Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 22:33
Behavioral task
behavioral1
Sample
טטרוקס המלך.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
טטרוקס המלך.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win10v2004-20241007-en
General
-
Target
טטרוקס המלך.exe
-
Size
15.0MB
-
MD5
34ab2e78cebb98c4da87ee3874ff9729
-
SHA1
53bf08b22db04996a4519aa991fd22bdc6da381f
-
SHA256
1bad7f834a16372b7951ab6511d872d3cf484a427b4adcb73c76d80d6bd2924b
-
SHA512
f51db89964c0552517a88e620311d4e8db4fbd0929fbd4c224943b21759b487b40487bbcd6097e556d37ee9a49c760ba6cd644a0f141facaffd8d6b1b9ac8dbf
-
SSDEEP
393216:Msewq3Obs2ClPBXMCHWUjqcuIbvR/PmR6/nXXs5BYHZCro:Msewq3ObRqPBXMb8Ht/usv3Cro
Malware Config
Signatures
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 604 netsh.exe 1764 netsh.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 4448 cmd.exe 3824 powershell.exe -
Loads dropped DLL 34 IoCs
pid Process 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe 3932 טטרוקס המלך.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 21 discord.com 22 discord.com 23 discord.com 59 discord.com 65 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com -
pid Process 4468 cmd.exe 552 ARP.EXE -
Enumerates processes with tasklist 1 TTPs 5 IoCs
pid Process 2924 tasklist.exe 5008 tasklist.exe 1324 tasklist.exe 2268 tasklist.exe 4304 tasklist.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 2604 cmd.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4784 sc.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4928 cmd.exe 1724 netsh.exe -
System Network Connections Discovery 1 TTPs 1 IoCs
Attempt to get a listing of network connections.
pid Process 2316 NETSTAT.EXE -
Collects information from the system 1 TTPs 1 IoCs
Uses WMIC.exe to find detailed system information.
pid Process 1768 WMIC.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4840 WMIC.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2316 NETSTAT.EXE 4740 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 4236 systeminfo.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3824 powershell.exe 3824 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 396 WMIC.exe Token: SeSecurityPrivilege 396 WMIC.exe Token: SeTakeOwnershipPrivilege 396 WMIC.exe Token: SeLoadDriverPrivilege 396 WMIC.exe Token: SeSystemProfilePrivilege 396 WMIC.exe Token: SeSystemtimePrivilege 396 WMIC.exe Token: SeProfSingleProcessPrivilege 396 WMIC.exe Token: SeIncBasePriorityPrivilege 396 WMIC.exe Token: SeCreatePagefilePrivilege 396 WMIC.exe Token: SeBackupPrivilege 396 WMIC.exe Token: SeRestorePrivilege 396 WMIC.exe Token: SeShutdownPrivilege 396 WMIC.exe Token: SeDebugPrivilege 396 WMIC.exe Token: SeSystemEnvironmentPrivilege 396 WMIC.exe Token: SeRemoteShutdownPrivilege 396 WMIC.exe Token: SeUndockPrivilege 396 WMIC.exe Token: SeManageVolumePrivilege 396 WMIC.exe Token: 33 396 WMIC.exe Token: 34 396 WMIC.exe Token: 35 396 WMIC.exe Token: 36 396 WMIC.exe Token: SeIncreaseQuotaPrivilege 4840 WMIC.exe Token: SeSecurityPrivilege 4840 WMIC.exe Token: SeTakeOwnershipPrivilege 4840 WMIC.exe Token: SeLoadDriverPrivilege 4840 WMIC.exe Token: SeSystemProfilePrivilege 4840 WMIC.exe Token: SeSystemtimePrivilege 4840 WMIC.exe Token: