Analysis

  • max time kernel
    0s
  • max time network
    20s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250113-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    27-01-2025 22:15

General

  • Target

    cnchecker3.exe

  • Size

    6.8MB

  • MD5

    0c49a3be203b3c6394e67fa131e3c300

  • SHA1

    cafa1d4725e078ec7ea78a108b49593d6c29198d

  • SHA256

    dc0ac276ec83d53e1c05b0f88a47515871f19df0686530258d6ce7184b0596c5

  • SHA512

    b664c9ac541aadce54140e7da2c58ae940571501fedb9ea67f48cbfec12873547ea5e9b75b9204553c068fb9de8164eaebdab4083e6594ef31bd34f3ecda79b8

  • SSDEEP

    98304:IwgyO11Iy1eydWy7HSENCW5VVJW6M87w:INPIy1ey1Nzs

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot7289188591:AAFXBqcWy9p_LgUKTwd-Pcl7lvzedUGWL1E/sendMessage?chat_id=8079461533

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 2 IoCs
  • Stormkitty family
  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cnchecker3.exe
    "C:\Users\Admin\AppData\Local\Temp\cnchecker3.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
      "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4432
      • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
        "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3432
        • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
          "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
          4⤵
            PID:1988
            • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
              "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
              5⤵
                PID:4648
                • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                  "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                  6⤵
                    PID:4820
                    • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                      "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                      7⤵
                        PID:984
                        • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                          "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                          8⤵
                            PID:3788
                            • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                              "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                              9⤵
                                PID:868
                                • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                  "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                  10⤵
                                    PID:3656
                                    • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                      "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                      11⤵
                                        PID:1736
                                        • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                          "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                          12⤵
                                            PID:2800
                                            • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                              "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                              13⤵
                                                PID:1200
                                                • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                  "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                  14⤵
                                                    PID:3632
                                                    • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                      "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                      15⤵
                                                        PID:4692
                                                        • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                          "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                          16⤵
                                                            PID:2868
                                                            • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                              "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                              17⤵
                                                                PID:2172
                                                                • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                  "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                  18⤵
                                                                    PID:5104
                                                                    • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                      "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                      19⤵
                                                                        PID:4432
                                                                        • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                          "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                          20⤵
                                                                            PID:1796
                                                                            • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                              "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                              21⤵
                                                                                PID:984
                                                                                • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                  "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                  22⤵
                                                                                    PID:2260
                                                                                    • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                      "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                      23⤵
                                                                                        PID:1884
                                                                                        • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                          "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                          24⤵
                                                                                            PID:4356
                                                                                            • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                              "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                              25⤵
                                                                                                PID:1132
                                                                                                • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                                  26⤵
                                                                                                    PID:2260
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                                      27⤵
                                                                                                        PID:5260
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                                          28⤵
                                                                                                            PID:5464
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                                              29⤵
                                                                                                                PID:6044
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                                                  30⤵
                                                                                                                    PID:2260
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                                                      31⤵
                                                                                                                        PID:5284
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                                                          32⤵
                                                                                                                            PID:5744
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                                                              33⤵
                                                                                                                                PID:6020
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                                                                  34⤵
                                                                                                                                    PID:4756
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                                                                      35⤵
                                                                                                                                        PID:2316
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                                                                          36⤵
                                                                                                                                            PID:5772
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                                                                              37⤵
                                                                                                                                                PID:2776
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                                                                                  38⤵
                                                                                                                                                    PID:5524
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                                                                                      39⤵
                                                                                                                                                        PID:5992
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                                                                                          40⤵
                                                                                                                                                            PID:5556
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                                                                                              41⤵
                                                                                                                                                                PID:5580
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                                                                                                  42⤵
                                                                                                                                                                    PID:6044
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                                                                                                      43⤵
                                                                                                                                                                        PID:5712
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\CNCHECKER3.EXE"
                                                                                                                                                                          44⤵
                                                                                                                                                                            PID:4656
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            44⤵
                                                                                                                                                                              PID:1304
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            43⤵
                                                                                                                                                                              PID:5892
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            42⤵
                                                                                                                                                                              PID:3720
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            41⤵
                                                                                                                                                                              PID:5620
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            40⤵
                                                                                                                                                                              PID:6100
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            39⤵
                                                                                                                                                                              PID:5744
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            38⤵
                                                                                                                                                                              PID:5708
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            37⤵
                                                                                                                                                                              PID:6096
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            36⤵
                                                                                                                                                                              PID:4856
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            35⤵
                                                                                                                                                                              PID:1396
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            34⤵
                                                                                                                                                                              PID:4636
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            33⤵
                                                                                                                                                                              PID:6028
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            32⤵
                                                                                                                                                                              PID:5808
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            31⤵
                                                                                                                                                                              PID:5388
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            30⤵
                                                                                                                                                                              PID:4192
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            29⤵
                                                                                                                                                                              PID:6128
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            28⤵
                                                                                                                                                                              PID:5472
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            27⤵
                                                                                                                                                                              PID:5276
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            26⤵
                                                                                                                                                                              PID:4024
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            25⤵
                                                                                                                                                                              PID:1124
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            24⤵
                                                                                                                                                                              PID:1492
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            23⤵
                                                                                                                                                                              PID:1116
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            22⤵
                                                                                                                                                                              PID:2844
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            21⤵
                                                                                                                                                                              PID:4368
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            20⤵
                                                                                                                                                                              PID:580
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            19⤵
                                                                                                                                                                              PID:2644
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            18⤵
                                                                                                                                                                              PID:2124
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            17⤵
                                                                                                                                                                              PID:4404
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            16⤵
                                                                                                                                                                              PID:5048
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            15⤵
                                                                                                                                                                              PID:3160
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            14⤵
                                                                                                                                                                              PID:3092
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            13⤵
                                                                                                                                                                              PID:4748
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            12⤵
                                                                                                                                                                              PID:1740
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            11⤵
                                                                                                                                                                              PID:3640
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            10⤵
                                                                                                                                                                              PID:2656
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            9⤵
                                                                                                                                                                              PID:2620
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            8⤵
                                                                                                                                                                              PID:1288
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            7⤵
                                                                                                                                                                              PID:652
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            6⤵
                                                                                                                                                                              PID:3052
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            5⤵
                                                                                                                                                                              PID:4780
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:1364
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                            3⤵
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            PID:5064
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
                                                                                                                                                                          2⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                          PID:4268

