Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2025, 04:12
Behavioral task
behavioral1
Sample
e6e5144ce070b80d64aa6a62bf83668f261c7682323f2c2abecfa343d014203a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e6e5144ce070b80d64aa6a62bf83668f261c7682323f2c2abecfa343d014203a.exe
Resource
win10v2004-20241007-en
General
-
Target
e6e5144ce070b80d64aa6a62bf83668f261c7682323f2c2abecfa343d014203a.exe
-
Size
4.1MB
-
MD5
29b59242ea878d117e0389094278d0f4
-
SHA1
b9aa71a9f97f0581d67f5ba23ee12164b4e83bcd
-
SHA256
e6e5144ce070b80d64aa6a62bf83668f261c7682323f2c2abecfa343d014203a
-
SHA512
80b1d3b168adef6d9e70f00f835c3f2423c70e6ea52a536bcaed6b70ae7854e4e1e7162f0860b60d55798a59663b1e0a450a5547666ae0185e2e5965a461b586
-
SSDEEP
49152:BTKkbhzMBKb1I4ggzs4EdmKyHZfLkg6BcixT:7rzsBdaHZzABcix
Malware Config
Extracted
darkvision
powercycle.ddns.net
Signatures
-
DarkVision Rat
DarkVision Rat is a trojan written in C++.
-
Darkvision family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4556 powershell.exe 3892 powershell.exe -
Checks BIOS information in registry 2 TTPs 64 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e6e5144ce070b80d64aa6a62bf83668f261c7682323f2c2abecfa343d014203a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e6e5144ce070b80d64aa6a62bf83668f261c7682323f2c2abecfa343d014203a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrorne.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrorne.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cmd.exe -
Drops startup file 31 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 3924 chrorne.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4556 powershell.exe 4556 powershell.exe 3892 powershell.exe 3892 powershell.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe 3924 chrorne.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4556 powershell.exe Token: SeDebugPrivilege 3892 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4012 wrote to memory of 2364 4012 e6e5144ce070b80d64aa6a62bf83668f261c7682323f2c2abecfa343d014203a.exe 82 PID 4012 wrote to memory of 2364 4012 e6e5144ce070b80d64aa6a62bf83668f261c7682323f2c2abecfa343d014203a.exe 82 PID 4012 wrote to memory of 3924 4012 e6e5144ce070b80d64aa6a62bf83668f261c7682323f2c2abecfa343d014203a.exe 84 PID 4012 wrote to memory of 3924 4012 e6e5144ce070b80d64aa6a62bf83668f261c7682323f2c2abecfa343d014203a.exe 84 PID 2364 wrote to memory of 4556 2364 cmd.exe 85 PID 2364 wrote to memory of 4556 2364 cmd.exe 85 PID 3924 wrote to memory of 2712 3924 chrorne.exe 86 PID 3924 wrote to memory of 2712 3924 chrorne.exe 86 PID 3924 wrote to memory of 1844 3924 chrorne.exe 87 PID 3924 wrote to memory of 1844 3924 chrorne.exe 87 PID 2712 wrote to memory of 3892 2712 cmd.exe 89 PID 2712 wrote to memory of 3892 2712 cmd.exe 89 PID 3924 wrote to memory of 4744 3924 chrorne.exe 92 PID 3924 wrote to memory of 4744 3924 chrorne.exe 92 PID 3924 wrote to memory of 3144 3924 chrorne.exe 96 PID 3924 wrote to memory of 3144 3924 chrorne.exe 96 PID 3924 wrote to memory of 872 3924 chrorne.exe 100 PID 3924 wrote to memory of 872 3924 chrorne.exe 100 PID 3924 wrote to memory of 4420 3924 chrorne.exe 101 PID 3924 wrote to memory of 4420 3924 chrorne.exe 101 PID 3924 wrote to memory of 4556 3924 chrorne.exe 102 PID 3924 wrote to memory of 4556 3924 chrorne.exe 102 PID 3924 wrote to memory of 3136 3924 chrorne.exe 105 PID 3924 wrote to memory of 3136 3924 chrorne.exe 105 PID 3924 wrote to memory of 4768 3924 chrorne.exe 107 PID 3924 wrote to memory of 4768 3924 chrorne.exe 107 PID 3924 wrote to memory of 4976 3924 chrorne.exe 108 PID 3924 wrote to memory of 4976 3924 chrorne.exe 108 PID 3924 wrote to memory of 5044 3924 chrorne.exe 110 PID 3924 wrote to memory of 5044 3924 chrorne.exe 110 PID 3924 wrote to memory of 4448 3924 chrorne.exe 111 PID 3924 wrote to memory of 4448 3924 chrorne.exe 111 PID 3924 wrote to memory of 4168 3924 chrorne.exe 112 PID 3924 wrote to memory of 4168 3924 chrorne.exe 112 PID 3924 wrote to memory of 3860 3924 chrorne.exe 114 PID 3924 wrote to memory of 3860 3924 chrorne.exe 114 PID 3924 wrote to memory of 2724 3924 chrorne.exe 115 PID 3924 wrote to memory of 2724 3924 chrorne.exe 115 PID 3924 wrote to memory of 3888 3924 chrorne.exe 116 PID 3924 wrote to memory of 3888 3924 chrorne.exe 116 PID 3924 wrote to memory of 2796 3924 chrorne.exe 118 PID 3924 wrote to memory of 2796 3924 chrorne.exe 118 PID 3924 wrote to memory of 2112 3924 chrorne.exe 119 PID 3924 wrote to memory of 2112 3924 chrorne.exe 119 PID 3924 wrote to memory of 5000 3924 chrorne.exe 120 PID 3924 wrote to memory of 5000 3924 chrorne.exe 120 PID 3924 wrote to memory of 1152 3924 chrorne.exe 122 PID 3924 wrote to memory of 1152 3924 chrorne.exe 122 PID 3924 wrote to memory of 3660 3924 chrorne.exe 123 PID 3924 wrote to memory of 3660 3924 chrorne.exe 123 PID 3924 wrote to memory of 732 3924 chrorne.exe 124 PID 3924 wrote to memory of 732 3924 chrorne.exe 124 PID 3924 wrote to memory of 1460 3924 chrorne.exe 126 PID 3924 wrote to memory of 1460 3924 chrorne.exe 126 PID 3924 wrote to memory of 3952 3924 chrorne.exe 127 PID 3924 wrote to memory of 3952 3924 chrorne.exe 127 PID 3924 wrote to memory of 2572 3924 chrorne.exe 128 PID 3924 wrote to memory of 2572 3924 chrorne.exe 128 PID 3924 wrote to memory of 4192 3924 chrorne.exe 130 PID 3924 wrote to memory of 4192 3924 chrorne.exe 130 PID 3924 wrote to memory of 1180 3924 chrorne.exe 131 PID 3924 wrote to memory of 1180 3924 chrorne.exe 131 PID 3924 wrote to memory of 2700 3924 chrorne.exe 132 PID 3924 wrote to memory of 2700 3924 chrorne.exe 132