SeProfSingleProcessPrivilege 4840 WMIC.exe Token: SeIncBasePriorityPrivilege 4840 WMIC.exe Token: SeCreatePagefilePrivilege 4840 WMIC.exe Token: SeBackupPrivilege 4840 WMIC.exe Token: SeRestorePrivilege 4840 WMIC.exe Token: SeShutdownPrivilege 4840 WMIC.exe Token: SeDebugPrivilege 4840 WMIC.exe Token: SeSystemEnvironmentPrivilege 4840 WMIC.exe Token: SeRemoteShutdownPrivilege 4840 WMIC.exe Token: SeUndockPrivilege 4840 WMIC.exe Token: SeManageVolumePrivilege 4840 WMIC.exe Token: 33 4840 WMIC.exe Token: 34 4840 WMIC.exe Token: 35 4840 WMIC.exe Token: 36 4840 WMIC.exe Token: SeDebugPrivilege 5008 tasklist.exe Token: SeIncreaseQuotaPrivilege 4840 WMIC.exe Token: SeSecurityPrivilege 4840 WMIC.exe Token: SeTakeOwnershipPrivilege 4840 WMIC.exe Token: SeLoadDriverPrivilege 4840 WMIC.exe Token: SeSystemProfilePrivilege 4840 WMIC.exe Token: SeSystemtimePrivilege 4840 WMIC.exe Token: SeProfSingleProcessPrivilege 4840 WMIC.exe Token: SeIncBasePriorityPrivilege 4840 WMIC.exe Token: SeCreatePagefilePrivilege 4840 WMIC.exe Token: SeBackupPrivilege 4840 WMIC.exe Token: SeRestorePrivilege 4840 WMIC.exe Token: SeShutdownPrivilege 4840 WMIC.exe Token: SeDebugPrivilege 4840 WMIC.exe Token: SeSystemEnvironmentPrivilege 4840 WMIC.exe Token: SeRemoteShutdownPrivilege 4840 WMIC.exe Token: SeUndockPrivilege 4840 WMIC.exe Token: SeManageVolumePrivilege 4840 WMIC.exe Token: 33 4840 WMIC.exe Token: 34 4840 WMIC.exe Token: 35 4840 WMIC.exe Token: 36 4840 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1180 wrote to memory of 3932 1180 טטרוקס המלך.exe 82 PID 1180 wrote to memory of 3932 1180 טטרוקס המלך.exe 82 PID 3932 wrote to memory of 928 3932 טטרוקס המלך.exe 84 PID 3932 wrote to memory of 928 3932 טטרוקס המלך.exe 84 PID 3932 wrote to memory of 1764 3932 טטרוקס המלך.exe 85 PID 3932 wrote to memory of 1764 3932 טטרוקס המלך.exe 85 PID 3932 wrote to memory of 1636 3932 טטרוקס המלך.exe 86 PID 3932 wrote to memory of 1636 3932 טטרוקס המלך.exe 86 PID 3932 wrote to memory of 2248 3932 טטרוקס המלך.exe 88 PID 3932 wrote to memory of 2248 3932 טטרוקס המלך.exe 88 PID 1764 wrote to memory of 396 1764 cmd.exe 92 PID 1764 wrote to memory of 396 1764 cmd.exe 92 PID 928 wrote to memory of 4840 928 cmd.exe 93 PID 928 wrote to memory of 4840 928 cmd.exe 93 PID 2248 wrote to memory of 5008 2248 cmd.exe 94 PID 2248 wrote to memory of 5008 2248 cmd.exe 94 PID 3932 wrote to memory of 1580 3932 טטרוקס המלך.exe 95 PID 3932 wrote to memory of 1580 3932 טטרוקס המלך.exe 95 PID 1580 wrote to memory of 2544 1580 cmd.exe 97 PID 1580 wrote to memory of 2544 1580 cmd.exe 97 PID 3932 wrote to memory of 4912 3932 טטרוקס המלך.exe 98 PID 3932 wrote to memory of 4912 3932 טטרוקס המלך.exe 98 PID 3932 wrote to memory of 4512 3932 טטרוקס המלך.exe 99 PID 3932 wrote to memory of 4512 3932 טטרוקס המלך.exe 99 PID 4512 wrote to memory of 1324 4512 cmd.exe 102 PID 4512 wrote to memory of 1324 4512 cmd.exe 102 PID 4912 wrote to memory of 1352 4912 cmd.exe 103 PID 4912 wrote to memory of 1352 4912 cmd.exe 103 PID 3932 wrote to memory of 2604 3932 טטרוקס המלך.exe 104 PID 3932 wrote to memory of 2604 3932 טטרוקס המלך.exe 104 PID 2604 wrote to memory of 4828 2604 cmd.exe 106 PID 2604 wrote to memory of 4828 2604 cmd.exe 106 PID 3932 wrote