Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2025, 08:28

General

  • Target

    JaffaCakes118_dfa43d929d93cd09310d9dbdb6ad082d.exe

  • Size

    16.7MB

  • MD5

    dfa43d929d93cd09310d9dbdb6ad082d

  • SHA1

    a9f5d6128404cd438bc5617740cc3d7ccb1064f5

  • SHA256

    b4becc32cef140dcc804424b9c4e030a1ce245b13e7f1baeca854b8897f2df5f

  • SHA512

    c7a4aed1966a26bd99554a82d3749a01a80ef49f2abfbbafcd9a6c6fb19010f423de75acc6f9344c381fff631f7ff9017416e31edddf538c8991c5d8b00a6f29

  • SSDEEP

    393216:urN50n4bwQq7t3J086sIB6ehAAJ2u653xVu7vHhqBa4Cs:uka9ZPBxKJpHCpqBa4C

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

Chrome

C2

live.nodenet.ml:8863

Mutex

754ce6d6-f75b-4c6f-964c-3996e749369e

Attributes
  • encryption_key

    8F8DE0B9E0A9CA156684061043456EC2CF7D0A6D

  • install_name

    chrome.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    System

  • subdirectory

    chrome

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 17 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 18 IoCs
  • Loads dropped DLL 3 IoCs
  • Obfuscated with Agile.Net obfuscator 8 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Themida packer 13 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 15 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 15 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dfa43d929d93cd09310d9dbdb6ad082d.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dfa43d929d93cd09310d9dbdb6ad082d.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4164
    • C:\Users\Admin\AppData\Roaming\AVB.exe
      "C:\Users\Admin\AppData\Roaming\AVB.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5108
      • C:\Users\Admin\AppData\Roaming\chrome.exe
        "C:\Users\Admin\AppData\Roaming\chrome.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3344
        • C:\Windows\SYSTEM32\schtasks.exe
          "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome.exe" /rl HIGHEST /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:5088
        • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
          "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4444
          • C:\Windows\SYSTEM32\schtasks.exe
            "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:4544
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\89lH4HfJcop8.bat" "
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4508
            • C:\Windows\system32\chcp.com
              chcp 65001
              6⤵
                PID:4076
              • C:\Windows\system32\PING.EXE
                ping -n 10 localhost
                6⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:2512
              • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2188
                • C:\Windows\SYSTEM32\schtasks.exe
                  "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                  7⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:4556
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3nlPMvODwQgF.bat" "
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2604
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    8⤵
                      PID:1968
                    • C:\Windows\system32\PING.EXE
                      ping -n 10 localhost
                      8⤵
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Runs ping.exe
                      PID:5040
                    • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                      "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                      8⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1336
                      • C:\Windows\SYSTEM32\schtasks.exe
                        "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                        9⤵
                        • Scheduled Task/Job: Scheduled Task
                        PID:2156
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WjnYNtc83Wyq.bat" "
                        9⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1744
                        • C:\Windows\system32\chcp.com
                          chcp 65001
                          10⤵
                            PID:3648
                          • C:\Windows\system32\PING.EXE
                            ping -n 10 localhost
                            10⤵
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Runs ping.exe
                            PID:2444
                          • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                            "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                            10⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:1992
                            • C:\Windows\SYSTEM32\schtasks.exe
                              "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                              11⤵
                              • Scheduled Task/Job: Scheduled Task
                              PID:2080
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PbxdosbVTTd5.bat" "
                              11⤵
                              • Suspicious use of WriteProcessMemory
                              PID:3208
                              • C:\Windows\system32\chcp.com
                                chcp 65001
                                12⤵
                                  PID:2248
                                • C:\Windows\system32\PING.EXE
                                  ping -n 10 localhost
                                  12⤵
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  • Runs ping.exe
                                  PID:880
                                • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                  "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                  12⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:2688
                                  • C:\Windows\SYSTEM32\schtasks.exe
                                    "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                    13⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:2008
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pUei9dZdyY0x.bat" "
                                    13⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:5020
                                    • C:\Windows\system32\chcp.com
                                      chcp 65001
                                      14⤵
                                        PID:5092
                                      • C:\Windows\system32\PING.EXE
                                        ping -n 10 localhost
                                        14⤵
                                        • System Network Configuration Discovery: Internet Connection Discovery
                                        • Runs ping.exe
                                        PID:4736
                                      • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                        "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                        14⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of WriteProcessMemory
                                        PID:4588
                                        • C:\Windows\SYSTEM32\schtasks.exe
                                          "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                          15⤵
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2652
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VtaYE2G5BTPu.bat" "
                                          15⤵
                                            PID:4020
                                            • C:\Windows\system32\chcp.com
                                              chcp 65001
                                              16⤵
                                                PID:100
                                              • C:\Windows\system32\PING.EXE
                                                ping -n 10 localhost
                                                16⤵
                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                • Runs ping.exe
                                                PID:1136
                                              • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                16⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:936
                                                • C:\Windows\SYSTEM32\schtasks.exe
                                                  "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                  17⤵
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:3160
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\x8Hq4xC0QjuC.bat" "
                                                  17⤵
                                                    PID:4892
                                                    • C:\Windows\system32\chcp.com
                                                      chcp 65001
                                                      18⤵
                                                        PID:4496
                                                      • C:\Windows\system32\PING.EXE
                                                        ping -n 10 localhost
                                                        18⤵
                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                        • Runs ping.exe
                                                        PID:2648
                                                      • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                        "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                        18⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4924
                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                          "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                          19⤵
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2980
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pKzKHneDNaut.bat" "
                                                          19⤵
                                                            PID:3620
                                                            • C:\Windows\system32\chcp.com
                                                              chcp 65001
                                                              20⤵
                                                                PID:1160
                                                              • C:\Windows\system32\PING.EXE
                                                                ping -n 10 localhost
                                                                20⤵
                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                • Runs ping.exe
                                                                PID:2292
                                                              • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                                "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                                20⤵
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                PID:1800
                                                                • C:\Windows\SYSTEM32\schtasks.exe
                                                                  "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                                  21⤵
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:4388
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lZw6luEFnHIo.bat" "
                                                                  21⤵
                                                                    PID:788
                                                                    • C:\Windows\system32\chcp.com
                                                                      chcp 65001
                                                                      22⤵
                                                                        PID:1980
                                                                      • C:\Windows\system32\PING.EXE
                                                                        ping -n 10 localhost
                                                                        22⤵
                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                        • Runs ping.exe
                                                                        PID:812
                                                                      • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                                        "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                                        22⤵
