Resubmissions
09-01-2025 19:49
250109-yjtbhs1nck 1009-01-2025 19:48
250109-yjlaxa1nbq 309-01-2025 18:48
250109-xf75tszlcj 1009-01-2025 18:45
250109-xeef5azkfp 1009-01-2025 18:34
250109-w7sc1szjak 1009-01-2025 18:31
250109-w54y2axkf1 1003-01-2025 17:08
250103-vntw3atqdt 1003-01-2025 15:27
250103-svv2latmgr 1003-01-2025 15:23
250103-sslp5stlhk 10Analysis
-
max time kernel
111s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 18:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Intestio/XWorm-RAT/releases/tag/xworm
Resource
win10v2004-20241007-en
General
-
Target
https://github.com/Intestio/XWorm-RAT/releases/tag/xworm
Malware Config
Extracted
gurcu
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb)%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%84%20-%20BrowserDownloads.txt%20(0.21%20kb
Signatures
-
Gurcu family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Command Reciever.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation conhost.exe -
Executes dropped EXE 2 IoCs
pid Process 3784 Command Reciever.exe 808 conhost.exe -
Loads dropped DLL 2 IoCs
pid Process 3784 Command Reciever.exe 808 conhost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeUpdate\\conhost.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 84 raw.githubusercontent.com 92 raw.githubusercontent.com 83 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 80 ip-api.com -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3764 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XWorm RAT V2.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Command Reciever.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Command Reciever.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Command Reciever.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4560 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1364 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3088 msedge.exe 3088 msedge.exe 2352 msedge.exe 2352 msedge.exe 3256 identity_helper.exe 3256 identity_helper.exe 3452 msedge.exe 3452 msedge.exe 3784 Command Reciever.exe 3784 Command Reciever.exe 3784 Command Reciever.exe 3784 Command Reciever.exe 3784 Command Reciever.exe 3784 Command Reciever.exe 3784 Command Reciever.exe 3784 Command Reciever.exe 3784 Command Reciever.exe 3784 Command Reciever.exe 3784 Command Reciever.exe 3784 Command Reciever.exe 3784 Command Reciever.exe 3784 Command Reciever.exe 3784 Command Reciever.exe 3784 Command Reciever.exe 3784 Command Reciever.exe 3784 Command Reciever.exe 3784 Command Reciever.exe 3784 Command Reciever.exe 2136 Command Reciever.exe 2136 Command Reciever.exe 2136 Command Reciever.exe 2136 Command Reciever.exe 2136 Command Reciever.exe 2136 Command Reciever.exe 2136 Command Reciever.exe 2136 Command Reciever.exe 2136 Command Reciever.exe 2136 Command Reciever.exe 2136 Command Reciever.exe 2136 Command Reciever.exe 808 conhost.exe 808 conhost.exe 808 conhost.exe 808 conhost.exe 808 conhost.exe 808 conhost.exe 808 conhost.exe 808 conhost.exe 808 conhost.exe 808 conhost.exe 808 conhost.exe 808 conhost.exe 808 conhost.exe 808 conhost.exe 808 conhost.exe 808 conhost.exe 808 conhost.exe 808 conhost.exe 808 conhost.exe 808 conhost.exe 2136 Command Reciever.exe 2136 Command Reciever.exe 2136 Command Reciever.exe 2136 Command Reciever.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3784 Command Reciever.exe Token: SeDebugPrivilege 3764 tasklist.exe Token: SeDebugPrivilege 808 conhost.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2136 Command Reciever.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2136 Command Reciever.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1632 2352 msedge.exe 83 PID 2352 wrote to memory of 1632 2352 msedge.exe 83 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 2712 2352 msedge.exe 84 PID 2352 wrote to memory of 3088 2352 msedge.exe 85 PID 2352 wrote to memory of 3088 2352 msedge.exe 85 PID 2352 wrote to memory of 5024 2352 msedge.exe 86 PID 2352 wrote to memory of 5024 2352 msedge.exe 86 PID 2352 wrote to memory of 5024 2352 msedge.exe 86 PID 2352 wrote to memory of 5024 2352 msedge.exe 86 PID 2352 wrote to memory of 5024 2352 msedge.exe 86 PID 2352 wrote to memory of 5024 2352 msedge.exe 86 PID 2352 wrote to memory of 5024 