to memory of 2812 3932 טטרוקס המלך.exe 107 PID 3932 wrote to memory of 2812 3932 טטרוקס המלך.exe 107 PID 3932 wrote to memory of 2116 3932 טטרוקס המלך.exe 108 PID 3932 wrote to memory of 2116 3932 טטרוקס המלך.exe 108 PID 2116 wrote to memory of 2268 2116 cmd.exe 111 PID 2116 wrote to memory of 2268 2116 cmd.exe 111 PID 2812 wrote to memory of 1680 2812 cmd.exe 112 PID 2812 wrote to memory of 1680 2812 cmd.exe 112 PID 3932 wrote to memory of 3384 3932 טטרוקס המלך.exe 113 PID 3932 wrote to memory of 3384 3932 טטרוקס המלך.exe 113 PID 3932 wrote to memory of 452 3932 טטרוקס המלך.exe 114 PID 3932 wrote to memory of 452 3932 טטרוקס המלך.exe 114 PID 3932 wrote to memory of 2624 3932 טטרוקס המלך.exe 115 PID 3932 wrote to memory of 2624 3932 טטרוקס המלך.exe 115 PID 3932 wrote to memory of 4448 3932 טטרוקס המלך.exe 116 PID 3932 wrote to memory of 4448 3932 טטרוקס המלך.exe 116 PID 452 wrote to memory of 1760 452 cmd.exe 121 PID 452 wrote to memory of 1760 452 cmd.exe 121 PID 3384 wrote to memory of 2956 3384 cmd.exe 122 PID 3384 wrote to memory of 2956 3384 cmd.exe 122 PID 1760 wrote to memory of 1292 1760 cmd.exe 123 PID 1760 wrote to memory of 1292 1760 cmd.exe 123 PID 2624 wrote to memory of 4304 2624 cmd.exe 124 PID 2624 wrote to memory of 4304 2624 cmd.exe 124 PID 2956 wrote to memory of 1984 2956 cmd.exe 125 PID 2956 wrote to memory of 1984 2956 cmd.exe 125 PID 4448 wrote to memory of 3824 4448 cmd.exe 126 PID 4448 wrote to memory of 3824 4448 cmd.exe 126 PID 3932 wrote to memory of 4928 3932 טטרוקס המלך.exe 127 PID 3932 wrote to memory of 4928 3932 טטרוקס המלך.exe 127 PID 3932 wrote to memory of 4468 3932 טטרוקס המלך.exe 128 PID 3932 wrote to memory of 4468 3932 טטרוקס המלך.exe 128 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4828 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\טטרוקס המלך.exe"C:\Users\Admin\AppData\Local\Temp\טטרוקס המלך.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\טטרוקס המלך.exe"C:\Users\Admin\AppData\Local\Temp\טטרוקס המלך.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:4840
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer"3⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get Manufacturer4⤵
- Suspicious use of AdjustPrivilegeToken
PID:396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "gdb --version"3⤵PID:1636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer"3⤵
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_ComputerSystem get Manufacturer4⤵PID:2544
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:1352
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
PID:1324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\WaltuhiumUpdateService\Waltuhium.exe""3⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\WaltuhiumUpdateService\Waltuhium.exe"4⤵
- Views/modifies file attributes
PID:4828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()""3⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\system32\mshta.exemshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()"4⤵PID:1680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
PID:2268
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"3⤵
