Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2025, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
c7988c8d4e55ad226772a31c158747ab.exe
Resource
win7-20240903-en
General
-
Target
c7988c8d4e55ad226772a31c158747ab.exe
-
Size
852KB
-
MD5
c7988c8d4e55ad226772a31c158747ab
-
SHA1
d7e2f3cca3d7d92eeaccce51734999a734321825
-
SHA256
782cf5337d8a428867a0ab13d474628b427dbb1164d4449f7e8dc96bdab3c7b1
-
SHA512
a22e1ab980fe49c8e7bfa521a9fc1197a46eff85eb40261cb03e683f4f3aefc245934362c6da181f28572bd314a6183d9bfd6671957af32e20450963d385b27b
-
SSDEEP
12288:YlMNMfURnHb+Qv6HNbwVAQXPZPT9VAGgQmLwy67Dq4JgDPEDW78RRVmevBqJC80Z:YZMRHPv6tkVvXxPosEgEozRRVBCMRH
Malware Config
Extracted
nanocore
1.2.2.0
lxtihmjohnson163.airdns.org:43366
3740d544-7efc-40b2-8c32-f31974309f7d
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2024-10-21T12:36:42.768385536Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTE2Ij8+DQo8VGFzayB2ZXJzaW9uPSIxLjIiIHhtbG5zPSJodHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL3dpbmRvd3MvMjAwNC8wMi9taXQvdGFzayI+DQogIDxSZWdpc3RyYXRpb25JbmZvIC8+DQogIDxUcmlnZ2VycyAvPg0KICA8UHJpbmNpcGFscz4NCiAgICA8UHJpbmNpcGFsIGlkPSJBdXRob3IiPg0KICAgICAgPExvZ29uVHlwZT5JbnRlcmFjdGl2ZVRva2VuPC9Mb2dvblR5cGU+DQogICAgICA8UnVuTGV2ZWw+SGlnaGVzdEF2YWlsYWJsZTwvUnVuTGV2ZWw+DQogICAgPC9QcmluY2lwYWw+DQogIDwvUHJpbmNpcGFscz4NCiAgPFNldHRpbmdzPg0KICAgIDxNdWx0aXBsZUluc3RhbmNlc1BvbGljeT5QYXJhbGxlbDwvTXVsdGlwbGVJbnN0YW5jZXNQb2xpY3k+DQogICAgPERpc2FsbG93U3RhcnRJZk9uQmF0dGVyaWVzPmZhbHNlPC9EaXNhbGxvd1N0YXJ0SWZPbkJhdHRlcmllcz4NCiAgICA8U3RvcElmR29pbmdPbkJhdHRlcmllcz5mYWxzZTwvU3RvcElmR29pbmdPbkJhdHRlcmllcz4NCiAgICA8QWxsb3dIYXJkVGVybWluYXRlPnRydWU8L0FsbG93SGFyZFRlcm1pbmF0ZT4NCiAgICA8U3RhcnRXaGVuQXZhaWxhYmxlPmZhbHNlPC9TdGFydFdoZW5BdmFpbGFibGU+DQogICAgPFJ1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+ZmFsc2U8L1J1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+DQogICAgPElkbGVTZXR0aW5ncz4NCiAgICAgIDxTdG9wT25JZGxlRW5kPmZhbHNlPC9TdG9wT25JZGxlRW5kPg0KICAgICAgPFJlc3RhcnRPbklkbGU+ZmFsc2U8L1Jlc3RhcnRPbklkbGU+DQogICAgPC9JZGxlU2V0dGluZ3M+DQogICAgPEFsbG93U3RhcnRPbkRlbWFuZD50cnVlPC9BbGxvd1N0YXJ0T25EZW1hbmQ+DQogICAgPEVuYWJsZWQ+dHJ1ZTwvRW5hYmxlZD4NCiAgICA8SGlkZGVuPmZhbHNlPC9IaWRkZW4+DQogICAgPFJ1bk9ubHlJZklkbGU+ZmFsc2U8L1J1bk9ubHlJZklkbGU+DQogICAgPFdha2VUb1J1bj5mYWxzZTwvV2FrZVRvUnVuPg0KICAgIDxFeGVjdXRpb25UaW1lTGltaXQ+UFQwUzwvRXhlY3V0aW9uVGltZUxpbWl0Pg0KICAgIDxQcmlvcml0eT40PC9Qcmlvcml0eT4NCiAgPC9TZXR0aW5ncz4NCiAgPEFjdGlvbnMgQ29udGV4dD0iQXV0aG9yIj4NCiAgICA8RXhlYz4NCiAgICAgIDxDb21tYW5kPiIjRVhFQ1VUQUJMRVBBVEgiPC9Db21tYW5kPg0KICAgICAgPEFyZ3VtZW50cz4kKEFyZzApPC9Bcmd1bWVudHM+DQogICAgPC9FeGVjPg0KICA8L0FjdGlvbnM+DQo8L1Rhc2s+
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
43366
-
default_group
JAMJAM01
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
3740d544-7efc-40b2-8c32-f31974309f7d
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
lxtihmjohnson163.airdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
xworm
5.0
tunhost.duckdns.org:57891
wintun.freemyip.com:57891
87.249.134.68:57891
-
install_file
琀㴀Ā ☀☀ �䔗渀瘀椀爀漀渀洀攀渀琀�眍椀渀搀椀爀�瀝漀眀攀爀猀栀攀氀氀⸀攀砀攀�醀-C schtasks.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/memory/1952-35-0x0000000006CA0000-0x0000000006CE4000-memory.dmp family_xworm behavioral2/files/0x000300000001e736-42.dat family_xworm behavioral2/memory/780-44-0x0000000000F40000-0x0000000000F4E000-memory.dmp family_xworm -
Nanocore family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Xmrig family
-