2352 msedge.exe 86 PID 2352 wrote to memory of 5024 2352 msedge.exe 86 PID 2352 wrote to memory of 5024 2352 msedge.exe 86 PID 2352 wrote to memory of 5024 2352 msedge.exe 86 PID 2352 wrote to memory of 5024 2352 msedge.exe 86 PID 2352 wrote to memory of 5024 2352 msedge.exe 86 PID 2352 wrote to memory of 5024 2352 msedge.exe 86 PID 2352 wrote to memory of 5024 2352 msedge.exe 86 PID 2352 wrote to memory of 5024 2352 msedge.exe 86 PID 2352 wrote to memory of 5024 2352 msedge.exe 86 PID 2352 wrote to memory of 5024 2352 msedge.exe 86 PID 2352 wrote to memory of 5024 2352 msedge.exe 86 PID 2352 wrote to memory of 5024 2352 msedge.exe 86 PID 2352 wrote to memory of 5024 2352 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Intestio/XWorm-RAT/releases/tag/xworm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6cca46f8,0x7ffc6cca4708,0x7ffc6cca47182⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,14385493415471485872,9737657933274506626,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,14385493415471485872,9737657933274506626,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2536 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,14385493415471485872,9737657933274506626,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14385493415471485872,9737657933274506626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14385493415471485872,9737657933274506626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,14385493415471485872,9737657933274506626,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,14385493415471485872,9737657933274506626,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14385493415471485872,9737657933274506626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14385493415471485872,9737657933274506626,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14385493415471485872,9737657933274506626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14385493415471485872,9737657933274506626,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2108,14385493415471485872,9737657933274506626,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5848 /prefetch:82⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14385493415471485872,9737657933274506626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,14385493415471485872,9737657933274506626,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3452
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:432
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2412
-
C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe"C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe"1⤵
- System Location Discovery: System Language Discovery
PID:716 -
C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2136
-
-
C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3784 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpD869.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpD869.tmp.bat3⤵PID:2932
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:2224
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 3784"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3764
-
-
C:\Windows\system32\find.exefind ":"4⤵PID:3744
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
PID:4560
-
-
C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe"C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:808 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f5⤵PID:4796
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:1364
-
-
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:5004
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5a68fa0156ac0af5bcc9a56e55a0540e9
SHA1ee413f4a40eb0bd1e1f7966543fb154d92ec5d1c
SHA256ef961c4bdd0c689f2b93b09ad04d26079b62ec1e92c3ddafb35c46c02740a3d4
SHA5124b794636974c5538d014f118545b37c733517fe5b3627f6b658b0d6ddce35d0cf6105da5d43e860caf66026654625a6decc937205d82adf52772fc392f7152ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5d33a77a2ab8d05a8676fd3324034fb27
SHA14e90932ff8f38383db3199c911bacf3632dd3b43
SHA2561934f3f03ebd15db7efce9db580ff6cfac7ba5e891365669fdee2d6fed021ed8
SHA5125737c59da1d62366a5bba4819332928ff087419dab55a35b614df004ee4c6fee93948c053d9b3f74046534eb77fa2459c232633888a01e60d749be143ee4f1c3
-
Filesize
124KB
MD514decbf32c80a3cfe4bcb9727bba3722
