Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24-01-2025 22:04

General

  • Target

    NetCat Loader.exe

  • Size

    76KB

  • MD5

    1a56b39b62cff3bf7a75a708f6a11762

  • SHA1

    180d91a57ebb95a81bfaa394bca35c123efa916e

  • SHA256

    ad34f6a17ee318591b59ac4fbc300c53808630e4f163b644a58eadc85057348a

  • SHA512

    b86dfa4287e283fd7e734cc3897589c2bb6b98e35f1c82a6ab50f271baf8a9748a125a6c04425ccdf93566ddacb453290a9a63e5fc0d2797b70fb70b6dac03fb

  • SSDEEP

    1536:JqDtM7DwroXh9bSQ6/jyrV9nmRWnXzWb6Alyj:EwblSlryrV9nmwPeyj

Malware Config

Extracted

Family

xworm

C2

194.59.31.87:1111

Attributes
  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Disables Task Manager via registry modification
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 26 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 10 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies registry class 2 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NetCat Loader.exe
    "C:\Users\Admin\AppData\Local\Temp\NetCat Loader.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:432
    • C:\Users\Admin\AppData\Roaming\System32.exe
      "C:\Users\Admin\AppData\Roaming\System32.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\System32.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1588
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System32.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1372
      • C:\Users\Admin\AppData\Local\Temp\qajeof.exe
        "C:\Users\Admin\AppData\Local\Temp\qajeof.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:888
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8CDA.tmp\PanKoza.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4924
          • C:\Windows\SysWOW64\timeout.exe
            timeout 5 /nobreak
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:2944
          • C:\Users\Admin\AppData\Local\Temp\8CDA.tmp\MBRPayload.exe
            MBRPayload.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Writes to the Master Boot Record (MBR)
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3832
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks.exe /Create /TN "Windows Update" /ru SYSTEM /SC ONSTART /TR "C:\Users\Admin\AppData\Local\Temp\8CDA.tmp\MBRPayload.exe"
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:4276
          • C:\Windows\SysWOW64\reg.exe
            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:2724
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8CDA.tmp\note.vbs"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3548
          • C:\Windows\SysWOW64\timeout.exe
            timeout 3 /nobreak
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:4956
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8CDA.tmp\sites.vbs"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4440
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/channel/UCTmub7HjR9Kc8Uh-Vy3eLaw
              6⤵
              • Enumerates system info in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:4528
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb707f3cb8,0x7ffb707f3cc8,0x7ffb707f3cd8
                7⤵
                  PID:3860
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,14859220676247170704,17139596169204045608,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:2
                  7⤵
                    PID:2456
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,14859220676247170704,17139596169204045608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1956 /prefetch:3
                    7⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2248
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,14859220676247170704,17139596169204045608,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2508 /prefetch:8
                    7⤵
                      PID:4144
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,14859220676247170704,17139596169204045608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:1
                      7⤵
                        PID:3368
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,14859220676247170704,17139596169204045608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:1
                        7⤵
                          PID:2780
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,14859220676247170704,17139596169204045608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:1
                          7⤵
                            PID:2964
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1908,14859220676247170704,17139596169204045608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 /prefetch:8
                            7⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4680
                          • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,14859220676247170704,17139596169204045608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:8
                            7⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2284
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,14859220676247170704,17139596169204045608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:1
                            7⤵
                              PID:2020
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,14859220676247170704,17139596169204045608,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:1
                              7⤵
                                PID:1256
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,14859220676247170704,17139596169204045608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4460 /prefetch:1
                                7⤵
                                  PID:3440
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,14859220676247170704,17139596169204045608,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:1
                                  7⤵
                                    PID:3104
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,14859220676247170704,17139596169204045608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1112 /prefetch:1
                                    7⤵
                                      PID:1504
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,14859220676247170704,17139596169204045608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:1
                                      7⤵
                                        PID:4624
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,14859220676247170704,17139596169204045608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:1
                                        7⤵
                                          PID:3124
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,14859220676247170704,17139596169204045608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2492 /prefetch:1