Xworm family
-
XMRig Miner payload 11 IoCs
resource yara_rule behavioral2/memory/2240-69-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/2240-72-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/2240-75-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/2240-76-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/2240-74-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/2240-73-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/2240-70-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/2240-77-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/2240-80-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/2240-82-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/2240-81-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winlogon.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exe c7988c8d4e55ad226772a31c158747ab.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wanhost.exe c7988c8d4e55ad226772a31c158747ab.exe -
Executes dropped EXE 5 IoCs
pid Process 1612 winlogon.exe 780 wanhost.exe 2736 system32.exe 3968 qshtkbttphgg.exe 3340 system32-checker.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NAS Manager = "C:\\Program Files (x86)\\NAS Manager\\nasmgr.exe" c7988c8d4e55ad226772a31c158747ab.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c7988c8d4e55ad226772a31c158747ab.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 34 raw.githubusercontent.com 35 raw.githubusercontent.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 checkip.amazonaws.com 26 checkip.amazonaws.com -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 2192 powercfg.exe 4764 powercfg.exe 704 powercfg.exe 60 powercfg.exe 3352 powercfg.exe 2228 powercfg.exe 4372 powercfg.exe 2420 powercfg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3592 set thread context of 1952 3592 c7988c8d4e55ad226772a31c158747ab.exe 86 PID 3968 set thread context of 1524 3968 qshtkbttphgg.exe 123 PID 3968 set thread context of 2240 3968 qshtkbttphgg.exe 128 -
resource yara_rule behavioral2/memory/2240-65-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2240-64-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2240-69-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2240-72-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2240-75-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2240-76-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2240-74-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2240-73-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2240-70-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2240-68-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2240-67-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2240-66-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2240-77-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2240-80-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2240-82-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2240-81-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\NAS Manager\nasmgr.exe c7988c8d4e55ad226772a31c158747ab.exe File opened for modification C:\Program Files (x86)\NAS Manager\nasmgr.exe c7988c8d4e55ad226772a31c158747ab.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 872 sc.exe 2788 sc.exe 5048 sc.exe 2128 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7988c8d4e55ad226772a31c158747ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7988c8d4e55ad226772a31c158747ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 winlogon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier winlogon.