                                                                        • Checks computer location settings
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:4860
                                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                                          "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                                          23⤵
                                                                          • Scheduled Task/Job: Scheduled Task
                                                                          PID:1384
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7S2LM7NMTtvn.bat" "
                                                                          23⤵
                                                                            PID:2468
                                                                            • C:\Windows\system32\chcp.com
                                                                              chcp 65001
                                                                              24⤵
                                                                                PID:1416
                                                                              • C:\Windows\system32\PING.EXE
                                                                                ping -n 10 localhost
                                                                                24⤵
                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                • Runs ping.exe
                                                                                PID:4528
                                                                              • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                                                "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                                                24⤵
                                                                                • Checks computer location settings
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:4512
                                                                                • C:\Windows\SYSTEM32\schtasks.exe
                                                                                  "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                                                  25⤵
                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                  PID:1204
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Vxp29kr1Irl8.bat" "
                                                                                  25⤵
                                                                                    PID:2688
                                                                                    • C:\Windows\system32\chcp.com
                                                                                      chcp 65001
                                                                                      26⤵
                                                                                        PID:3428
                                                                                      • C:\Windows\system32\PING.EXE
                                                                                        ping -n 10 localhost
                                                                                        26⤵
                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                        • Runs ping.exe
                                                                                        PID:3460
                                                                                      • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                                                        "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                                                        26⤵
                                                                                        • Checks computer location settings
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:2400
                                                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                                                          "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                                                          27⤵
                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                          PID:4600
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9klJTrW2uNXv.bat" "
                                                                                          27⤵
                                                                                            PID:1692
                                                                                            • C:\Windows\system32\chcp.com
                                                                                              chcp 65001
                                                                                              28⤵
                                                                                                PID:4916
                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                ping -n 10 localhost
                                                                                                28⤵
                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                • Runs ping.exe
                                                                                                PID:2912
                                                                                              • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                                                                "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                                                                28⤵
                                                                                                • Checks computer location settings
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:2276
                                                                                                • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                  "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                                                                  29⤵
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:2288
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9VC1pHiAzusp.bat" "
                                                                                                  29⤵
                                                                                                    PID:112
                                                                                                    • C:\Windows\system32\chcp.com
                                                                                                      chcp 65001
                                                                                                      30⤵
                                                                                                        PID:2304
                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                        ping -n 10 localhost
                                                                                                        30⤵
                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                        • Runs ping.exe
                                                                                                        PID:3932
                                                                                                      • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                                                                        "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                                                                        30⤵
                                                                                                        • Checks computer location settings
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:1264
                                                                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                          "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                                                                          31⤵
                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                          PID:2324
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\awegb9dcZ8mw.bat" "
                                                                                                          31⤵
                                                                                                            PID:1004
                                                                                                            • C:\Windows\system32\chcp.com
                                                                                                              chcp 65001
                                                                                                              32⤵
                                                                                                                PID:1160
                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                ping -n 10 localhost
                                                                                                                32⤵
                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                • Runs ping.exe
                                                                                                                PID:3252
                                                                                                              • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                                                                                "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                                                                                32⤵
                                                                                                                • Checks computer location settings
                                                                                                                • Executes dropped EXE
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:2472
                                                                                                                • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                  "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                                                                                  33⤵
                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                  PID:3548
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mbQ1tXkDQId9.bat" "
                                                                                                                  33⤵
                                                                                                                    PID:1652
                                                                                                                    • C:\Windows\system32\chcp.com
                                                                                                                      chcp 65001
                                                                                                                      34⤵
                                                                                                                        PID:3692
                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                        ping -n 10 localhost
                                                                                                                        34⤵
                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                        • Runs ping.exe
                                                                                                                        PID:1576
                                                        • C:\Users\Admin\AppData\Local\Temp\S^X.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\S^X.exe"
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:556