                                                                                                                                                                      Network

                                                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                                                      Replay Monitor

                                                                                                                                                                      Loading Replay Monitor...

                                                                                                                                                                      Downloads

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\546354cdecf3cc7061fecc69c4271583\Admin@XJZYHXOP_en-US\System\Process.txt

                                                                                                                                                                        Filesize

                                                                                                                                                                        120B

                                                                                                                                                                        MD5

                                                                                                                                                                        d721f9ec31358d55962dbde03dbce46d

                                                                                                                                                                        SHA1

                                                                                                                                                                        82dc5aa28547175a3e07606f601a17730e343a84

                                                                                                                                                                        SHA256

                                                                                                                                                                        657a15a82a66b10276deeca51e55875402c51f9d524158b3d3011d1ff10320d0

                                                                                                                                                                        SHA512

                                                                                                                                                                        86a9ba97e87d4c74938db6779395615a0401e1b9f8ab8bb90a26619427d7c206c1f8b8cc80ab3ef967151ca2a34d7dda0387949c17d3c8b8fed075c148924dc8

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\5fa8bd144bd3b3fe10f5ebe944445954\Admin@XJZYHXOP_en-US\Browsers\Firefox\Bookmarks.txt

                                                                                                                                                                        Filesize

                                                                                                                                                                        210B

                                                                                                                                                                        MD5

                                                                                                                                                                        1267f4be35fbe5510886cf08ddee9fdd

                                                                                                                                                                        SHA1

                                                                                                                                                                        04e714a1c8a9d76e860c7cbbe7ebf62c71dea6b9

                                                                                                                                                                        SHA256

                                                                                                                                                                        ab038447adbfd1faf46f0d3bf6dc387621dc8435ab552696ec8d9bbe7a6a9ab3

                                                                                                                                                                        SHA512

                                                                                                                                                                        6f1bc0ad9eb850f37cddc2422e738f0cbbfe8a7a7e064c0c989cafbf0f7d5ae5bdfced4b3f93952688de3bfa338ff5a8c7258aff8397cdaccb36b23b5d16686b

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\5fa8bd144bd3b3fe10f5ebe944445954\Admin@XJZYHXOP_en-US\Directories\Temp.txt