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 996 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 556 schtasks.exe 2728 schtasks.exe 3716 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 3592 c7988c8d4e55ad226772a31c158747ab.exe 3592 c7988c8d4e55ad226772a31c158747ab.exe 3592 c7988c8d4e55ad226772a31c158747ab.exe 1952 c7988c8d4e55ad226772a31c158747ab.exe 1952 c7988c8d4e55ad226772a31c158747ab.exe 1952 c7988c8d4e55ad226772a31c158747ab.exe 1952 c7988c8d4e55ad226772a31c158747ab.exe 1952 c7988c8d4e55ad226772a31c158747ab.exe 1952 c7988c8d4e55ad226772a31c158747ab.exe 1612 winlogon.exe 1612 winlogon.exe 1612 winlogon.exe 2736 system32.exe 2736 system32.exe 2736 system32.exe 2736 system32.exe 2736 system32.exe 2736 system32.exe 2736 system32.exe 2736 system32.exe 3968 qshtkbttphgg.exe 3968 qshtkbttphgg.exe 3968 qshtkbttphgg.exe 3968 qshtkbttphgg.exe 3968 qshtkbttphgg.exe 3968 qshtkbttphgg.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1952 c7988c8d4e55ad226772a31c158747ab.exe 1612 winlogon.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 1612 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3592 c7988c8d4e55ad226772a31c158747ab.exe Token: SeDebugPrivilege 1952 c7988c8d4e55ad226772a31c158747ab.exe Token: SeDebugPrivilege 1612 winlogon.exe Token: SeDebugPrivilege 1612 winlogon.exe Token: SeDebugPrivilege 780 wanhost.exe Token: SeDebugPrivilege 2736 system32.exe Token: SeShutdownPrivilege 2228 powercfg.exe Token: SeCreatePagefilePrivilege 2228 powercfg.exe Token: SeShutdownPrivilege 2420 powercfg.exe Token: SeCreatePagefilePrivilege 2420 powercfg.exe Token: SeShutdownPrivilege 4372 powercfg.exe Token: SeCreatePagefilePrivilege 4372 powercfg.exe Token: SeShutdownPrivilege 2192 powercfg.exe Token: SeCreatePagefilePrivilege 2192 powercfg.exe Token: SeDebugPrivilege 3968 qshtkbttphgg.exe Token: SeShutdownPrivilege 3352 powercfg.exe Token: SeCreatePagefilePrivilege 3352 powercfg.exe Token: SeShutdownPrivilege 60 powercfg.exe Token: SeCreatePagefilePrivilege 60 powercfg.exe Token: SeShutdownPrivilege 4764 powercfg.exe Token: SeCreatePagefilePrivilege 4764 powercfg.exe Token: SeShutdownPrivilege 704 powercfg.exe Token: SeCreatePagefilePrivilege 704 powercfg.exe Token: SeLockMemoryPrivilege 2240 explorer.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 3592 wrote to memory of 1952 3592 c7988c8d4e55ad226772a31c158747ab.exe 86 PID 3592 wrote to memory of 1952 3592 c7988c8d4e55ad226772a31c158747ab.exe 86 PID 3592 wrote to memory of 1952 3592 c7988c8d4e55ad226772a31c158747ab.exe 86 PID 3592 wrote to memory of 1952 3592 c7988c8d4e55ad226772a31c158747ab.exe 86 PID 3592 wrote to memory of 1952 3592 c7988c8d4e55ad226772a31c158747ab.exe 86 PID 3592 wrote to memory of 1952 3592 c7988c8d4e55ad226772a31c158747ab.exe 86 PID 3592 wrote to memory of 1952 3592 c7988c8d4e55ad226772a31c158747ab.exe 86 PID 3592 wrote to memory of 1952 3592 c7988c8d4e55ad226772a31c158747ab.exe 86 PID 1952 wrote to memory of 556 1952 c7988c8d4e55ad226772a31c158747ab.exe 87 PID 1952 wrote to memory of 556 1952 c7988c8d4e55ad226772a31c158747ab.exe 87 PID 1952 wrote to memory of 556 1952 c7988c8d4e55ad226772a31c158747ab.exe 87 PID 1952 wrote to memory of 2728 1952 c7988c8d4e55ad226772a31c158747ab.exe 89 PID 1952 wrote to memory of 2728 1952 c7988c8d4e55ad226772a31c158747ab.exe 89 PID 1952 wrote