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\chrome.exe.log

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      baf55b95da4a601229647f25dad12878

                                                      SHA1

                                                      abc16954ebfd213733c4493fc1910164d825cac8

                                                      SHA256

                                                      ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924

                                                      SHA512

                                                      24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

                                                    • C:\Users\Admin\AppData\Local\Temp\3nlPMvODwQgF.bat

                                                      Filesize

                                                      207B

                                                      MD5

                                                      a96384b679ac06b6e1aec0c017362806

                                                      SHA1

                                                      b1de9d2cdd8f7cddfaa1bfb71d59a12eba77921e

                                                      SHA256

                                                      0cea013bbdf7fab34294246fc2bdd972f1ce35353f9b5ea4fb0736cb3ce81834

                                                      SHA512

                                                      202de6f515467d60af62a0805be0b2d529641447e0f222e1eef4f6eb53e86627afc500768f715634e4b402ac014c29e0251deea97350ffb6d2c4cb3550cfef8e

                                                    • C:\Users\Admin\AppData\Local\Temp\7S2LM7NMTtvn.bat

                                                      Filesize

                                                      207B

                                                      MD5

                                                      d924bbdb8aed0c59906f797fd24a0a85

                                                      SHA1

                                                      cd9cad503a3f03a8ec6d212842cf119c78f535ac

                                                      SHA256

                                                      3592c7293a0d1f46e2f0ef77432fb714d24dde63bab2565fac225ca1855bbd2b

                                                      SHA512

                                                      46ebaac366cbd8c6cb4a52c7d2ed948aae0c2b23da573e1eb9a1a1d9af73218c613207a3904edb37b82c938c5050eabd5f989636982129e417b960b161fe5f9d

