Overview
overview
10Static
static
48a2abab20b...9d.exe
windows7-x64
108a2abab20b...9d.exe
windows10-2004-x64
108a2abab20b...9d.exe
android-13-x64
8a2abab20b...9d.exe
android-13-x64
8a2abab20b...9d.exe
macos-10.15-amd64
8a2abab20b...9d.exe
ubuntu-18.04-amd64
8a2abab20b...9d.exe
debian-9-armhf
8a2abab20b...9d.exe
debian-9-mips
8a2abab20b...9d.exe
debian-9-mipsel
Analysis
-
max time kernel
299s -
max time network
306s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21/01/2025, 11:47
Behavioral task
behavioral1
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
macos-20241106-en
Behavioral task
behavioral6
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral7
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral8
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral9
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
debian9-mipsel-20240226-en
General
-
Target
8a2abab20bf75ac19eaa73be3b09219d.exe
-
Size
455KB
-
MD5
8a2abab20bf75ac19eaa73be3b09219d
-
SHA1
c0fa652bb151644bf76b55f3c9d68cb5e8d7faf3
-
SHA256
866ac65940057d6e1a125eda23a12d6743d75e6ff3a74ff6d53debb3fe90a368
-
SHA512
e8842b9f47a5dce906ddca3dfbb608eba660c80364ed0b02b48c33e161df3e95226d713177733e7591cc7eccecb3f48e1a731576a90d6fbda194de98de5495c9
-
SSDEEP
12288:gPn4HHOqpc/Xzm9HtpiuJZoEMkEbSvxJxhF3eggJG:gPn6pc/WHtplJCDkE2/PNz
Malware Config
Extracted
asyncrat
0.5.7B
Default
sbmsbm20.duckdns.org:2020
sbmsbm20.duckdns.org:3040
sbmsbm20.duckdns.org:4040
hpdndbnb.duckdns.org:2020
hpdndbnb.duckdns.org:3040
hpdndbnb.duckdns.org:4040
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Acrobat Reader.exe
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Adobe.exe\"," 8a2abab20bf75ac19eaa73be3b09219d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Adobe.exe\"," Acrobat Reader.exe -
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/files/0x000800000001960c-2021.dat Nirsoft -
Executes dropped EXE 10 IoCs
pid Process 3420 AdvancedRun.exe 3516 AdvancedRun.exe 3552 AdvancedRun.exe 3616 AdvancedRun.exe 4064 Acrobat Reader.exe 9064 AdvancedRun.exe 9128 AdvancedRun.exe 9152 AdvancedRun.exe 9188 AdvancedRun.exe 5904 Acrobat Reader.exe -
Loads dropped DLL 18 IoCs
pid Process 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 3420 AdvancedRun.exe 3420 AdvancedRun.exe 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 3552 AdvancedRun.exe 3552 AdvancedRun.exe 3972 cmd.exe 4064 Acrobat Reader.exe 4064 Acrobat Reader.exe 9064 AdvancedRun.exe 9064 AdvancedRun.exe 4064 Acrobat Reader.exe 4064 Acrobat Reader.exe 9152 AdvancedRun.exe 9152 AdvancedRun.exe 4064 Acrobat Reader.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2100 set thread context of 3660 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 4064 set thread context of 5904 4064 Acrobat Reader.exe 46 -
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
resource yara_rule behavioral1/files/0x00080000000197fd-2057.dat pdf_with_link_action -
Access Token Manipulation: Create Process with Token 1 TTPs 4 IoCs
pid Process 9152 AdvancedRun.exe 3420 AdvancedRun.exe 3552 AdvancedRun.exe 9064 AdvancedRun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a2abab20bf75ac19eaa73be3b09219d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a2abab20bf75ac19eaa73be3b09219d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acrobat Reader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acrobat Reader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4032 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4012 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3420 AdvancedRun.exe 3420 AdvancedRun.exe 3516 AdvancedRun.exe 3516 AdvancedRun.exe 3552 AdvancedRun.exe 3552 AdvancedRun.exe 3616 AdvancedRun.exe 3616 AdvancedRun.exe 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 3660 8a2abab20bf75ac19eaa73be3b09219d.exe 9064 AdvancedRun.exe 9064 AdvancedRun.exe 9128 AdvancedRun.exe 9128 AdvancedRun.exe 9152 AdvancedRun.exe 9152 AdvancedRun.exe 9188 AdvancedRun.exe 9188 AdvancedRun.exe 4064 Acrobat Reader.