SHA1771d1d3f295dcae89f91ebc3e089c687a4e75aee
SHA256924b88cd0ec1382a2171a6363e749247e44626dc7be796015f52a6d8be17be2a
SHA51247756929313481f8476231f4648efa234f351a14a78ec094be4835441e21002c02d89f06f94534732dc9e9c7f7149a7af46eea064df0012ceabe352f9d68c7e8
-
Filesize
573B
MD52e6e73e80e60a9a61925cba10636e275
SHA1eca781f9e0637616ba50e634ebef795e6d63c054
SHA256a361999a859cb53b7a91663ac16c05ee90f570d8b8bef391aee55471226d5401
SHA51244c7e45cbf391a13ae2ac1b2c5360d1097eb8d2d7218d6027e48f5b6b6ab6b68da46fe278bb3ff29fd3696f308450fe706e3335ddbbc61f16fc79a66b7d9dfc1
-
Filesize
6KB
MD593cd48d34ebbac20f1c551dd4a0d36e5
SHA14ae61b64c04f375172a0aea03492304adeed9d7c
SHA25623a9fadca6e8e1a3d5a688fcceba6383db0c6ce6a0867237237748e7c19fa6df
SHA51224fe92ea0700578bfac142815064872559713699105414d6087d2525789562489989448424ecfb031adc5b8e9322cb94f8ddfab73ea03e1ecd54df6d32522627
-
Filesize
5KB
MD5d408f7a8d9fe789d0ed8cc51e6c31521
SHA1eeff3c9f4f4970da0b08c6871ed232706c7e6ce4
SHA2560779e10f287538b5bbe9949fbf0f5133870afa993dbaff404e31f9214c7611d9
SHA5129dbeb0413a1e6b18eedd71538d685815b0753e670d5ddf653f49de893b8310916604c6ace26d623ab31ed4ba561581d01311504ee49e64e8512f78288eb0fda2
-
Filesize
6KB
MD5513508a0539458e7cb20886bd13c53c2
SHA155de3e08933d9e0d74cdc41ec7a285969564eac1
SHA256f7297cb6bd0c753e641642f392e3b15d337bcf47acbff9795f8756ccc011ba2e
SHA51215d2ce1dee6310e803e261c9c9829170d267f1e9e19c376199e1b86a239c36f540cfc757c766226c4cd0b9757b6dba6839e00a48d32f665165e4e49499b0c6f1
-
Filesize
6KB
MD5045c4f4b00db60f048b0e3b7474916b3
SHA1e66db4add9d655e2834239b56dc0ff91457f569e
SHA256155b25a5c198fe85da6773c56901f297d8cefb63f0befb6e46033aadfda01215
SHA512a09c14dc864e10a697a565863507f8b523749d71e90a8d427f3ff521c185c836f0d637b32ffa8e2c27338dd38bcb88e181b676a5a244747fc200a41c35f802a5
-
Filesize
1KB
MD510b4ff6cb12f5438a9297f468bfcb098
SHA1aab5d45ada108526e1e093e6bd8bfbba2339c45f
SHA256baa73797a89e73c375ddbba29ba23a8eee7ae945853927c9701f4ff60a579f62
SHA51202b77fa5af7d52443cf1709c7cf965a1da2dbb211421bfb86823c810bb9004199360efccbcfb91f100b4a56075a3d0d7200a85bb77731f85584b9105a477cd0a
-
Filesize
874B
MD588a134076fce37fb0c7fee5086a97070
SHA10b54344f43b6091570cc546bd5769969f47c00c6
SHA256e1cc5388d90cfd960422120b8bd873e5aeee4834d08c3a5e95312ab290f0976a
SHA5125a48aad8d8e5381255b7e2ef566beaefc09ff8f6fbef41b4b3114e7b4bcc89d8b804bfa10087d2f4b59a805b699a6aa6b122e01bb6c8a4b53b9aa741a8e3b72a
-
Filesize
1KB
MD54643119654edd70beae069441007a53b
SHA1c2dfd0a8019fc3c8768f5d05c781436c6c6e273d
SHA256d0c7e30243d9fc12192251481253434d3cadc1dcfecf6c350a0ce0406464c0e8
SHA512edff40d7f2fbbf329fb8ce540df53b80a3d7218f826fbb1cfcabac71d84d28b7fe78a98c3dc0febd0539a730ed3305064ceec831570eb8dea10dd20d2426549c
-
Filesize
874B
MD526f47c4adbdbaf2e0f1b75d7edefa64b
SHA14a3fee9b6b8616341bf742cf6dd3cef3b2771644
SHA256090920c0b551cfa2d3a780283265c815af4f1bc84f484b0249970f49860ec2c6
SHA5128cf4313cbb064a0e44b2373dd9fffde5c38f6e2de78a57366108f3d1af42d5cb95c4e0b7e389baf1b830c4a40d34165c46e1f5994d81e78be9fdc54fc3f7dcaa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54e720ec44917e3f608086b9466d224e0
SHA15073da37f9e2dcc6e6281c65988202e69e243b3c
SHA2563501e901a75bfb2604295a1162012be5329105b5279c9d3d19b414d228f2108f
SHA51215020761e6b58d07d2bfb6dbbbf5796f74c995b2f2183ef71f01b1f9128628679515382bf72e34962f0b8290d12a161924d262c9b22fe92a3c1878165ec801cc
-
Filesize
10KB
MD5050920a212c9ba1bb41b1a943868d7bf
SHA13907fb24f6244063d3f55ac8e3e3f405881f4c7f
SHA256be5227677d0dc12ce5462148e4513c6f801f2fbca0b079634c1b8920c8be52ed
SHA5120097a0305a1a0073b24fbaa77f553473bb522471eea20d157af2d7f3e844f7dd1c5bcc6fc24b83b8cf0deb013d32cd7212ca56d70c64e5fd60be7815ed9ab29a
-
Filesize
5.6MB
MD5eb01eece5f0887b24a1bd53183d801dc
SHA149e92aee8351e3a995d8ec95bc64d7f381dcee28
SHA256a2b1012a39662b760415ee897388c862457f4f1672897db8dee67e125bf0ad5c
SHA51283374fdc381d52b64682df5b96f02cb3d487ce12d9231ede8ee9a92ecf72fa4a0d6f91a04e5f6656cccd50f142dd44bbb08e7ecc94b647e0349064dc32a76839
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
295B
MD5380c4224ef956358d5423ce07fc04704
SHA120b821e86842bc36a8c13252b5b2efe44baa84fb
SHA256c6a8e945e0a206e7c7f34e920299e00a69949fdf407a320e810e741aed4292e7
SHA51226c683d2e1853d94ccecca67f62cd62ff46b961f64eae32b42dfb92cae263cf012a1709b5997feb4f77dca47655b1acfe103fca1b50d2f9264fc7eaa686609e8