                                                                                                                                                                        Filesize

                                                                                                                                                                        4KB

                                                                                                                                                                        MD5

                                                                                                                                                                        28e99ef4c9dcdf79b3e59f0295975094

                                                                                                                                                                        SHA1

                                                                                                                                                                        1c2238918366deb70a832a429cc08e0f6829a88a

                                                                                                                                                                        SHA256

                                                                                                                                                                        20542fbd31512f68f6755b908f37175d31f23ce7502393625b8ee5cb38ac2cf5

                                                                                                                                                                        SHA512

                                                                                                                                                                        6d00b00c7d22c96fe2d5e47438211caf96cdff38b55c3caad88bdb5cee62dace8538453593d868f429b731fce6f075bd4333ad28859fc9968464fb5f013e9ef7

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\803ce79deb8d6fe681205585c9c8ab6d\Admin@XJZYHXOP_en-US\Browsers\Firefox\Bookmarks.txt

                                                                                                                                                                        Filesize

                                                                                                                                                                        105B

                                                                                                                                                                        MD5

                                                                                                                                                                        2e9d094dda5cdc3ce6519f75943a4ff4

                                                                                                                                                                        SHA1

                                                                                                                                                                        5d989b4ac8b699781681fe75ed9ef98191a5096c

                                                                                                                                                                        SHA256

                                                                                                                                                                        c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

                                                                                                                                                                        SHA512

                                                                                                                                                                        d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\803ce79deb8d6fe681205585c9c8ab6d\Admin@XJZYHXOP_en-US\Directories\Temp.txt

                                                                                                                                                                        Filesize

                                                                                                                                                                        2KB

                                                                                                                                                                        MD5

                                                                                                                                                                        2d57117e87cb7e69f3c117f961304455

                                                                                                                                                                        SHA1

                                                                                                                                                                        81daaf31b14a3d3655e8ef34eaa366e51f25143c

                                                                                                                                                                        SHA256

                                                                                                                                                                        50eef49db485f3a5dddf46997a3b3d628df1ff7a7e3b7e90e08801022aefd167

                                                                                                                                                                        SHA512

                                                                                                                                                                        c934c3c2a2ad2961f2a7f397d04d8e13b9db69bb07a8d65726680c170046830bf39a1cc9695cfd05fd80eda867c5b0cf7b788a06d3705beb49745d9a78405693

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE

                                                                                                                                                                        Filesize

                                                                                                                                                                        232KB

                                                                                                                                                                        MD5

                                                                                                                                                                        905d8f8b1d16ce5c63f6a806e1efeb98

                                                                                                                                                                        SHA1

                                                                                                                                                                        75c8c39c0bb5e48f53f1585a9cefa03a997dc680

                                                                                                                                                                        SHA256

                                                                                                                                                                        78dcc1bbf29a5d6e5cb57506f273d41e8629232bc733bb4126955f40f60f63f4

                                                                                                                                                                        SHA512

                                                                                                                                                                        f0c00f773909bc0b04e638196f902f314d75000e04ed7bc72b3d9b35c4278de3f18d7e02aaf85e70207860aa3d920d167c62e14bbdf9289481bcf516ebf87a5f

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\da4cf05b3b24920c06bb9c3ff42c4474\Admin@XJZYHXOP_en-US\Directories\Desktop.txt

                                                                                                                                                                        Filesize

                                                                                                                                                                        589B

                                                                                                                                                                        MD5

                                                                                                                                                                        b82f7a20f5bb965cec002ca1b6a5e1ba

                                                                                                                                                                        SHA1

                                                                                                                                                                        3504b35fde63e6c1d14abc2f4b7fbeda05d7c031

                                                                                                                                                                        SHA256

                                                                                                                                                                        4ccb32181fcda353ff65f5eb6c876b9f1c3e32017632f20eec9ca36a49cf8089

                                                                                                                                                                        SHA512

                                                                                                                                                                        ea713f1c2781604d8a42a78065cbc95c370e05a30947961254ab5dc0185560f124e14dc0cca603cb92a02f49a380b3f325079fae1cfbad0e867a60fe714308e3

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\da4cf05b3b24920c06bb9c3ff42c4474\Admin@XJZYHXOP_en-US\Directories\Documents.txt