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 2100 8a2abab20bf75ac19eaa73be3b09219d.exe Token: SeDebugPrivilege 3420 AdvancedRun.exe Token: SeImpersonatePrivilege 3420 AdvancedRun.exe Token: SeDebugPrivilege 3516 AdvancedRun.exe Token: SeImpersonatePrivilege 3516 AdvancedRun.exe Token: SeDebugPrivilege 3552 AdvancedRun.exe Token: SeImpersonatePrivilege 3552 AdvancedRun.exe Token: SeDebugPrivilege 3616 AdvancedRun.exe Token: SeImpersonatePrivilege 3616 AdvancedRun.exe Token: SeDebugPrivilege 3660 8a2abab20bf75ac19eaa73be3b09219d.exe Token: SeDebugPrivilege 4064 Acrobat Reader.exe Token: SeDebugPrivilege 9064 AdvancedRun.exe Token: SeImpersonatePrivilege 9064 AdvancedRun.exe Token: SeDebugPrivilege 9128 AdvancedRun.exe Token: SeImpersonatePrivilege 9128 AdvancedRun.exe Token: SeDebugPrivilege 9152 AdvancedRun.exe Token: SeImpersonatePrivilege 9152 AdvancedRun.exe Token: SeDebugPrivilege 9188 AdvancedRun.exe Token: SeImpersonatePrivilege 9188 AdvancedRun.exe Token: SeDebugPrivilege 5904 Acrobat Reader.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2100 wrote to memory of 3420 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 30 PID 2100 wrote to memory of 3420 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 30 PID 2100 wrote to memory of 3420 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 30 PID 2100 wrote to memory of 3420 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 30 PID 3420 wrote to memory of 3516 3420 AdvancedRun.exe 31 PID 3420 wrote to memory of 3516 3420 AdvancedRun.exe 31 PID 3420 wrote to memory of 3516 3420 AdvancedRun.exe 31 PID 3420 wrote to memory of 3516 3420 AdvancedRun.exe 31 PID 2100 wrote to memory of 3552 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 32 PID 2100 wrote to memory of 3552 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 32 PID 2100 wrote to memory of 3552 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 32 PID 2100 wrote to memory of 3552 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 32 PID 3552 wrote to memory of 3616 3552 AdvancedRun.exe 33 PID 3552 wrote to memory of 3616 3552 AdvancedRun.exe 33 PID 3552 wrote to memory of 3616 3552 AdvancedRun.exe 33 PID 3552 wrote to memory of 3616 3552 AdvancedRun.exe 33 PID 2100 wrote to memory of 3660 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 2100 wrote to memory of 3660 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 2100 wrote to memory of 3660 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 2100 wrote to memory of 3660 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 2100 wrote to memory of 3660 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 2100 wrote to memory of 3660 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 2100 wrote to memory of 3660 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 2100 wrote to memory of 3660 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 2100 wrote to memory of 3660 2100 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 3660 wrote to memory of 3904 3660 8a2abab20bf75ac19eaa73be3b09219d.exe 35 PID 3660 wrote to memory of 3904 3660 8a2abab20bf75ac19eaa73be3b09219d.exe 35 PID 3660 wrote to memory of 3904 3660 8a2abab20bf75ac19eaa73be3b09219d.exe 35 PID 3660 wrote to memory of 3904 3660 8a2abab20bf75ac19eaa73be3b09219d.exe 35 PID 3660 wrote to memory of 3972 3660 8a2abab20bf75ac19eaa73be3b09219d.exe 37 PID 3660 wrote to memory of 3972 3660 8a2abab20bf75ac19eaa73be3b09219d.exe 37 PID 3660 wrote to memory of 3972 3660 8a2abab20bf75ac19eaa73be3b09219d.exe 37 PID 3660 wrote to memory of 3972 3660 8a2abab20bf75ac19eaa73be3b09219d.exe 37 PID 3904 wrote to memory of 4012 3904 cmd.exe 39 PID 3904 wrote to memory of 4012 3904 cmd.exe 39 PID 3904 wrote to memory of 4012 3904 cmd.exe 39 PID 3904 wrote to memory of 4012 3904 cmd.exe 39 PID 3972 wrote to memory of 4032 3972 