                                                    • C:\Users\Admin\AppData\Local\Temp\89lH4HfJcop8.bat

                                                      Filesize

                                                      207B

                                                      MD5

                                                      1717b4021437328e50c695bb8025e081

                                                      SHA1

                                                      73930b9e54a65f0636062b69b974deef0eee76d2

                                                      SHA256

                                                      add51c7caa8fbdfc462bfdf99768ab9eac96da4b16b06b2c31e804f7b324c78f

                                                      SHA512

                                                      2b03733f6cc49aa386165897b7603bef864e169fb7434803996952daf70f9deebf0c26d5f9907129a2be36d4ec40e9d9c413545fffb7c1245b0898a5d61671d7

                                                    • C:\Users\Admin\AppData\Local\Temp\9VC1pHiAzusp.bat

                                                      Filesize

                                                      207B

                                                      MD5

                                                      b5d1f22ab0c001afca54dffe12516566

                                                      SHA1

                                                      97fb9856596d02307e9a2aac4f4dc04abc57da78

                                                      SHA256

                                                      935e66b2477cf07a1c84c8fa9db092b3a28f6b176f3e0e172484ba3aebecd1e4

                                                      SHA512

                                                      fb9e98fadca7a02329fd6667eba9c616b55a6827f06e01130107c324e7aed9469b44483c39c9810a1d3089d4cc611922f6f5caec5b571826d75836df3e84ca03

                                                    • C:\Users\Admin\AppData\Local\Temp\9klJTrW2uNXv.bat

                                                      Filesize

                                                      207B

                                                      MD5

                                                      32b7d4df8f1bfc2c36b3c9e4331bc575

                                                      SHA1

                                                      3e1749ae7062e96c8cfeb6d707c61777a6cc42e4

                                                      SHA256

                                                      54e9c0e07b89aff8a3bb835f13a8209129f4dbbbc5cd2226f6b2a4a39f48f79c

                                                      SHA512

                                                      fedcabae1691a9c1228a7a716a8ed9b71a25303f219093f5553c67d68821be9c2ce640f9ac742019ff7227e6ee4bda3d30bc9a6566b4cfec39886a6938642be3

                                                    • C:\Users\Admin\AppData\Local\Temp\PbxdosbVTTd5.bat

                                                      Filesize

                                                      207B

                                                      MD5

                                                      4430b21017ac1f2a8d35095480f596ef

                                                      SHA1

                                                      b7854d7f044a867357253085ff21f24dbefff12d

                                                      SHA256

                                                      8aff5764907bd7bc1ecccf8906adba39a38283a35a6da5e73b325092a59eaef8

                                                      SHA512

                                                      3efb000c802199db530743ed057d06381890d8599eed9cf2e3d644452bbf526b2b0be589ce42e1355dbe6671dee9cf4c2a41e927f7713ffe60eedd36adc1b516

                                                    • C:\Users\Admin\AppData\Local\Temp\S^X.exe

                                                      Filesize

                                                      789KB

                                                      MD5

                                                      e2437ac017506bbde9a81fb1f618457b

                                                      SHA1

                                                      adef2615312b31e041ccf700b3982dd50b686c7f

                                                      SHA256

                                                      94594fa46d0bd28c02365f0a32ec3a662b25df95f3f3e8e2a952c18a23895b12

                                                      SHA512

                                                      9169f8be39b8fede38f7fce5a2e64d42630857e0ebd37f921c68ccf0bf0a8816f1682ba4659d22ad43413d99de62a59b2494494701404b44aa41c4d6bdc1e019

                                                    • C:\Users\Admin\AppData\Local\Temp\VtaYE2G5BTPu.bat

                                                      Filesize

                                                      207B

                                                      MD5

                                                      3bac2d6ac9e5aff38a622b15286abd44

                                                      SHA1

                                                      c843f5b6619c17cac5d71d7110aa198010a78d06

                                                      SHA256

                                                      53e49db349726d0d6897764c585e96b21a35e5f745e8df9d3a9a0a26dfd1aa3d

                                                      SHA512

                                                      549f79c27e4610d051ed266a2475c6eb8d355bad49dccebba13f7738c52dd4a0d6e3a1815a419d7324fc38b746b83b269db16136c9464b5f7e5d90652d1703c6