                                          7⤵
                                            PID:2528
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://memz.download/
                                          6⤵
                                            PID:1920
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb707f3cb8,0x7ffb707f3cc8,0x7ffb707f3cd8
                                              7⤵
                                                PID:4444
                                          • C:\Users\Admin\AppData\Local\Temp\8CDA.tmp\melter.exe
                                            melter.exe
                                            5⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:5092
                                          • C:\Windows\SysWOW64\timeout.exe
                                            timeout 6 /nobreak
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            • Delays execution with timeout.exe
                                            PID:4932
                                          • C:\Windows\SysWOW64\taskkill.exe
                                            taskkill /f /im melter.exe
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1960
                                          • C:\Windows\SysWOW64\timeout.exe
                                            timeout 3 /nobreak
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            • Delays execution with timeout.exe
                                            PID:708
                                          • C:\Users\Admin\AppData\Local\Temp\8CDA.tmp\Craze.exe
                                            Craze.exe
                                            5⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:1688
                                          • C:\Windows\SysWOW64\timeout.exe
                                            timeout 4 /nobreak
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            • Delays execution with timeout.exe
                                            PID:4232
                                          • C:\Windows\SysWOW64\taskkill.exe
                                            taskkill /f /im craze.exe
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:552
                                          • C:\Windows\SysWOW64\timeout.exe
                                            timeout 1
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            • Delays execution with timeout.exe
                                            PID:3716
                                          • C:\Users\Admin\AppData\Local\Temp\8CDA.tmp\screenscrew.exe
                                            screenscrew.exe
                                            5⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:1520
                                          • C:\Windows\SysWOW64\timeout.exe
                                            timeout 3 /nobreak
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            • Delays execution with timeout.exe
                                            PID:1920
                                          • C:\Users\Admin\AppData\Local\Temp\8CDA.tmp\lines.exe
                                            lines.exe
                                            5⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:2420
                                          • C:\Windows\SysWOW64\timeout.exe
                                            timeout 5 /nobreak
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            • Delays execution with timeout.exe
                                            PID:1664
                                          • C:\Users\Admin\AppData\Local\Temp\8CDA.tmp\INV.exe
                                            INV.exe
                                            5⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:1928
                                          • C:\Windows\SysWOW64\timeout.exe
                                            timeout 6 /nobreak
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            • Delays execution with timeout.exe
                                            PID:5028
                                          • C:\Users\Admin\AppData\Local\Temp\8CDA.tmp\Craze.exe
                                            craze.exe
                                            5⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:5052
                                          • C:\Windows\SysWOW64\timeout.exe
                                            timeout 8 /nobreak
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            • Delays execution with timeout.exe
                                            PID:4740
                                          • C:\Windows\SysWOW64\shutdown.exe
                                            shutdown /r /t 1000 /c "It's Your final 1000 seconds to use Windows"
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2956
                                    • C:\Windows\system32\NOTEPAD.EXE
                                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Thanks For Using.txt
                                      2⤵
                                        PID:2348
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:1444
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:3448
                                        • C:\Windows\system32\AUDIODG.EXE
                                          C:\Windows\system32\AUDIODG.EXE 0x00000000000004EC 0x00000000000004CC
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3108

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                          Filesize

                                          2KB

                                          MD5

                                          627073ee3ca9676911bee35548eff2b8

                                          SHA1

                                          4c4b68c65e2cab9864b51167d710aa29ebdcff2e

                                          SHA256

                                          85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

                                          SHA512

                                          3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          e9a2c784e6d797d91d4b8612e14d51bd

                                          SHA1

                                          25e2b07c396ee82e4404af09424f747fc05f04c2

                                          SHA256

                                          18ddbb93c981d8006071f9d26924ce3357cad212cbb65f48812d4a474c197ce6

                                          SHA512

                                          fc35688ae3cd448ed6b2069d39ce1219612c54f5bb0dd7b707c9e6f39450fe9fb1338cf5bd0b82a45207fac2fbab1e0eae77e5c9e6488371390eab45f76a5df1

