Analysis
-
max time kernel
116s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 11:18
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
xenorat
127.0.0.1
release_yeah
-
delay
5000
-
install_path
temp
-
port
4444
-
startup_name
release
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/files/0x0009000000023c23-72.dat family_xenorat behavioral1/memory/1416-115-0x0000000000D70000-0x0000000000D82000-memory.dmp family_xenorat -
Xenorat family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 34 2468 msedge.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation release.exe -
Executes dropped EXE 15 IoCs
pid Process 1416 release.exe 2276 release.exe 4696 release.exe 2832 release.exe 1252 release.exe 3868 release.exe 4388 release.exe 2304 release.exe 2896 release.exe 1308 release.exe 3160 release.exe 4952 release.exe 4840 release.exe 4760 release.exe 4180 release.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language release.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language release.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language release.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language release.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language release.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language release.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language release.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language release.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language release.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language release.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language release.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language release.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language release.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language release.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language release.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 127605.crdownload:SmartScreen msedge.exe File created C:\Users\Admin\AppData\Local\Temp\XenoManager\release.exe\:SmartScreen:$DATA release.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3944 schtasks.exe 2780 schtasks.exe 4960 schtasks.exe 4812 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 372 msedge.exe 372 msedge.exe 4896 identity_helper.exe 4896 identity_helper.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 372 wrote to memory of 2364 372 msedge.exe 82 PID 372 wrote to memory of 2364 372 msedge.exe 82 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 3064 372 msedge.exe 83 PID 372 wrote to memory of 2468 372 msedge.exe 84 PID 372 wrote to memory of 2468 372 msedge.exe 84 PID 372 wrote to memory of 1152 372 msedge.exe 85 PID 372 wrote to memory of 1152 372 msedge.exe 85 PID 372 wrote to memory of 1152 372 msedge.exe 85 PID 372 wrote to memory of 1152 372 msedge.exe 85 PID 372 wrote to memory of 1152 372 msedge.exe 85 PID 372 wrote to memory of 1152 372 msedge.exe 85 PID 372 wrote to memory of 1152 372 msedge.exe 85 PID 372 wrote to memory of 1152 372 msedge.exe 85 PID 372 wrote to memory of 1152 372 msedge.exe 85 PID 372 wrote to memory of 1152 372 msedge.exe 85 PID 372 wrote to memory of 1152 372 msedge.exe 85 PID 372 wrote to memory of 1152 372 msedge.exe 85 PID 372 wrote to memory of 1152 372 msedge.exe 85 PID 372 wrote to memory of 1152 372 msedge.exe 85 PID 372 wrote to memory of 1152 372 msedge.exe 85 PID 372 wrote to memory of 1152 372 msedge.exe 85 PID 372 wrote to memory of 1152 372 msedge.exe 85 PID 372 wrote to memory of 1152 372 msedge.exe 85 PID 372 wrote to memory of 1152 372 msedge.exe 85 PID 372 wrote to memory of 1152 372 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/3XgttD1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd0c6c46f8,0x7ffd0c6c4708,0x7ffd0c6c47182⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 /prefetch:32⤵
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3596 /prefetch:82⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4296 /prefetch:82⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6148 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6416 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2084,17861488991637029105,12162442994028546040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Users\Admin\Downloads\release.exe"C:\Users\Admin\Downloads\release.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\release.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\release.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "release" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFFAD.tmp" /F4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3944
-
-
-
-
C:\Users\Admin\Downloads\release.exe"C:\Users\Admin\Downloads\release.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4696 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "release" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD3E5.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2780
-
-
-