                                                    • C:\Users\Admin\AppData\Local\Temp\Vxp29kr1Irl8.bat

                                                      Filesize

                                                      207B

                                                      MD5

                                                      179988d4476628bd38e16082669a84e5

                                                      SHA1

                                                      9925f27bdfa6da90c8ba33567cdc48742a05bb83

                                                      SHA256

                                                      7ca037321192dc8adba31e0db46783134c00e9554cef8ab4c6eedc780f80e001

                                                      SHA512

                                                      1ecf992c63cde790c592dff168a5c82eebc6437ddfbe5a8ceb3c37dc5a4be5a6a0312c6968dab27d39c923ae9225c00e062db754c3f30629c4b7a90475b376fa

                                                    • C:\Users\Admin\AppData\Local\Temp\WjnYNtc83Wyq.bat

                                                      Filesize

                                                      207B

                                                      MD5

                                                      c5ed0c42f25304ae0ba7800d366e7ef4

                                                      SHA1

                                                      465ecfdb075a139c4026c987f467be7974fb994f

                                                      SHA256

                                                      b716d320682f2ee82a9f75b0f1db3eb6da71adeb05d1c9b02f28d5b5f3cc101a

                                                      SHA512

                                                      8fd957a40abeae6e004a70ad0d2b5f00dc1bc66abd8c01b40c647ab917024b3537479cbba094c41539007d89c73f9b38a947ab26bb42e740a8bac12159908015

                                                    • C:\Users\Admin\AppData\Local\Temp\awegb9dcZ8mw.bat

                                                      Filesize

                                                      207B

                                                      MD5

                                                      6d53c9fb749020ba0e53b0344a3df300

                                                      SHA1

                                                      80b7ba409e504890c790a295fa67c4572236a9e2

                                                      SHA256

                                                      fdfa9555ca8fb803be4dab67feaebedd67b3525a4a7ac69209380d0dc85dbc14

                                                      SHA512

                                                      e32e91968567a8998fde7410090a6c94be9e4dfdd7e2e3c01075838e86be62de1888833512efdb9fe38d65905c0d1e22d0ce436e964a4be20c89b74a3f95723c

                                                    • C:\Users\Admin\AppData\Local\Temp\c73c9c9b-1adc-4deb-a031-aebb4e3010ac\AgileDotNetRT.dll

                                                      Filesize

                                                      2.2MB

                                                      MD5

                                                      2d86c4ad18524003d56c1cb27c549ba8

                                                      SHA1

                                                      123007f9337364e044b87deacf6793c2027c8f47

                                                      SHA256

                                                      091ab8a1acdab40c544bd1e5c91a96881acc318cac4df5235e1b5673f5489280

                                                      SHA512

                                                      0dd5204733b3c20932aeea2cebf0ca1eeca70e4b3b3b8932d78d952a8f762f0b96ebdbdaf217e95889c02ec6a39b8f9919fd4c0cba56bb629256e71fa61faa3c

                                                    • C:\Users\Admin\AppData\Local\Temp\mbQ1tXkDQId9.bat

                                                      Filesize

                                                      207B

                                                      MD5

                                                      635348e85654784d4518a55022774099

                                                      SHA1

                                                      051188d4eb83b67bdee5b62a8a955d69c952a5e3

                                                      SHA256

                                                      4f1cb506c503884adc620c407d918f350c02f32c12badd014f0056f758f79b30

                                                      SHA512

                                                      d31197be170606a931e2d06cb62b33175f01d973705f930a2369ec304e7f743236b5799ab3ce6e84cbc8364a5a7dc10114975c4f7d3b25c3f74891862d9814d5

                                                    • C:\Users\Admin\AppData\Local\Temp\pKzKHneDNaut.bat

                                                      Filesize

                                                      207B

                                                      MD5

                                                      65fe945012db98586d578e9c7b9fc97e

                                                      SHA1

                                                      25a74587e15b67759bc712c95a178bba1abd0262

                                                      SHA256

                                                      fc9d34a7316dee31703b7c42b5b743fc0ba7e206e284a0fcb958106ea9f6e6e0

                                                      SHA512

                                                      b8546dc433c0e44ada480f426136ecbfc503b53e2c602f6f5a76e241d1bc0bbda155f1dec98ecb34ab85cf7da9d792c3e300998a6d9b1c881bced1f6e894b4b5