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          1fc959921446fa3ab5813f75ca4d0235

                                          SHA1

                                          0aeef3ba7ba2aa1f725fca09432d384b06995e2a

                                          SHA256

                                          1b1e89d3b2f3da84cc8494d07cf0babc472c426ccb1c4ae13398243360c9d02c

                                          SHA512

                                          899d1e1b0feece25ac97527daddcaaeb069cb428532477849eba43a627502c590261f2c26fef31e4e20efd3d7eb0815336a784c4d2888e05afcf5477af872b06

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          240B

                                          MD5

                                          15b060fce6108b0ad10db21ec6bd4bfa

                                          SHA1

                                          3b0c5279d5b3949787b5b8871e662f985049e8de

                                          SHA256

                                          74a3887c763ff2dd283081f585662363f8b4e4f2da29045e9ed4104a8ab0fdf9

                                          SHA512

                                          571e1a11e16f503cf5c7417c741d7f99fd5e0aee94a366ce75cf49b78f4609930f1e6119ad21da090fda21ad3ee3c722714a56cc5d30dedbff4bca9c2b173b2b

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          985d382df118cf57c11d7618b17f0dfb

                                          SHA1

                                          ba1164cce187d71ff86b9092ff78d1ed8950f782

                                          SHA256

                                          fa4a21da0d32086c0951fc270e4c51a3dad09bb8116bebf14482d431b5474a52

                                          SHA512

                                          80599fd29fb27b1b4cb20fb818be68ae91b954ffe2815c4869f5a304ef3e8675b18c8e41897e5aa5f304555cd6ed243cf3cac646ac731c84ef836fa0507862bc

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          e38a20b028073517d263ead785b9cc22

                                          SHA1

                                          a0d18a222c7af1687030a13fe7d545e026317e8f

                                          SHA256

                                          e90931e9ca384c158950b5d3cc2e09b670fa149526be56db2f309ad3dc2c9964

                                          SHA512

                                          5848abbbc69b07718a5f80077db95ff411d01e96ff8d9f85b4fe11c4823422497b5033c068d1f60e036685f7efc60ba9c9f2c6ca24e269faf69828367e237d48

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          46295cac801e5d4857d09837238a6394

                                          SHA1

                                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                          SHA256

                                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                          SHA512

                                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          206702161f94c5cd39fadd03f4014d98

                                          SHA1

                                          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                          SHA256

                                          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                          SHA512

                                          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          10KB

                                          MD5

                                          34585268c47f12d083b23554378c9404

                                          SHA1

                                          1ab5936e9728668cf0928abdab1e1fce1ae4f833

                                          SHA256

                                          c95a53629adca38b4697f6f7c2bbcbf47c52b53df38cad3f996730ff38023b50

                                          SHA512

                                          46bc79227270336b7a0144f77eb508d72a169777808f560e17b71bd4693cfec1f49c1b6d555c25f7bb4d7dd67a6085e70a4ce8fc94cb4415856b38e239be36cc

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          10KB

                                          MD5

                                          6ccc131c67212e0b70d3b17938497ca6

                                          SHA1

                                          25f0b20e3f40fb8d9968e4e19ada7d5a993402c4

                                          SHA256

                                          dbb50cf3835d1b6ba74ccd4e3298944fc0229df77ad754e780ef1ce36a6bc01b

                                          SHA512

                                          843712e61d03a1a36b157d953ff8a54eb3175b9d0f5afc28bdb63cb84cb78e03cc48b70b6b2c063ace85cd7de3632d0bb03a20aad9e905378d3de6e7e3209ddd

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          944B

                                          MD5

                                          45f53352160cf0903c729c35c8edfdce

                                          SHA1

                                          b35a4d4fbaf2a3cc61e540fc03516dd70f3c34ab

                                          SHA256

                                          9cf18d157a858fc143a6de5c2dd3f618516a527b34478ac478d8c94ff027b0d2

                                          SHA512

                                          e3fa27a80a1df58acb49106c306dab22e5ed582f6b0cd7d9c3ef0a85e9f5919333257e88aa44f42a0e095fd577c9e12a02957a7845c0d109f821f32d8d3343f3

