Analysis
-
max time kernel
133s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 05:23
Static task
static1
Behavioral task
behavioral1
Sample
SPOOFER.exe
Resource
win7-20241010-en
General
-
Target
SPOOFER.exe
-
Size
100KB
-
MD5
16a83a02e42ff5cccf920ab083ae38b8
-
SHA1
882dce9a3edb6908d02605594018a23b729052b6
-
SHA256
b51ff988152a1d96407941ee19298e7e4ce8035ce6dff054c3b439110dfb101d
-
SHA512
4ebd72f8a79884a90a71ba587fb2a6609a0a76a8d58e6d1d574dc280b7be71f4771a5fcf32d4c4d248ce4e0b5cd87aac04731e4f815ef2927eab26812f26d940
-
SSDEEP
3072:JoJpXPp1M4lq34QZ48dvVfyFp23HjQID+0w:ux1Hs4YBdvVauhL
Malware Config
Extracted
xworm
logo-kerry.gl.at.ply.gg:23249
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/1408-12-0x0000000000400000-0x000000000041A000-memory.dmp family_xworm -
Xworm family
-
pid Process 1956 powershell.exe 1984 powershell.exe 4468 powershell.exe 728 powershell.exe 1704 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SYSTEM.lnk RegAsm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SYSTEM.lnk RegAsm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SPOOFER = "C:\\Users\\Admin\\AppData\\Roaming\\SPOOFER\\SPOOFER.exe" powershell.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2624 set thread context of 1408 2624 SPOOFER.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SPOOFER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 2624 SPOOFER.exe 1956 powershell.exe 1956 powershell.exe 1704 powershell.exe 1704 powershell.exe 1984 powershell.exe 1984 powershell.exe 4468 powershell.exe 4468 powershell.exe 728 powershell.exe 728 powershell.exe 1408 RegAsm.exe 3584 msedge.exe 3584 msedge.exe 1956 msedge.exe 1956 msedge.exe 1188 identity_helper.exe 1188 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2624 SPOOFER.exe Token: SeDebugPrivilege 1408 RegAsm.exe Token: SeDebugPrivilege 1956 powershell.exe Token: SeDebugPrivilege 1704 powershell.exe Token: SeDebugPrivilege 1984 powershell.exe Token: SeDebugPrivilege 4468 powershell.exe Token: SeDebugPrivilege 728 powershell.exe Token: SeDebugPrivilege 1408 RegAsm.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1408 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2624 wrote to memory of 1956 2624 SPOOFER.exe 96 PID 2624 wrote to memory of 1956 2624 SPOOFER.exe 96 PID 2624 wrote to memory of 1956 2624 SPOOFER.exe 96 PID 2624 wrote to memory of 1408 2624 SPOOFER.exe 98 PID 2624 wrote to memory of 1408 2624 SPOOFER.exe 98 PID 2624 wrote to memory of 1408 2624 SPOOFER.exe 98 PID 2624 wrote to memory of 1408 2624 SPOOFER.exe 98 PID 2624 wrote to memory of 1408 2624 SPOOFER.exe 98 PID 2624 wrote to memory of 1408 2624 SPOOFER.exe 98 PID 2624 wrote to memory of 1408 2624 SPOOFER.exe 98 PID 2624 wrote to memory of 1408 2624 SPOOFER.exe 98 PID 1408 wrote to memory of 1704 1408 RegAsm.exe 101 PID 1408 wrote to memory of 1704 1408 RegAsm.exe 101 PID 1408 wrote to memory of 1704 1408 RegAsm.exe 101 PID 1408 wrote to memory of 1984 1408 RegAsm.exe 104 PID 1408 wrote to memory of 1984 1408 RegAsm.exe 104 PID 1408 wrote to memory of 1984 1408 RegAsm.exe 104 PID 1408 wrote to memory of 4468 1408 RegAsm.exe 107 PID 1408 wrote to memory of 4468 1408 RegAsm.exe 107 PID 1408 wrote to memory of 4468 1408 RegAsm.exe 107 PID 1408 wrote to memory of 728 1408 RegAsm.exe 110 PID 1408 wrote to memory of 728 1408 RegAsm.exe 110 PID 1408 wrote to memory of 728 1408 RegAsm.exe 110 PID 1956 wrote to memory of 2304 1956 msedge.exe 115 PID 1956 wrote to memory of 2304 1956 msedge.exe 115 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116 PID 1956 wrote to memory of 1604 1956 msedge.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\SPOOFER.exe"C:\Users\Admin\AppData\Local\Temp\SPOOFER.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SPOOFER';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SPOOFER' -Value '"C:\Users\Admin\AppData\Roaming\SPOOFER\SPOOFER.exe"' -PropertyType 'String'2⤵
- Command and Scripting Interpreter: PowerShell
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks computer location settings