to memory of 2728 1952 c7988c8d4e55ad226772a31c158747ab.exe 89 PID 1952 wrote to memory of 1612 1952 c7988c8d4e55ad226772a31c158747ab.exe 93 PID 1952 wrote to memory of 1612 1952 c7988c8d4e55ad226772a31c158747ab.exe 93 PID 1952 wrote to memory of 1612 1952 c7988c8d4e55ad226772a31c158747ab.exe 93 PID 1952 wrote to memory of 780 1952 c7988c8d4e55ad226772a31c158747ab.exe 94 PID 1952 wrote to memory of 780 1952 c7988c8d4e55ad226772a31c158747ab.exe 94 PID 1952 wrote to memory of 996 1952 c7988c8d4e55ad226772a31c158747ab.exe 95 PID 1952 wrote to memory of 996 1952 c7988c8d4e55ad226772a31c158747ab.exe 95 PID 1952 wrote to memory of 996 1952 c7988c8d4e55ad226772a31c158747ab.exe 95 PID 1612 wrote to memory of 4556 1612 winlogon.exe 97 PID 1612 wrote to memory of 4556 1612 winlogon.exe 97 PID 1612 wrote to memory of 4556 1612 winlogon.exe 97 PID 1612 wrote to memory of 3716 1612 winlogon.exe 99 PID 1612 wrote to memory of 3716 1612 winlogon.exe 99 PID 1612 wrote to memory of 3716 1612 winlogon.exe 99 PID 1952 wrote to memory of 2736 1952 c7988c8d4e55ad226772a31c158747ab.exe 101 PID 1952 wrote to memory of 2736 1952 c7988c8d4e55ad226772a31c158747ab.exe 101 PID 3968 wrote to memory of 1524 3968 qshtkbttphgg.exe 123 PID 3968 wrote to memory of 1524 3968 qshtkbttphgg.exe 123 PID 3968 wrote to memory of 1524 3968 qshtkbttphgg.exe 123 PID 3968 wrote to memory of 1524 3968 qshtkbttphgg.exe 123 PID 3968 wrote to memory of 1524 3968 qshtkbttphgg.exe 123 PID 3968 wrote to memory of 1524 3968 qshtkbttphgg.exe 123 PID 3968 wrote to memory of 1524 3968 qshtkbttphgg.exe 123 PID 3968 wrote to memory of 1524 3968 qshtkbttphgg.exe 123 PID 3968 wrote to memory of 1524 3968 qshtkbttphgg.exe 123 PID 3968 wrote to memory of 2240 3968 qshtkbttphgg.exe 128 PID 3968 wrote to memory of 2240 3968 qshtkbttphgg.exe 128 PID 3968 wrote to memory of 2240 3968 qshtkbttphgg.exe 128 PID 3968 wrote to memory of 2240 3968 qshtkbttphgg.exe 128 PID 3968 wrote to memory of 2240 3968 qshtkbttphgg.exe 128 PID 1952 wrote to memory of 3340 1952 c7988c8d4e55ad226772a31c158747ab.exe 130 PID 1952 wrote to memory of 3340 1952 c7988c8d4e55ad226772a31c158747ab.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7988c8d4e55ad226772a31c158747ab.exe"C:\Users\Admin\AppData\Local\Temp\c7988c8d4e55ad226772a31c158747ab.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\c7988c8d4e55ad226772a31c158747ab.exe"C:\Users\Admin\AppData\Local\Temp\c7988c8d4e55ad226772a31c158747ab.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "NAS Manager" /xml "C:\Users\Admin\AppData\Local\Temp\tmpB95D.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:556
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "NAS Manager Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpB9BC.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2728
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /delete /f /tn "Microsoft\Windows\Client Server Runtime Process"4⤵
- System Location Discovery: System Language Discovery
PID:4556
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "Microsoft\Windows\Client Server Runtime Process" /xml "C:\Users\Admin\AppData\Local\Temp\tmpF906.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3716
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wanhost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wanhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
C:\Windows\SysWOW64\reg.exe"reg.exe" ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:996