                                        • C:\Users\Admin\AppData\Local\Temp\8CDA.tmp\Craze.exe

                                          Filesize

                                          202KB

                                          MD5

                                          ad27143d078706b7cadcbb3f63212384

                                          SHA1

                                          71e532c89954881636f8fe973b9ea035a9e2de6d

                                          SHA256

                                          0b86d60e99e9f4a3bfa60cd447ac62eda52428be564f777151c883fdf547fb26

                                          SHA512

                                          39d8abb4883d3db96a88e88ea76ec8cc6a11e8905eeba593789a08b7d26cf449d682b2537cda790b124e06dc94bede7a78477f941220fe47d3e7ffad3bf9868b

                                        • C:\Users\Admin\AppData\Local\Temp\8CDA.tmp\INV.exe

                                          Filesize

                                          103KB

                                          MD5

                                          e079c468c9caed494623dbf95e9ce5e8

                                          SHA1

                                          4d8d1d17e9d7ff455a5c69e048d7575b5a3ea0f7

                                          SHA256

                                          8e217ce5670ac1021fdb6101372f9322f7ff82481ecd9badc104ff542e46128c

                                          SHA512

                                          d9c1a6f28c0c76b6856dec8723eb79d1b620a70b8ab3b5f028848e890a684beeb3460e310959c69f21cffb0a14751ea6cb719aacdbc2043121f057dd56f868a8

                                        • C:\Users\Admin\AppData\Local\Temp\8CDA.tmp\MBRPayload.exe

                                          Filesize

                                          101KB

                                          MD5

                                          3aa620597abcae5c26b71e21e15b9acf

                                          SHA1

                                          ed797bc834050bc108a31f1511102608943391c5

                                          SHA256

                                          91f9327997754b0238caeff5cffced7eed3e13d5ac39dec87b329678bee8a145

                                          SHA512

                                          562de36b77f6cf5a369c8b434fb5605ee4169fa50c6a4df4d22c1a64dfec39d779b1fc285407ab851ef27b33061159cb1bb548079fa0d0a3d2e10517f8ee0b12

                                        • C:\Users\Admin\AppData\Local\Temp\8CDA.tmp\PanKoza.bat

                                          Filesize

                                          736B

                                          MD5

                                          24f0349bbf490fea5eb3acbf54bd1ba8

                                          SHA1

                                          e3ca3514fe098b27dac66dfaa93e035fe6ef25f0

                                          SHA256

                                          78c3005b4d5f500de7d540822cf2c334fc585a6a0d45da8c4af47f1500239899

                                          SHA512

                                          4aac8a6652c1ff52c797344299f5f21746ff1769425bcdbbe4b04fa9363619e320811a8bf8ef0c18e7d0758f38d6a33249c14c9af4a3773da61bb2d7910fa26b

                                        • C:\Users\Admin\AppData\Local\Temp\8CDA.tmp\lines.exe

                                          Filesize

                                          103KB

                                          MD5

                                          50caeee44dc92a147cf95fd82eb6e299

                                          SHA1

                                          a6619a150a31f4c1b4913884123f5b5334e23489

                                          SHA256

                                          81b9a2e3e9ee39f05b585ad871696a946837fcf784d3d4ecd4b9caea16560a1e

                                          SHA512

                                          e009de28d24abbecac2b20c4dcbbe4bd2de461c0d3140043d1ef6db3e4807d13723fb1916bc9bd1a636cfdc4bb3e102ecae645e783901ebdf9996e9bcdd9466b

                                        • C:\Users\Admin\AppData\Local\Temp\8CDA.tmp\melter.exe

                                          Filesize

                                          3KB

                                          MD5

                                          d9baac374cc96e41c9f86c669e53f61c

                                          SHA1

                                          b0ba67bfac3d23e718b3bfdfe120e5446d0229e8

                                          SHA256

                                          a1d883577bcb6c4f9de47b06fe97c370c09bddffb6569b6cf93576371bdbc412

                                          SHA512

                                          4ecdf8757e75b02da06a9d42a8ca62b9f2ef292dc04fa37d96603af78433f8aa9dd82fcf1e128a8f463b9691dcc1645b4a64e34f3c5d631f3a0e0670da0d0457