                                                    • C:\Users\Admin\AppData\Local\Temp\pUei9dZdyY0x.bat

                                                      Filesize

                                                      207B

                                                      MD5

                                                      a353ede7bbeb9901f38728af86650202

                                                      SHA1

                                                      c3574dbacb880a34b95198370f2f1b2a515ba923

                                                      SHA256

                                                      098fa918b23072f87a2e568f2f7c7000b6633ad79525138f94851f8fdec45124

                                                      SHA512

                                                      8b3ad899cd58d37f6f727442ec4e4a8813647f11d46671eadb528538e9a88dc728863ad72014afb05db37d864c2b509001e080aacc215cda2c37b39d84eb6989

                                                    • C:\Users\Admin\AppData\Local\Temp\x8Hq4xC0QjuC.bat

                                                      Filesize

                                                      207B

                                                      MD5

                                                      5771c73be03a1e1866fe4177f83ee0c5

                                                      SHA1

                                                      e5146fe348dfe5a3888bec212deeb6c05d2ba4ba

                                                      SHA256

                                                      f6bb3c936f0d6b97f6f3db40877835d9dbe76c7d9ba308140c112211ce91124e

                                                      SHA512

                                                      51aa9c21d2710d6e8d3f7d184524e4bb92b9dd61c5de1fc59b84bad7333b485f569c5f1e621deb82dfd599a7f0f05b4acdca0713f109acfbe4926ea6ac36d840

                                                    • C:\Users\Admin\AppData\Roaming\AVB.exe

                                                      Filesize

                                                      11.3MB

                                                      MD5

                                                      04d5fbe1ca0ee0d8b82c9c47786de31d

                                                      SHA1

                                                      e63bc0f81cb9d1b4439e62c5018ae30120a5a8a3

                                                      SHA256

                                                      8bde20ee2c5183c9d13716242130b6fc5f8f4bf317e7908645dc460f3ed15715

                                                      SHA512

                                                      dcd3213f484cbb301e8fb17b98fff51d6003cefd401e0d9358f0f2219e906f25f2fa0f66c81aa8bb031b327c6c19412b99472f2815262de86e73c635622b413a

                                                    • C:\Users\Admin\AppData\Roaming\chrome.exe

                                                      Filesize

                                                      502KB

                                                      MD5

                                                      92479f1615fd4fa1dd3ac7f2e6a1b329

                                                      SHA1

                                                      0a6063d27c9f991be2053b113fcef25e071c57fd

                                                      SHA256

                                                      0c4917cc756e769e94ab97d626bef49713dab833525ba2e5d75fc9aea4c72569

                                                      SHA512

                                                      9f117c74c04749e6d0142e1cf952a8c59428f649413750921fc7aea35a3ccb62d9975ef954e61ce323d6234e0e9c7b8816f2ca9270552b726f9233219750847c

                                                    • memory/556-99-0x0000000000E40000-0x0000000000F0C000-memory.dmp

                                                      Filesize

                                                      816KB

                                                    • memory/556-100-0x0000000005F20000-0x00000000064C4000-memory.dmp

                                                      Filesize

                                                      5.6MB

                                                    • memory/556-101-0x0000000005820000-0x00000000058B2000-memory.dmp

                                                      Filesize

                                                      584KB

                                                    • memory/3344-91-0x0000000000100000-0x0000000000184000-memory.dmp

                                                      Filesize

                                                      528KB

                                                    • memory/4164-11-0x0000000074640000-0x0000000074BF1000-memory.dmp

                                                      Filesize

                                                      5.7MB

                                                    • memory/4164-28-0x0000000074640000-0x0000000074BF1000-memory.dmp

                                                      Filesize

                                                      5.7MB

                                                    • memory/4164-10-0x0000000072570000-0x0000000072B78000-memory.dmp

                                                      Filesize

                                                      6.0MB

                                                    • memory/4164-12-0x0000000072570000-0x0000000072B78000-memory.dmp

                                                      Filesize

                                                      6.0MB

                                                    • memory/4164-2-0x0000000074640000-0x0000000074BF1000-memory.dmp

                                                      Filesize

                                                      5.7MB

                                                    • memory/4164-13-0x0000000072570000-0x0000000072B78000-memory.dmp

                                                      Filesize

                                                      6.0MB

                                                    • memory/4164-14-0x0000000073360000-0x00000000733BB000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/4164-27-0x0000000072570000-0x0000000072B78000-memory.dmp