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\system32\cmd.execmd.exe /c chcp4⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\system32\chcp.comchcp5⤵PID:1984
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"3⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\system32\cmd.execmd.exe /c chcp4⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\chcp.comchcp5⤵PID:1292
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:4304
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"3⤵
- Clipboard Data
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Get-Clipboard4⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"3⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4928 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1724
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"3⤵
- Network Service Discovery
PID:4468 -
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:4236
-
-
C:\Windows\system32\HOSTNAME.EXEhostname4⤵PID:4580
-
-
C:\Windows\System32\Wbem\WMIC.exewmic logicaldisk get caption,description,providername4⤵
- Collects information from the system
PID:1768
-
-
C:\Windows\system32\net.exenet user4⤵PID:4576
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user5⤵PID:2732
-
-
-
C:\Windows\system32\query.exequery user4⤵PID:1084
-
C:\Windows\system32\quser.exe"C:\Windows\system32\quser.exe"5⤵PID:2836
-
-
-
C:\Windows\system32\net.exenet localgroup4⤵PID:1260
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup5⤵PID:2220
-
-
-
C:\Windows\system32\net.exenet localgroup administrators4⤵PID:4716
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators5⤵PID:4952
-
-
-
C:\Windows\system32\net.exenet user guest4⤵PID:424
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user guest5⤵PID:4320
-
-
-
C:\Windows\system32\net.exenet user administrator4⤵PID:220
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user administrator5⤵PID:1644
-
-
-
C:\Windows\System32\Wbem\WMIC.exewmic startup get caption,command4⤵PID:4724
-
-
C:\Windows\system32\tasklist.exetasklist /svc4⤵
- Enumerates processes with tasklist
PID:2924
-
-
C:\Windows\system32\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:4740
-
-
C:\Windows\system32\ROUTE.EXEroute print4⤵PID:4936
-
-
C:\Windows\system32\ARP.EXEarp -a4⤵
- Network Service Discovery
PID:552
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -ano4⤵
- System Network Connections Discovery
- Gathers network information
PID:2316
-
-
C:\Windows\system32\sc.exesc query type= service state= all4⤵
- Launches sc.exe
PID:4784
-
-
C:\Windows\system32\netsh.exenetsh firewall show state4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:604
-
-
C:\Windows\system32\netsh.exenetsh firewall show config4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:4728
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:872
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:3000
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:3060
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1System Information Discovery
3System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD5862f820c3251e4ca6fc0ac00e4092239
SHA1ef96d84b253041b090c243594f90938e9a487a9a
SHA25636585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153
SHA5122f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e
-
Filesize