                                        • C:\Users\Admin\AppData\Local\Temp\8CDA.tmp\note.vbs

                                          Filesize

                                          123B

                                          MD5

                                          b41b06859fca8e157db46e6609e4a51d

                                          SHA1

                                          8daa0836735347c030e641abdc277bbd66662c33

                                          SHA256

                                          f613aec542d7967cae9d01794b7061bce5083d68c825821a5b702e97f32039c4

                                          SHA512

                                          4290d132c7c1ad154a3ade465e810e9fe4db5a8e0604a35d53e82a6482cd22fdd8ba74e97c0bc2e146e2bcf2ecc9afcc4e4e358e98b353168b67a71b71ced75c

                                        • C:\Users\Admin\AppData\Local\Temp\8CDA.tmp\screenscrew.exe

                                          Filesize

                                          111KB

                                          MD5

                                          e87a04c270f98bb6b5677cc789d1ad1d

                                          SHA1

                                          8c14cb338e23d4a82f6310d13b36729e543ff0ca

                                          SHA256

                                          e03520794f00fb39ef3cfff012f72a5d03c60f89de28dbe69016f6ed151b5338

                                          SHA512

                                          8784f4d42908e54ecedfb06b254992c63920f43a27903ccedd336daaeed346db44e1f40e7db971735da707b5b32206be1b1571bc0d6a2d6eb90bbf9d1f69de13

                                        • C:\Users\Admin\AppData\Local\Temp\8CDA.tmp\sites.vbs

                                          Filesize

                                          287B

                                          MD5

                                          5c5324b059b0abf1824a5223832b8479

                                          SHA1

                                          145c596bd6bfc1bfbd1a5a2aa8e5f4b3cef4ef57

                                          SHA256

                                          9fd517699e352ffb9fd73319eb1ec58e7e771457f6e7c1d715e0f57e1d37d733

                                          SHA512

                                          b8219eba1d34c83cc193b5ba2da8aa9dce4f8b221c9aac3a52256e6c2855b77be4270a629dec7e36c92652f9b5e4c1dbc84b91a3bcdca663cc3d728eada6c3e3

                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_g1qvwkmy.mku.ps1

                                          Filesize

                                          60B

                                          MD5

                                          d17fe0a3f47be24a6453e9ef58c94641

                                          SHA1

                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                          SHA256

                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                          SHA512

                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                        • C:\Users\Admin\AppData\Local\Temp\qajeof.exe

                                          Filesize

                                          552KB

                                          MD5

                                          4860c95131365be3bfa06efd3d95b7af

                                          SHA1

                                          3bc68ad8b5725137ff85709988ef434088ae2c81

                                          SHA256

                                          7bda3690420d2b0cf562713a67b95071d9b44ac01bfabe6cab4c4acbbaa04737

                                          SHA512

                                          00dcca22cd2feeab004a44f8f61c8c67172c88ee4ff4fa8dd495d09606fb6f231be79c8a2707e1c8cc934ffda73445bdaeb05f5ba77034cfbce3a8af75c7f00e

                                        • C:\Users\Admin\AppData\Roaming\System32.exe

                                          Filesize

                                          63KB

                                          MD5

                                          66bbe5829a613fedad7f79e2c6273448

                                          SHA1

                                          57314396a65e08b7bfc5f0b8cdfa9a050579d9d9

                                          SHA256

                                          72499a032c26ef7031b942590e4dd2e28d60b332620c7d2dc42bc4b70995e0dd

                                          SHA512

                                          9b0ea0bb6a4a6ae75c6463f2bc3b5bd012a40a89f491868979230b850b948240b40326c703211edd349911e97a218bf77d01d06f254c33d83939c21a152efae3

