 wrote to memory of 2544 5040 SamSs.exe 106 PID 5040 wrote to memory of 2544 5040 SamSs.exe 106 PID 5040 wrote to memory of 2544 5040 SamSs.exe 106 PID 5040 wrote to memory of 2544 5040 SamSs.exe 106 PID 5040 wrote to memory of 2544 5040 SamSs.exe 106 PID 5040 wrote to memory of 2544 5040 SamSs.exe 106 PID 5040 wrote to memory of 2544 5040 SamSs.exe 106 PID 5040 wrote to memory of 1364 5040 SamSs.exe 107 PID 5040 wrote to memory of 1364 5040 SamSs.exe 107 PID 5040 wrote to memory of 1364 5040 SamSs.exe 107 PID 4336 wrote to memory of 4232 4336 takshost.exe 108 PID 4336 wrote to memory of 4232 4336 takshost.exe 108 PID 4336 wrote to memory of 4232 4336 takshost.exe 108 PID 4336 wrote to memory of 4232 4336 takshost.exe 108 PID 4336 wrote to memory of 4232 4336 takshost.exe 108 PID 4336 wrote to memory of 4232 4336 takshost.exe 108 PID 4336 wrote to memory of 4232 4336 takshost.exe 108 PID 4336 wrote to memory of 4232 4336 takshost.exe 108 PID 4336 wrote to memory of 4232 4336 takshost.exe 108 PID 4336 wrote to memory of 4232 4336 takshost.exe 108 PID 4336 wrote to memory of 4232 4336 takshost.exe 108 PID 4336 wrote to memory of 4232 4336 takshost.exe 108 PID 4336 wrote to memory of 4468 4336 takshost.exe 109 PID 4336 wrote to memory of 4468 4336 takshost.exe 109 PID 4336 wrote to memory of 4468 4336 takshost.exe 109 PID 4468 wrote to memory of 1728 4468 wmiApSrv.exe 110 PID 4468 wrote to memory of 1728 4468 wmiApSrv.exe 110 PID 4468 wrote to memory of 1728 4468 wmiApSrv.exe 110 PID 1728 wrote to memory of 460 1728 SamSs.exe 111 PID 1728 wrote to memory of 460 1728 SamSs.exe 111 PID 1728 wrote to memory of 460 1728 SamSs.exe 111 PID 1728 wrote to memory of 460 1728 SamSs.exe 111 PID 1728 wrote to memory of 460 1728 SamSs.exe 111 PID 1728 wrote to memory of 460 1728 SamSs.exe 111 PID 1728 wrote to memory of 460 1728 SamSs.exe 111 PID 1728 wrote to memory of 460 1728 SamSs.exe 111 PID 1728 wrote to memory of 460 1728 SamSs.exe 111 PID 1728 wrote to memory of 460 1728 SamSs.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe"C:\Users\Admin\AppData\Local\Temp\9b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:392
-
-
C:\Users\Admin\AppData\Roaming\Microsoft FxCop\wmiApSrv.exe"C:\Users\Admin\AppData\Roaming\Microsoft FxCop\wmiApSrv.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Roaming\Microsoft FxCop\SamSs.exe"C:\Users\Admin\AppData\Roaming\Microsoft FxCop\SamSs.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Users\Admin\AppData\Roaming\Microsoft FxCop\wmiApSrv.exe"C:\Users\Admin\AppData\Roaming\Microsoft FxCop\wmiApSrv.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1364
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\takshost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\takshost.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
C:\Users\Admin\AppData\Roaming\Microsoft FxCop\wmiApSrv.exe"C:\Users\Admin\AppData\Roaming\Microsoft FxCop\wmiApSrv.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Roaming\Microsoft FxCop\SamSs.exe"C:\Users\Admin\AppData\Roaming\Microsoft FxCop\SamSs.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"5⤵
- System Location Discovery: System Language Discovery
PID:460
-
-
C:\Users\Admin\AppData\Roaming\Microsoft FxCop\wmiApSrv.exe"C:\Users\Admin\AppData\Roaming\Microsoft FxCop\wmiApSrv.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2492
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
319B
MD5824ba7b7eed8b900a98dd25129c4cd83
SHA154478770b2158000ef365591d42977cb854453a1
SHA256d182dd648c92e41cd62dccc65f130c07f0a96c03b32f907c3d1218e9aa5bda03
SHA512ae4f3a9673711ecb6cc5d06874c587341d5094803923b53b6e982278fa64549d7acf866de165e23750facd55da556b6794c0d32f129f4087529c73acd4ffb11e
-
Filesize
224B
MD5c19eb8c8e7a40e6b987f9d2ee952996e
SHA16fc3049855bc9100643e162511673c6df0f28bfb
SHA256677e9e30350df17e2bc20fa9f7d730e9f7cc6e870d6520a345f5f7dc5b31f58a
SHA512860713b4a787c2189ed12a47d4b68b60ac00c7a253cae52dd4eb9276dacafeae3a81906b6d0742c8ecfdfaa255777c445beb7c2a532f3c677a9903237ac97596
-
Filesize
759KB
MD5ab5e0c9fbbf7cd002742a751c290a0c0
SHA1ef61e32aadd9ebfc674c4f951c860f2d952b639d
SHA2569b476881db7aef7dbedcce78017129b37667ea282d0c99566a38cfa94e343821
SHA5127e79dae7dc598113d4488d7b2460c174284b4b0ad530c49a091d987c1c42c323edb769c030510613023c569924f5036878a133f8dd81050f17ae3c15bcd5f2f8
-
Filesize
18KB
MD597235ac11c44acda447e9b8b393ae1da
SHA1370e8a69c78e677dfccc40aceb7238cd8b8596eb
SHA25610017309dab7a06278fdac82ee487e63b2f6ea4ec1309e2e31928d1323885698
SHA512ff44929eaed0ef767122f065071c1030f5987835e17fbe516898c724b4beffee9f827e3378b552480f07629aa76dc1a1370b8ede5edb8f6bdb7b22245d044f0b