48KB
MD568156f41ae9a04d89bb6625a5cd222d4
SHA13be29d5c53808186eba3a024be377ee6f267c983
SHA25682a2f9ae1e6146ae3cb0f4bc5a62b7227e0384209d9b1aef86bbcc105912f7cd
SHA512f7bf8ad7cd8b450050310952c56f6a20b378a972c822ccc253ef3d7381b56ffb3ca6ce3323bea9872674ed1c02017f78ab31e9eb9927fc6b3cba957c247e5d57
-
Filesize
69KB
MD580083b99812171fea682b1cf38026816
SHA1365fb5b0c652923875e1c7720f0d76a495b0e221
SHA256dbeae7cb6f256998f9d8de79d08c74d716d819eb4473b2725dbe2d53ba88000a
SHA51233419b9e18e0099df37d22e33debf15d57f4248346b17423f2b55c8da7cbe62c19aa0bb5740cfaac9bc6625b81c54367c0c476eaece71727439686567f0b1234
-
Filesize
82KB
MD5cb8c06c8fa9e61e4ac5f22eebf7f1d00
SHA1d8e0dfc8127749947b09f17c8848166bac659f0d
SHA256fc3b481684b926350057e263622a2a5335b149a0498a8d65c4f37e39dd90b640
SHA512e6da642b7200bfb78f939f7d8148581259baa9a5edda282c621d14ba88083a9b9bd3d17b701e9cde77ad1133c39bd93fc9d955bb620546bb4fcf45c68f1ec7d6
-
Filesize
175KB
MD55cba92e7c00d09a55f5cbadc8d16cd26
SHA10300c6b62cd9db98562fdd3de32096ab194da4c8
SHA2560e3d149b91fc7dc3367ab94620a5e13af6e419f423b31d4800c381468cb8ad85
SHA5127ab432c8774a10f04ddd061b57d07eba96481b5bb8c663c6ade500d224c6061bc15d17c74da20a7c3cec8bbf6453404d553ebab22d37d67f9b163d7a15cf1ded
-
Filesize
128KB
MD5a55e57d7594303c89b5f7a1d1d6f2b67
SHA1904a9304a07716497cf3e4eaafd82715874c94f1
SHA256f63c6c7e71c342084d8f1a108786ca6975a52cefef8be32cc2589e6e2fe060c8
SHA512ffa61ad2a408a831b5d86b201814256c172e764c9c1dbe0bd81a2e204e9e8117c66f5dfa56bb7d74275d23154c0ed8e10d4ae8a0d0564434e9761d754f1997fc
-
Filesize
271KB
MD5f3377f3de29579140e2bbaeefd334d4f
SHA1b3076c564dbdfd4ca1b7cc76f36448b0088e2341
SHA256b715d1c18e9a9c1531f21c02003b4c6726742d1a2441a1893bc3d79d7bb50e91
SHA51234d9591590bba20613691a5287ef329e5927a58127ce399088b4d68a178e3af67159a8fc55b4fcdcb08ae094753b20dec2ac3f0b3011481e4ed6f37445cecdd5
-
Filesize
62KB
MD532d76c9abd65a5d2671aeede189bc290
SHA10d4440c9652b92b40bb92c20f3474f14e34f8d62
SHA256838d5c8b7c3212c8429baf612623abbbc20a9023eec41e34e5461b76a285b86c
SHA51249dc391f4e63f4ff7d65d6fd837332745cc114a334fd61a7b6aa6f710b235339964b855422233fac4510ccb9a6959896efe880ab24a56261f78b2a0fd5860cd9
-
Filesize
154KB
MD51ba022d42024a655cf289544ae461fb8
SHA19772a31083223ecf66751ff3851d2e3303a0764c
SHA256d080eabd015a3569813a220fd4ea74dff34ed2a8519a10473eb37e22b1118a06
SHA5122b888a2d7467e29968c6bb65af40d4b5e80722ffdda760ad74c912f3a2f315d402f3c099fde82f00f41de6c9faaedb23a643337eb8821e594c567506e3464c62
-
Filesize
34KB
MD5705ac24f30dc9487dc709307d15108ed
SHA1e9e6ba24af9947d8995392145adf62cac86ba5d8
SHA25659134b754c6aca9449e2801e9e7ed55279c4f1ed58fe7a7a9f971c84e8a32a6c
SHA512f5318ebb91f059f0721d75d576b39c7033d566e39513bad8e7e42ccc922124a5205010415001ee386495f645238e2ff981a8b859f0890dc3da4363eb978fdba7
-
Filesize
54KB
MD5a72527454dd6da346ddb221fc729e3d4
SHA10276387e3e0492a0822db4eabe23db8c25ef6e6f
SHA256404353d7b867749fa2893033bd1ebf2e3f75322d4015725d697cfa5e80ec9d0f
SHA512fefb543d20520f86b63e599a56e2166599dfa117edb2beb5e73fc8b43790543702c280a05ccfd9597c0b483f637038283dd48ef8c88b4ea6bac411ec0043b10a
-
Filesize
32KB
MD51c03caa59b5e4a7fb9b998d8c1da165a
SHA18a318f80a705c64076e22913c2206d9247d30cd7
SHA256b9cf502dadcb124f693bf69ecd7077971e37174104dbda563022d74961a67e1e