                                        • C:\Users\Admin\AppData\Roaming\Thanks For Using.txt

                                          Filesize

                                          57B

                                          MD5

                                          f9cfd0c4da0a9a068f8a26ee31c85036

                                          SHA1

                                          ea75b71cfdf7364eacfafcaac0421f9c80a2b4e5

                                          SHA256

                                          e52f33ee65ceb7e5fe9cd47744888c089c37ba7dbadeaf345e75b5cadd43ee2d

                                          SHA512

                                          f81823ed92d8f5aa299d0164f59fb77a3af4c6a9ca5a98e0d4b33104ec7f15ef19037d4bb4f3b2c8c1ca156bac2253f5052eb801468db73d71a67b10405e4b51

                                        • memory/432-0-0x00007FFB624C3000-0x00007FFB624C5000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/432-1-0x0000000000150000-0x000000000016A000-memory.dmp

                                          Filesize

                                          104KB

                                        • memory/888-54-0x0000000000400000-0x00000000004F8000-memory.dmp

                                          Filesize

                                          992KB

                                        • memory/888-227-0x0000000000400000-0x00000000004F8000-memory.dmp

                                          Filesize

                                          992KB

                                        • memory/888-116-0x0000000000400000-0x00000000004F8000-memory.dmp

                                          Filesize

                                          992KB

                                        • memory/1520-215-0x0000000000400000-0x000000000044A000-memory.dmp

                                          Filesize

                                          296KB

                                        • memory/1588-20-0x000001E6DD1A0000-0x000001E6DD1C2000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/1688-155-0x0000000000400000-0x0000000000474000-memory.dmp

                                          Filesize

                                          464KB

                                        • memory/1688-180-0x0000000000400000-0x0000000000474000-memory.dmp

                                          Filesize

                                          464KB

                                        • memory/1928-224-0x0000000000400000-0x000000000041D000-memory.dmp

                                          Filesize

                                          116KB

                                        • memory/2192-221-0x000000001E370000-0x000000001E38E000-memory.dmp

                                          Filesize

                                          120KB

                                        • memory/2192-43-0x00007FFB624C0000-0x00007FFB62F82000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/2192-218-0x000000001E320000-0x000000001E366000-memory.dmp

                                          Filesize

                                          280KB

                                        • memory/2192-219-0x000000001CF40000-0x000000001CF49000-memory.dmp

                                          Filesize

                                          36KB

                                        • memory/2192-42-0x00007FFB624C0000-0x00007FFB62F82000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/2192-19-0x00007FFB624C0000-0x00007FFB62F82000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/2192-220-0x000000001DFD0000-0x000000001DFDD000-memory.dmp

                                          Filesize

                                          52KB

                                        • memory/2192-222-0x000000001DFE0000-0x000000001DFEB000-memory.dmp

                                          Filesize

                                          44KB

                                        • memory/2192-187-0x000000001CB20000-0x000000001CC00000-memory.dmp

                                          Filesize

                                          896KB

                                        • memory/2192-18-0x00007FFB624C0000-0x00007FFB62F82000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/2192-14-0x0000000000C30000-0x0000000000C46000-memory.dmp

                                          Filesize

                                          88KB

                                        • memory/2420-216-0x0000000000400000-0x000000000041D000-memory.dmp

                                          Filesize

                                          116KB

                                        • memory/3832-79-0x0000000000400000-0x0000000000423000-memory.dmp

                                          Filesize

                                          140KB

                                        • memory/5052-230-0x0000000000400000-0x0000000000474000-memory.dmp

                                          Filesize

                                          464KB

                                        • memory/5052-229-0x0000000000400000-0x0000000000474000-memory.dmp

                                          Filesize

                                          464KB

                                        • memory/5052-248-0x0000000000400000-0x0000000000474000-memory.dmp

                                          Filesize

                                          464KB

                                        • memory/5052-275-0x0000000000400000-0x0000000000474000-memory.dmp

                                          Filesize

                                          464KB

                                        • memory/5052-309-0x0000000000400000-0x0000000000474000-memory.dmp

                                          Filesize

                                          464KB