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RegAsm.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\SYSTEM'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SYSTEM'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:728
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fff606346f8,0x7fff60634708,0x7fff606347182⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14052282929109202641,18356069506868255762,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,14052282929109202641,18356069506868255762,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,14052282929109202641,18356069506868255762,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14052282929109202641,18356069506868255762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14052282929109202641,18356069506868255762,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14052282929109202641,18356069506868255762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14052282929109202641,18356069506868255762,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,14052282929109202641,18356069506868255762,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3648 /prefetch:82⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,14052282929109202641,18356069506868255762,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14052282929109202641,18356069506868255762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14052282929109202641,18356069506868255762,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14052282929109202641,18356069506868255762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4272 /prefetch:12⤵PID:4704
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55315900105942deb090a358a315b06fe
SHA122fe5d2e1617c31afbafb91c117508d41ef0ce44
SHA256e8bd7d8d1d0437c71aceb032f9fb08dd1147f41c048540254971cc60e95d6cd7
SHA51277e8d15b8c34a1cb01dbee7147987e2cc25c747e0f80d254714a93937a6d2fe08cb5a772cf85ceb8fec56415bfa853234a003173718c4229ba8cfcf2ce6335a6
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
5KB
MD57ca84f26ca339fc0dc17d8901cf094c9
SHA1ef351b301192460e7f3c7f4006a4a27beebde668
SHA25661c3b683970583bfc8864008df7b931b2646327c60dd42b67e55d96520e9096b
SHA512dd2d83528a890de14e4dae30573097fe01cc8b460d9d29870826565549f896a9d60c23b4fa8e6d66c5cfe22034717b89776d208f7652ea73a6edb2698ec3b108
-
Filesize
6KB
MD57c1adae62ac6ad0b88ded3f03724497e
SHA132ed3d49517e6ac0505b175d656727a9cb63f634
SHA25638833ea7670c7320b31c76a6d5a4e87e32f5c6a13de4c88a57984e034cbc5d70
SHA5122883317c4f871e0091a979e09b4a736441830051cd64331b4694eff54034b6ff9cf3c087efe6fba4008f669294199991da24aaede10fc09cf82bab67829457b7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5816c2ffe6e0b93ac23625c00d48e6c4c
SHA18aca48b2175b2035ddeb52ce4223066499571977
SHA256aa647c2f3d2961f1e5669d090873eeb60e200720eb4abeb599eb2bd57c6cb4a8
SHA512fd2d9fe2f730e0a8c0f8a3b0185b3aae338ed80fdae86e2f98f0196b6835e221fbebddf609c85f7f2b3688dc9fafd43945020be5b235aa2615c2b9d9f34a5fb5
-
Filesize
18KB
MD505cb4ee237e3b466f281898598dea4e9
SHA1c702d964144f032bb1b42c9f32137dbe13064b5f
SHA25692c499b23a13b50d949ec3d3ae54b83dd552cc6fed32322150b0ffd3711d9cb6
SHA5122d4c0756de82b6f0b82bf46900bead2b52034d44e7ea8e5e45040aec084c593253b0421b7b0b20661438c471d6e062f0e4552df0399af1fa66178b09b54671ef
-
Filesize
18KB
MD5edb46210edbaa324cf1916bb0890353d
SHA13cb36ce4f0c920814a4bbf197fbcd66603d00068
SHA256e1dc8f48936f012048e76a4499f8358d3132f784b91c81f4c62c9e56a034eb7b
SHA512bb24b5e58a26f2f4f447b98d8f022a4dd9cfb392ddcab61ee88222366b8581de65b2112c305e04fbf9b903ede85d795e886676fe68bcc994fd82f22fc99cf95a
-
Filesize
18KB
MD504a644934c8fc49bbc6c4b8e047fcc17
SHA14aef544417fa11024d7ca543dbdc96f2afe84486
SHA25666b8c2caed40fc448e0fc5305acb4ffc515fd62ca4f2e1681d58d4fa2b4a0a81
SHA512d4da1277298d55ee35449498ff669557a2819ded7c4ce8a623d0a8bddb2a576573c3fb7863815850996376539f99ca323ebb17847138b0332cffe0ab75914cfd
-
Filesize
18KB
MD5e2842b39c33e898c51e934f723037f35
SHA160e20dc3370414f8144f4be0f3110352044044a3
SHA256177188d78f3aeba122f2ddc47c8d5b54b8a9a642ecf2783f115a80cdbdaab0ff
SHA51278b9d3c6ef2d551e2a0c08f9a373764bd57036c3e632e21384da3f8079f509173374069464cdfbb9a4dd87f3c003a0c70d01316a1466d80c87c45baf0bdcca7c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82