SHA512783ecda7a155dfc96a718d5a130fb901bbecbed05537434e779135cba88233dd990d86eca2f55a852c9bfb975074f7c44d8a3e4558d7c2060f411ce30b6a915f
-
Filesize
81KB
MD5fe896371430bd9551717ef12a3e7e818
SHA1e2a7716e9ce840e53e8fc79d50a77f40b353c954
SHA25635246b04c6c7001ca448554246445a845ce116814a29b18b617ea38752e4659b
SHA51267ecd9a07df0a07edd010f7e3732f3d829f482d67869d6bce0c9a61c24c0fdc5ff4f4e4780b9211062a6371945121d8883ba2e9e2cf8eb07b628547312dfe4c9
-
Filesize
125KB
MD5d4e5be27410897ac5771966e33b418c7
SHA15d18ff3cc196557ed40f2f46540b2bfe02901d98
SHA2563e625978d7c55f4b609086a872177c4207fb483c7715e2204937299531394f4c
SHA5124d40b4c6684d3549c35ed96bedd6707ce32dfaa8071aeadfbc682cf4b7520cff08472f441c50e0d391a196510f8f073f26ae8b2d1e9b1af5cf487259cc6ccc09
-
Filesize
177KB
MD51c0e3e447f719fbe2601d0683ea566fc
SHA15321ab73b36675b238ab3f798c278195223cd7b1
SHA25663ae2fefbfbbbc6ea39cde0a622579d46ff55134bc8c1380289a2976b61f603e
SHA512e1a430da2a2f6e0a1aed7a76cc4cd2760b3164abc20be304c1db3541119942508e53ea3023a52b8bada17a6052a7a51a4453efad1a888acb3b196881226c2e5c
-
Filesize
25KB
MD53acf3138d5550ca6de7e2580e076e0f7
SHA13e878a18df2362aa6f0bdbfa058dca115e70d0b8
SHA256f9d5008f0772aa0720bc056a6ecd5a2a3f24965e4b470b022d88627a436c1ffe
SHA512f05e90a0feaa2994b425884af32149fbbe2e11cb7499fc88ca92d8a74410edcd62b2b2c0f1ecd1a46985133f7e89575f2c114bd01f619c22ce52f3cf2a7e37c4
-
Filesize
37KB
MD51c30cc7df3bd168d883e93c593890b43
SHA131465425f349dae4edac9d0feabc23ce83400807
SHA2566435c679a3a3ff4f16708ebc43f7ca62456c110ac1ea94f617d8052c90c143c7
SHA512267a1807298797b190888f769d998357b183526dfcb25a6f1413e64c5dccf87f51424b7e5d6f2349d7a19381909ab23b138748d8d9f5858f7dc0552f5c5846ac
-
Filesize
257KB
MD57783c5b3181ab31c750f3a77658e0952
SHA17a610ad121a90ba147527d6971be97e9f2b18836
SHA256559abe01c7f5ba62e61613754a64a350b0a4e4305f22b5d42005fac28ba00d28
SHA512f8c0a4bce3ce38cdae79e384c2eaf2706eca4e5a6e5123ae4f8de866d05b58a697c38f9221e9bb7ed3954a7567ce8b7c0123ccd60f5f8e2ff6df7bdca890c1c4
-
Filesize
47KB
MD50f2e3e125e637b65e4032e34e0f7db58
SHA144f49ed5631f6ce1d0d16ce990c8d62e6841e120
SHA256904f259ac223c31e958c19f734d2e54bd13bb5d4e95fb5a6c101825515ae02ab
SHA51259639688b1db8011410e381bc70d8e6282b1ff02e217ae01ec9d7d77e09589da63c0a915c725b6272de95def430ed4bc0913d78f4b1df586c8c0d65a157da39b
-
Filesize
1.3MB
MD5a9cbd0455b46c7d14194d1f18ca8719e
SHA1e1b0c30bccd9583949c247854f617ac8a14cbac7
SHA256df6c19637d239bfedc8cd13d20e0938c65e8fdf340622ff334db533f2d30fa19
SHA512b92468e71490a8800e51410df7068dd8099e78c79a95666ecf274a9e9206359f049490b8f60b96081fafd872ec717e67020364bcfa972f26f0d77a959637e528
-
Filesize
7.9MB
MD534293b976da366d83c12d8ee05de7b03
SHA182b8eb434c26fcc3a5d9673c9b93663c0ff9bf15
SHA256a2285c3f2f7e63ba8a17ab5d0a302740e6adf7e608e0707a7737c1ec3bd8cecc
SHA5120807ec7515186f0a989bb667150a84ff3bebcc248625597ba0be3c6f07ad60d70cf8a3f65191436ec16042f446d4248bf92fcd02212e459405948db10f078b8e
-
Filesize
5.0MB
MD5123ad0908c76ccba4789c084f7a6b8d0
SHA186de58289c8200ed8c1fc51d5f00e38e32c1aad5
SHA2564e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43
SHA51280fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
774KB
MD54ff168aaa6a1d68e7957175c8513f3a2
SHA1782f886709febc8c7cebcec4d92c66c4d5dbcf57
SHA2562e4d35b681a172d3298caf7dc670451be7a8ba27c26446efc67470742497a950