                                                      Filesize

                                                      6.0MB

                                                    • memory/4164-0-0x0000000074642000-0x0000000074643000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/4164-1-0x0000000074640000-0x0000000074BF1000-memory.dmp

                                                      Filesize

                                                      5.7MB

                                                    • memory/4444-108-0x000000001C250000-0x000000001C302000-memory.dmp

                                                      Filesize

                                                      712KB

                                                    • memory/4444-107-0x0000000002E80000-0x0000000002ED0000-memory.dmp

                                                      Filesize

                                                      320KB

                                                    • memory/5108-31-0x0000000071170000-0x0000000071920000-memory.dmp

                                                      Filesize

                                                      7.7MB

                                                    • memory/5108-97-0x0000000073470000-0x0000000073A78000-memory.dmp

                                                      Filesize

                                                      6.0MB

                                                    • memory/5108-94-0x0000000073AD0000-0x00000000740D8000-memory.dmp

                                                      Filesize

                                                      6.0MB

                                                    • memory/5108-71-0x0000000006230000-0x0000000006238000-memory.dmp

                                                      Filesize

                                                      32KB

                                                    • memory/5108-70-0x0000000007090000-0x0000000007142000-memory.dmp

                                                      Filesize

                                                      712KB

                                                    • memory/5108-98-0x0000000071170000-0x0000000071920000-memory.dmp

                                                      Filesize

                                                      7.7MB

                                                    • memory/5108-62-0x00000000065E0000-0x0000000006BEC000-memory.dmp

                                                      Filesize

                                                      6.0MB

                                                    • memory/5108-67-0x00000000065E0000-0x0000000006BEC000-memory.dmp

                                                      Filesize

                                                      6.0MB

                                                    • memory/5108-65-0x00000000065E0000-0x0000000006BEC000-memory.dmp

                                                      Filesize

                                                      6.0MB

                                                    • memory/5108-69-0x00000000065E0000-0x0000000006BEC000-memory.dmp

                                                      Filesize

                                                      6.0MB

                                                    • memory/5108-63-0x00000000065E0000-0x0000000006BEC000-memory.dmp

                                                      Filesize

                                                      6.0MB

                                                    • memory/5108-55-0x0000000073470000-0x0000000073A78000-memory.dmp

                                                      Filesize

                                                      6.0MB

                                                    • memory/5108-53-0x0000000073470000-0x0000000073A78000-memory.dmp

                                                      Filesize

                                                      6.0MB

                                                    • memory/5108-54-0x0000000071170000-0x0000000071920000-memory.dmp

                                                      Filesize

                                                      7.7MB

                                                    • memory/5108-52-0x0000000073470000-0x0000000073A78000-memory.dmp

                                                      Filesize

                                                      6.0MB

                                                    • memory/5108-44-0x00000000065E0000-0x0000000006BF2000-memory.dmp

                                                      Filesize

                                                      6.1MB

                                                    • memory/5108-43-0x0000000074B70000-0x0000000074BF9000-memory.dmp

                                                      Filesize

                                                      548KB

                                                    • memory/5108-42-0x0000000073AD0000-0x00000000740D8000-memory.dmp

                                                      Filesize

                                                      6.0MB

                                                    • memory/5108-41-0x0000000073AD0000-0x00000000740D8000-memory.dmp

                                                      Filesize

                                                      6.0MB

                                                    • memory/5108-40-0x0000000071170000-0x0000000071920000-memory.dmp

                                                      Filesize

                                                      7.7MB

                                                    • memory/5108-39-0x0000000073AD0000-0x00000000740D8000-memory.dmp

                                                      Filesize

                                                      6.0MB

                                                    • memory/5108-30-0x0000000000D20000-0x0000000001870000-memory.dmp

                                                      Filesize

                                                      11.3MB

                                                    • memory/5108-29-0x000000007117E000-0x000000007117F000-memory.dmp

                                                      Filesize

                                                      4KB