cmd.exe 40 PID 3972 wrote to memory of 4032 3972 cmd.exe 40 PID 3972 wrote to memory of 4032 3972 cmd.exe 40 PID 3972 wrote to memory of 4032 3972 cmd.exe 40 PID 3972 wrote to memory of 4064 3972 cmd.exe 41 PID 3972 wrote to memory of 4064 3972 cmd.exe 41 PID 3972 wrote to memory of 4064 3972 cmd.exe 41 PID 3972 wrote to memory of 4064 3972 cmd.exe 41 PID 4064 wrote to memory of 9064 4064 Acrobat Reader.exe 42 PID 4064 wrote to memory of 9064 4064 Acrobat Reader.exe 42 PID 4064 wrote to memory of 9064 4064 Acrobat Reader.exe 42 PID 4064 wrote to memory of 9064 4064 Acrobat Reader.exe 42 PID 9064 wrote to memory of 9128 9064 AdvancedRun.exe 43 PID 9064 wrote to memory of 9128 9064 AdvancedRun.exe 43 PID 9064 wrote to memory of 9128 9064 AdvancedRun.exe 43 PID 9064 wrote to memory of 9128 9064 AdvancedRun.exe 43 PID 4064 wrote to memory of 9152 4064 Acrobat Reader.exe 44 PID 4064 wrote to memory of 9152 4064 Acrobat Reader.exe 44 PID 4064 wrote to memory of 9152 4064 Acrobat Reader.exe 44 PID 4064 wrote to memory of 9152 4064 Acrobat Reader.exe 44 PID 9152 wrote to memory of 9188 9152 AdvancedRun.exe 45 PID 9152 wrote to memory of 9188 9152 AdvancedRun.exe 45 PID 9152 wrote to memory of 9188 9152 AdvancedRun.exe 45 PID 9152 wrote to memory of 9188 9152 AdvancedRun.exe 45 PID 4064 wrote to memory of 5904 4064 Acrobat Reader.exe 46 PID 4064 wrote to memory of 5904 4064 Acrobat Reader.exe 46 PID 4064 wrote to memory of 5904 4064 Acrobat Reader.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a2abab20bf75ac19eaa73be3b09219d.exeC:\Users\Admin\AppData\Local\Temp\8a2abab20bf75ac19eaa73be3b09219d.exe sh $MOZILLA\nPLUGIN %SIGILL% "SIGTERM|DESTROY|SIGKILL"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 34203⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 35523⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
-
C:\Users\Admin\AppData\Local\Temp\8a2abab20bf75ac19eaa73be3b09219d.exeC:\Users\Admin\AppData\Local\Temp\8a2abab20bf75ac19eaa73be3b09219d.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Acrobat Reader" /tr '"C:\Users\Admin\AppData\Local\Temp\Acrobat Reader.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Acrobat Reader" /tr '"C:\Users\Admin\AppData\Local\Temp\Acrobat Reader.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4012
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp6E.tmp.bat""3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\Acrobat Reader.exe"C:\Users\Admin\AppData\Local\Temp\Acrobat Reader.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run5⤵
- Executes dropped EXE
- Loads dropped DLL
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:9064 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 90646⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:9128
-
-
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run5⤵
- Executes dropped EXE
- Loads dropped DLL
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:9152 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 91526⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:9188
-
-
-
C:\Users\Admin\AppData\Local\Temp\Acrobat Reader.exe"C:\Users\Admin\AppData\Local\Temp\Acrobat Reader.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5904
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD517fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
Filesize
159B
MD5390f512f1c0c85539b0a0168ea9568aa
SHA1ee0b3407316303b6d412c22c5feaca8ca0c87d9c
SHA25633b276480b054ebe214df9b11aab74d50b7132e509f20542307b6d37ecd6c8f5
SHA51229eb1f47c933b3315730d52231178e81aba19e65dffe347a6e4ebb24e24644e8954ccd83d846622284fab2c707f0a0de46f438dc43478c7a571fefad268b6146
-
Filesize
455KB
MD58a2abab20bf75ac19eaa73be3b09219d
SHA1c0fa652bb151644bf76b55f3c9d68cb5e8d7faf3
SHA256866ac65940057d6e1a125eda23a12d6743d75e6ff3a74ff6d53debb3fe90a368
SHA512e8842b9f47a5dce906ddca3dfbb608eba660c80364ed0b02b48c33e161df3e95226d713177733e7591cc7eccecb3f48e1a731576a90d6fbda194de98de5495c9