SHA512c372b759b8c7817f2cbb78eccc5a42fa80bdd8d549965bd925a97c3eebdce0335fbfec3995430064dead0f4db68ebb0134eb686a0be195630c49f84b468113e3
-
Filesize
46KB
MD5113a209e8167ddd2da9b4b73ef0b0229
SHA1198b613a362b6432bd42a668ad27c744cde9c348
SHA2569470add15fae0be67f79d2abe2e9eefe6b573cc2254b688565161b8e7561e6ab
SHA512eda70a5f8af14a84d0c59e795c4df42af34b1ba6ea0185a01709d8f04a658f25f3f88164d1b9594c0e487963cdc3a02bc5bffd5e0976aa30813b359af78ace1f
-
Filesize
71KB
MD5e780c9eebe237208cd71987ac15d94e2
SHA1257da5d8a050ee2609b19b8e3e57601abc4d76ed
SHA2563a5a51c8fb2555f9d78886fd78c84eb62e3da342cd8c0f3f73929d82719bcd64
SHA512643372f0d5b2be441db6f21049aba350f21a8ed93a65159156dafd2c46d3eff9f3549ef7178775d32ba67ba552827ae866098a69004204906f48107fe373b6b8
-
Filesize
196KB
MD5cf2c3d127f11cb2c026e151956745564
SHA1b1c8c432fc737d6f455d8f642a4f79ad95a97bd3
SHA256d3e81017b4a82ae1b85e8cd6b9b7eb04d8817e29e5bc9ece549ac24c8bb2ff23
SHA512fe3a9c8122ffff4af7a51df39d40df18e9db3bc4aed6b161a4be40a586ac93c1901acdf64cc5bfff6975d22073558fc7a37399d016296432057b8150848f636e
-
Filesize
68KB
MD516855ebef31c5b1ebe767f1c617645b3
SHA1315521f3a748abfa35cd4d48e8dd09d0556d989b
SHA256a5c6a329698490a035133433928d04368ce6285bb91a9d074fc285de4c9a32a4
SHA512c3957b3bd36b10c7ad6ea1ff3bc7bd65cdceb3e6b4195a25d0649aa0da179276ce170da903d77b50a38fc3d5147a45be32dbcfdbfbf76cc46301199c529adea4
-
Filesize
5.8MB
MD5b9de917b925dd246b709bb4233777efd
SHA1775f258d8b530c6ea9f0dd3d1d0b61c1948c25d2
SHA2560c0a66505093b6a4bb3475f716bd3d9552095776f6a124709c13b3f9552c7d99
SHA512f4bf3398f50fdd3ab7e3f02c1f940b4c8b5650ed7af16c626ccd1b934053ba73a35f96da03b349c1eb614bb23e0bc6b5cc58b07b7553a5c93c6d23124f324a33
-
Filesize
30KB
MD520831703486869b470006941b4d996f2
SHA128851dfd43706542cd3ef1b88b5e2749562dfee0
SHA25678e5994c29d8851f28b5b12d59d742d876683aea58eceea1fb895b2036cdcdeb
SHA5124aaf5d66d2b73f939b9a91e7eddfeb2ce2476c625586ef227b312230414c064aa850b02a4028363aa4664408c9510594754530a6d026a0a84be0168d677c1bc4
-
Filesize
1KB
MD54ce7501f6608f6ce4011d627979e1ae4
SHA178363672264d9cd3f72d5c1d3665e1657b1a5071
SHA25637fedcffbf73c4eb9f058f47677cb33203a436ff9390e4d38a8e01c9dad28e0b
SHA512a4cdf92725e1d740758da4dd28df5d1131f70cef46946b173fe6956cc0341f019d7c4fecc3c9605f354e1308858721dada825b4c19f59c5ad1ce01ab84c46b24
-
Filesize
1.5MB
MD57e632f3263d5049b14f5edc9e7b8d356
SHA192c5b5f96f1cba82d73a8f013cbaf125cd0898b8
SHA25666771fbd64e2d3b8514dd0cd319a04ca86ce2926a70f7482ddec64049e21be38
SHA512ca1cc67d3eb63bca3ce59ef34becce48042d7f93b807ffcd4155e4c4997dc8b39919ae52ab4e5897ae4dbcb47592c4086fac690092caa7aa8d3061fba7fe04a2
-
Filesize
693KB
MD50902d299a2a487a7b0c2d75862b13640
SHA104bcbd5a11861a03a0d323a8050a677c3a88be13
SHA2562693c7ee4fba55dc548f641c0cb94485d0e18596ffef16541bd43a5104c28b20
SHA5128cbef5a9f2d24da1014f8f1ccbddd997a084a0b04dd56bcb6ac38ddb636d05ef7e4ea7f67a085363aad3f43d45413914e55bdef14a662e80be955e6dfc2feca3
-
Filesize
94KB
MD58fb4a79b2c7cfe657adffff4c3d2859e
SHA13d44aeebb7de1789f04d89d221febf9fea4f27d2
SHA2561ddb9fc16b1afbb73e1415054dd13e187369b1d456ddcd31bd88bbd3e5006c3e
SHA5120a307a1ff593e86dd2c69f1a4aaf6de8d4ae5e9c4fab4353226e2853de7bc524d794ffa29c853694dd6c588803b26c1b801bb6b23712cfdea9f8eb26a2e2fba5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82