C:\Users\Admin\Downloads\release.exe"C:\Users\Admin\Downloads\release.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2832
-
-
C:\Users\Admin\Downloads\release.exe"C:\Users\Admin\Downloads\release.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1252
-
-
C:\Users\Admin\Downloads\release.exe"C:\Users\Admin\Downloads\release.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3868
-
-
C:\Users\Admin\Downloads\release.exe"C:\Users\Admin\Downloads\release.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4388
-
-
C:\Users\Admin\Downloads\release.exe"C:\Users\Admin\Downloads\release.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2304
-
-
C:\Users\Admin\Downloads\release.exe"C:\Users\Admin\Downloads\release.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Users\Admin\Downloads\release.exe"C:\Users\Admin\Downloads\release.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1308
-
-
C:\Users\Admin\Downloads\release.exe"C:\Users\Admin\Downloads\release.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3160
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3144
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1860
-
C:\Users\Admin\Downloads\release.exe"C:\Users\Admin\Downloads\release.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4952 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "release" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF48C.tmp" /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4960
-
-
C:\Users\Admin\Downloads\release.exe"C:\Users\Admin\Downloads\release.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4840
-
C:\Users\Admin\Downloads\release.exe"C:\Users\Admin\Downloads\release.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4760
-
C:\Users\Admin\Downloads\release.exe"C:\Users\Admin\Downloads\release.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4180 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "release" /XML "C:\Users\Admin\AppData\Local\Temp\tmp33E7.tmp" /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD589073260996fc58c4bf1fb87638eb172
SHA1ff91f3892bc0eb3169aabba7bb03194eea9e0a1b
SHA2561cd4028738dd3c3b54d455c518c6ef16043bd3c8180e5adcd594c5b5f0d70019
SHA512d7b7c6fc700baddd426c0d882423224ea676b40b29a99d3b9c641ebb2cb767732acc34826795aff9e353926b905a49f7e0382a0ecd1f843ffa4e10393fc76ca4
-
Filesize
391B
MD54d92cd9b6cce57bcc02f7250cbfa431d
SHA1c63187cb723e7325d70adb1a38ae3b72f5f49708
SHA25622878d854e100f121dcc0c932d1bb1dbfb880e34093fa99e97561a368af5bc16
SHA512d051d9f2c8e2d96533960a1f6d0a762bf879d976771490835e080572c27b04353f3c88cbe88a7230306fe2907793ca092a4441d875d0a00505c142d3c60ffa04
-
Filesize
6KB
MD5648ff440a233739fc29270b2f899a99f
SHA19ab40b9f1857b35fcc05207dbcb11d7425f7d0ba
SHA25608e5d30e5f70767d65b893da175cacff2910fe883ac58123c0dd6419d72a9c50
SHA5127e61f1c4536eb338082d833f55f9d56b3d45cdbd73cbe07deccd9a25ff075a2bc9230fc4604de6e1b0cd00cb0491aec7df6378f5f92164c2a01840da97bbaafe
-
Filesize
6KB
MD5c33345b9a8c58ed28cea8f720ac164e7
SHA169197da4747ac2f8237eeede254eb02a281faae7
SHA25697b2e83eaa098abd8b030aa8c2b48f9f17ffbefba574bc888500f98cd4ac741c
SHA512057852bbf020ed27dbdd3876e7296a1fea2b7e51d68f59cb138035d3277e67824f47db5a1095bd90eb22997ee31704f846d637bf63beedf08390fae2d2a5093c
-
Filesize
5KB
MD5432ab3f6e41f31ee4d2f807a24523406
SHA1ebfcd5046ef9efb59ef19f69496f636d680a4e8e
SHA2564f13a10981455a22501908bb7323d79ebb5c64b05a5175ee578ed8c3d7c1222a
SHA512f87abfe5d0db5a7a524e27ea8cb10877bb2eda62dd0833cf7063040e8ec8bfc13ce2641243194e5ef59ad973177a02f0289051bbd7e0094857fc73b46b191b14
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e540dc9c0a9e3dd0c82a96e95b6ad050
SHA1cf13a6e6fa006d6a114e3ccbd7dcd0b493be0543
SHA256d61e82b0e4c98e68e9da2d441cbfc24603e9b90fcdfbe72fc0304334efe175f8
SHA512f8b05656396c54fab017d8c2318fa8e11fde81e12818a94c5e3ea0b3153cb91cec0e83157993a1be9e181949b67d8cd3c3ff48849b6d29e5d965bb6f3c520254
-
Filesize
10KB
MD5de83f116e8a7e2eb094a7105aaadc60c
SHA19ce2afe2b8bf0c276d1d1cd05111543528268b3b
SHA25685e4edaf0b2017e35069b7a38b5e5991bf705692b6708f4cb17582292df5eb2a
SHA512346d949d095a546460146a481e66afcb8d0142b971fe8634ad56967c5b917712dbb832815324c6f8796ced021fe02aa03a9e8124905a220ee0d2f1816677d308
-
Filesize
1KB
MD5465cb44b3bb5f0cab1efd33b4df70e77
SHA108c07fdda793563fbcf2c8cb4678ec07d17ffd8b
SHA256a47a32a064d634d72030645475dabd6d8717400f91d915a1505bafb459042dde
SHA512fb69e067c5ee92a418c1fc19828005209e13759020e5149657d8566a6763b3fb5c9d589dfdc0210a0fb4a3e48f3699a6c67d53cf8e17c5bc7cc33d8f13e66c4f
-
Filesize
1KB
MD546464b26588d6e646fdd347cd96bac8a
SHA1c842f6ee5cc8af1f0fbd2f5c2b055ab50f922afb
SHA256b202ebb06a5b9ebcb016aaaf5eae5fc26a194f6e35622d554baed8d522df0b00
SHA5126152aa413295dd7710ee314ef1cfa6d7a69ea1d76c1389c469445e1838ac6155ddae5b9ccea3390a48efd46dfa31bddd8165bee50f41de53e0a3ff394f72c4b6
-
Filesize
45KB
MD547bd0d3a795f36648983430b59f96eed
SHA1eaa0a5a2718750d9dcafceb6f6384e8e957a61eb
SHA256ae228c049c2bd09df8add7f8b2ccdfbe10e1b672850f534990451b1beb278c42
SHA512de7114831e478f205a04e5015fa8323951fd63a2b7701127e366cbb2e4ceaafad830b0f2ce92d3c35e7f76cfa94f785407837b4eadc13dce05c88ac83c90af2b