                                                                                                                                                                        Filesize

                                                                                                                                                                        587B

                                                                                                                                                                        MD5

                                                                                                                                                                        3895965644d3b29fe9ababb819d94e67

                                                                                                                                                                        SHA1

                                                                                                                                                                        c297020fc0201205c3227212624c64f8a98060d1

                                                                                                                                                                        SHA256

                                                                                                                                                                        cf758f8788a9c65de0ac66151460f752c086c28eeba390bea6527f8e379b8a8c

                                                                                                                                                                        SHA512

                                                                                                                                                                        d8efd7493ecfd90d7b30367ee4b2465b353a38520efb9c18478486b1505887498ea380e43cfe75a0dd1cee84ff11bcfd794b264d5ba3caa35607dc81d6553422

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\da4cf05b3b24920c06bb9c3ff42c4474\Admin@XJZYHXOP_en-US\Directories\Downloads.txt

                                                                                                                                                                        Filesize

                                                                                                                                                                        615B

                                                                                                                                                                        MD5

                                                                                                                                                                        464aa09522c49fc06a0c419c38de1987

                                                                                                                                                                        SHA1

                                                                                                                                                                        849c5635dfc115cedfbe4d54ce328eb8091bd257

                                                                                                                                                                        SHA256

                                                                                                                                                                        9ff3af4b3786bd703b711a74e67f2d9db694ee15ef80fe38985aeaacdd4e84d9

                                                                                                                                                                        SHA512

                                                                                                                                                                        4d9693d75a94acfb5c00417f6c1321776b4daeec6de4c990e0afe82c00f280bf0d7641b7043630ed96113a214c96ff5b4fd54287cc22ad760ee79c7e1410fdca

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\da4cf05b3b24920c06bb9c3ff42c4474\Admin@XJZYHXOP_en-US\Directories\OneDrive.txt

                                                                                                                                                                        Filesize

                                                                                                                                                                        25B

                                                                                                                                                                        MD5

                                                                                                                                                                        966247eb3ee749e21597d73c4176bd52

                                                                                                                                                                        SHA1

                                                                                                                                                                        1e9e63c2872cef8f015d4b888eb9f81b00a35c79

                                                                                                                                                                        SHA256

                                                                                                                                                                        8ddfc481b1b6ae30815ecce8a73755862f24b3bb7fdebdbf099e037d53eb082e

                                                                                                                                                                        SHA512

                                                                                                                                                                        bd30aec68c070e86e3dec787ed26dd3d6b7d33d83e43cb2d50f9e2cff779fee4c96afbbe170443bd62874073a844beb29a69b10c72c54d7d444a8d86cfd7b5aa

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\da4cf05b3b24920c06bb9c3ff42c4474\Admin@XJZYHXOP_en-US\Directories\Pictures.txt

                                                                                                                                                                        Filesize

                                                                                                                                                                        250B

                                                                                                                                                                        MD5

                                                                                                                                                                        b620a14c0fe371e260d28950b26f0573

                                                                                                                                                                        SHA1

                                                                                                                                                                        119e8a11c8fc289a07b05b225a66d10246e3fa6e

                                                                                                                                                                        SHA256

                                                                                                                                                                        1b4f20c06ffbf27c6f3fe76b306969bb0a635cda9878a6ad4a21d5358debe0c4

                                                                                                                                                                        SHA512

                                                                                                                                                                        dadf5a3bd4eeeb16a72687171a197d2b19323c27b3b0461b31d4cb92de61766fb5429d64209270dbac44cea3144c3b70dc937cf73248c104e6e83b752d6e57dc

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\da4cf05b3b24920c06bb9c3ff42c4474\Admin@XJZYHXOP_en-US\Directories\Startup.txt

                                                                                                                                                                        Filesize

                                                                                                                                                                        24B

                                                                                                                                                                        MD5

                                                                                                                                                                        68c93da4981d591704cea7b71cebfb97

                                                                                                                                                                        SHA1

                                                                                                                                                                        fd0f8d97463cd33892cc828b4ad04e03fc014fa6

                                                                                                                                                                        SHA256

                                                                                                                                                                        889ed51f9c16a4b989bda57957d3e132b1a9c117ee84e208207f2fa208a59483

                                                                                                                                                                        SHA512

                                                                                                                                                                        63455c726b55f2d4de87147a75ff04f2daa35278183969ccf185d23707840dd84363bec20d4e8c56252196ce555001ca0e61b3f4887d27577081fdef9e946402