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6e5144ce070b80d64aa6a62bf83668f261c7682323f2c2abecfa343d014203a.exe"C:\Users\Admin\AppData\Local\Temp\e6e5144ce070b80d64aa6a62bf83668f261c7682323f2c2abecfa343d014203a.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\chrorne'2⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\chrorne'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
-
C:\ProgramData\chrorne\chrorne.exe"C:\ProgramData\chrorne\chrorne.exe" {9D456E31-1E28-47E3-847E-20C485996C8D}2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\chrorne'3⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\chrorne'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3892
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:1844
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:4744
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:3144
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:872
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:4420
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:4556
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:3136
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:4768
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:4976
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:5044
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:4448
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:4168
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:3860
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:2724
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:3888
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:2796
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:2112
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:5000
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:1152
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:3660
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:732
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:1460
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:3952
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:2572
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:4192
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:1180
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:2700
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:468
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:1280
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:4228
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
PID:5092
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD529b59242ea878d117e0389094278d0f4
SHA1b9aa71a9f97f0581d67f5ba23ee12164b4e83bcd
SHA256e6e5144ce070b80d64aa6a62bf83668f261c7682323f2c2abecfa343d014203a
SHA51280b1d3b168adef6d9e70f00f835c3f2423c70e6ea52a536bcaed6b70ae7854e4e1e7162f0860b60d55798a59663b1e0a450a5547666ae0185e2e5965a461b586
-
Filesize
101B
MD564c2ae69cfebd2efcc675e9ca1b22a36
SHA1e598a5781331c7f70fe41149baf2043fefb02751
SHA256d971064c85772ff980bec4d9b49bf87c49bffd9a56baa136d543d30b03e1dfb9
SHA512d83bdc8473288b5f9f14eaa5b9567f50a65847689223a8515f3234c810426bb1e007e368202d96dd1a39023e2150807dc611dc143c62d2cea916ee7fcda17c67
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5fd9152fd0fab56908fe168af91a08303
SHA1e4e64d449aaae4e5cda388fc492ff8ee0878af24
SHA256a78dca0d470c353064c51dbe58a9bf408c188b65d44636759aace9011f5b482e
SHA512c29093187dcc35ba79e20c11a00ad4063cb81bf7b0bc269f3aee66f583ebece5821cf1ac8748e49247a8eb0eccf4e47f5eb4c1f8577327d8a754a807d5a4aa16
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk
Filesize1KB
MD5d2260c1d78a298c18b870ef020a6d16e
SHA169a444b0a2702b89fbf832b0f5ec5568a9dfd0ac
SHA256029d08cc3004070eea84e5fd1b3c00a28e2e734e5433e2276103e45e982bec2d
SHA5129718037e60450f13daae2dbd8e2753ae2b97424f8e95ed607f34837ee4d5d2e76e2ede9cebc465332f06b0503ec6b92ba1c7e485765e528dcf7da7f294cca05a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk
Filesize1KB
MD5550f7f3deabaf706a80a6b431ee344a5
SHA158358374787c4d49d33837ff4270859fe0350c6f
SHA256054515db0844d82f725fd45dcb557f33eb0340656b8f57e873ea3da643a095ad
SHA51215f7f288ce76e834ed62e8a152c9a0bd4a44e6841639c4121405ae594d759294023ca375be2e5dfe7b4a0a0832fcf62ab08e3729fa124bcf06b39656cc17f376
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\{AB869290-F5C3-42C8-9BFD-23D2E0B0C4FB}.lnk
Filesize1KB
MD5a0d7dbb392ca8dd1424b69fee0e4a036
SHA1aa1cd06475221ff40654680f079348e232133632
SHA2561ce48af629a697fec1e4df5c0ed8d92f0b5cf7e24fcb4b6e39d30a79da7de7d5
SHA512a062124a5c73c7f2a81cd4c487bd9ce4345bd9e19646bdc214b40abc4ad0e4c8c35ba324d9bbd3681b39f5cdba2a28bd2ddfeabe0b7e0dcb0462db6c9be8e06c