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\da4cf05b3b24920c06bb9c3ff42c4474\Admin@XJZYHXOP_en-US\Directories\Temp.txt

                                                                                                                                                                        Filesize

                                                                                                                                                                        3KB

                                                                                                                                                                        MD5

                                                                                                                                                                        c22b93ec79adea7ad7b183c92349e1c4

                                                                                                                                                                        SHA1

                                                                                                                                                                        953f8923e4ed461b98ba077f4dc2253ba2f952ec

                                                                                                                                                                        SHA256

                                                                                                                                                                        323f2267d3b2d43007cb496fe7907196ee0ab5229824995d4fb6aa6431eca9ed

                                                                                                                                                                        SHA512

                                                                                                                                                                        c66360c92c04ba73c5100c01561a627f9f5a78d7cfe801aca7c8db820e0e39697dcd7fc4b09fb8444ba622f750e524e999cf5f0812cbabb63f2ab7342c5fac26

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\da4cf05b3b24920c06bb9c3ff42c4474\Admin@XJZYHXOP_en-US\Directories\Videos.txt

                                                                                                                                                                        Filesize

                                                                                                                                                                        23B

                                                                                                                                                                        MD5

                                                                                                                                                                        1fddbf1169b6c75898b86e7e24bc7c1f

                                                                                                                                                                        SHA1

                                                                                                                                                                        d2091060cb5191ff70eb99c0088c182e80c20f8c

                                                                                                                                                                        SHA256

                                                                                                                                                                        a67aa329b7d878de61671e18cd2f4b011d11cbac67ea779818c6dafad2d70733

                                                                                                                                                                        SHA512

                                                                                                                                                                        20bfeafde7fec1753fef59de467bd4a3dd7fe627e8c44e95fe62b065a5768c4508e886ec5d898e911a28cf6365f455c9ab1ebe2386d17a76f53037f99061fd4d

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\f26b56fab987c0e15f4074d19a905549\Admin@XJZYHXOP_en-US\Directories\Temp.txt

                                                                                                                                                                        Filesize

                                                                                                                                                                        3KB

                                                                                                                                                                        MD5

                                                                                                                                                                        ac39475f81b4d11038d0165275f8a299

                                                                                                                                                                        SHA1

                                                                                                                                                                        e7379375fffc3341a065efe0c0e851af4dbb4d6e

                                                                                                                                                                        SHA256

                                                                                                                                                                        79d2e06212f599e323ea23bd46676ee9a16b21a140ccecd84d6d6fecce738797

                                                                                                                                                                        SHA512

                                                                                                                                                                        df67fafe5c5ad4e2529933908950de7b72e5a5507fdc95a06751e30ae2e97abf6688fd1fde1e7dbc6afbd8a318cf386d51238bd53c13495259b47b6568e76253

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\f26b56fab987c0e15f4074d19a905549\Admin@XJZYHXOP_en-US\System\Process.txt

                                                                                                                                                                        Filesize

                                                                                                                                                                        240B

                                                                                                                                                                        MD5

                                                                                                                                                                        b6f48350d04383441f5d82a7aef09ed7

                                                                                                                                                                        SHA1

                                                                                                                                                                        2d87be6709b94c8148468716d1ac38d030fc8279

                                                                                                                                                                        SHA256

                                                                                                                                                                        45e88596c5b8274e762279adb000bb8eb1f4b796bd766eabfa5aacc2f71805ea

                                                                                                                                                                        SHA512

                                                                                                                                                                        f4d45d34b37f54d5c84cf388bc7510673a2cc0a17ed24cf905c05c16fca58a3c652cbfdde0804b645b5aa106d05edc9f0a36b1b1c0faa2861c5789619de392c6

                                                                                                                                                                      • memory/4268-38-0x0000000005D50000-0x0000000005DE2000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        584KB

                                                                                                                                                                      • memory/4268-37-0x00000000065B0000-0x0000000006B56000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        5.6MB

                                                                                                                                                                      • memory/4268-16-0x00000000004E0000-0x0000000000520000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        256KB

                                                                                                                                                                      • memory/4268-14-0x00000000736CE000-0x00000000736CF000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4KB

                                                                                                                                                                      • memory/4268-55-0x00000000736CE000-0x00000000736CF000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4KB

                                                                                                                                                                      • memory/5064-18-0x0000000005470000-0x00000000054D6000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        408KB