-
-
C:\Users\Admin\AppData\Local\system32.exe"C:\Users\Admin\AppData\Local\system32.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "AHMOQNZH"4⤵
- Launches sc.exe
PID:872
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "AHMOQNZH" binpath= "C:\ProgramData\ipbodjvyupmv\qshtkbttphgg.exe" start= "auto"4⤵
- Launches sc.exe
PID:2788
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:5048
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "AHMOQNZH"4⤵
- Launches sc.exe
PID:2128
-
-
-
C:\Users\Admin\AppData\Local\system32-checker.exe"C:\Users\Admin\AppData\Local\system32-checker.exe"3⤵
- Executes dropped EXE
PID:3340
-
-
-
C:\ProgramData\ipbodjvyupmv\qshtkbttphgg.exeC:\ProgramData\ipbodjvyupmv\qshtkbttphgg.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:60
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:704
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1524
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\c7988c8d4e55ad226772a31c158747ab.exe.log
Filesize1KB
MD5400f1cc1a0a0ce1cdabda365ab3368ce
SHA11ecf683f14271d84f3b6063493dce00ff5f42075
SHA256c8fa64f4b69df13ed6408fd4a204f318a36c2f38c85d4a4d42adfc9173f73765
SHA51214c8cfd58d097e5e89c8cabe1e665173f1ccf604a9ef70cdcb84116e265f90819c19c891be408e0ad7e29086a5c2ea2883b7a7d1184878dbbac63e2cabcd1c45
-
Filesize
1KB
MD55250c379ebc0bb4dd0eb0756c6cadabb
SHA125ab9172161d651b9e7fe1de26913876e5d8a157
SHA2564512855446397a34f8f57b295508bf0a9b43a08d988d74e67ea66003ebed0e0b
SHA5127e5c42f06599edf6a89d5517ae7a82ad8b6ebc47c1efa4185cc254c39b11eaef969feac7a9799346ba5f2469426e6b0da759986024742cc4d260c79b17de5d4a
-
Filesize
1KB
MD537972343c32d4ffa794c46c734bdbdfb
SHA1f2ad1ea334fe9c2732d1f143fe13fdfc6349832a
SHA256494a9aa377a68c73f23612a14c1de12da4e6401d2a151e15377ba0d51cbc1ee0
SHA5122b76b3f73f651ce87221094e638c27f24c9f1a23d42173e6f586300b4147ecfd2075a1feb478361bc44bbcb168b9616ce302d9565f357a9d62e52c5e14699056
-
Filesize
1KB
MD555f737e134714dd479fb8d4417a14df5
SHA14195b4131fb1215140baaaf5a6d8e26f305572af
SHA256f306ee4e70a9dd3281131c476541b78f8cbe387a8a507f3b98a48ef34ecf2835
SHA512446fa2af1cfb7057fd96fbaa26b4dcec67427399c8859c85ed11d5fb7b64f6abca39581faa2f17ca32c5e57759a448266d4be6af39e730d5e596cc41701fd1bf
-
Filesize
6KB
MD57c1867586dfd01366878ae08415c612c
SHA14526353fbb9b8be77f3c0f46778a740f84882f83
SHA256521f29dd7236b22daba7ea9537ef6be31057a08eec9526805b4685d7970e1372
SHA512ef4ff7128de21fcdec5019322247ae958b46c2ff20b36d65f32fd6921e2f7c7bd018168fb3a7c0c728f071160057c790b3d5b691aad24cd5ebd975e7abc409ba
-
Filesize
2.5MB
MD5a5c4e57922031e587bf09fb90453d73e
SHA14bc3a265800ef4f7df8402292d8218553b2860b6
SHA2563720ffed8da2ba9d4cabbe64331f939f36e750e7dd3d5b9ff4d937325b35543b
SHA5120fd81c9ca1ea8587fa33f2da3f45896b9d22e9f8a014513316274674a4256a4f04654462ed4ed87021e999964c895734aa2814e5a37f23a2010c594ad113a491
-
Filesize
176B
MD538aeddfe0a62791c70f4ef8e19c85527
SHA1100360edd1360965ab5cbb226dd5070b9ce99767
SHA256d92d3dbcdeb3570644af4ede31eedec9dacb1ccd8b73c297a34f7a95bd5c035c
SHA5122fb4aa0087c2d44eecb7b05888db6fb0139e6dfdc6bbf290c0c637a2c5fe72512f49b64a03424d47b165070ff4a503f3d31dc7c28d8a4969e00d22c071a4b8a8
-
Filesize
32KB
MD5bb88af07d7f92e77086eb2a090b508fd
SHA12fcf43147b61ed5c8e1d7d46398eb3749e649e78
SHA25677ce6f10d6034a1d7ab7768278cf8322b719729f612e6afe8cff72cb637cd6ec
SHA5127a41def72de640dbf057c41971b02213e75202a1863b41491e36644da17bcbfb16c41ae6c6af121b5b2f7fee4f0608f867a404f1bbbf8db5dc9444978868f7c3
-
Filesize
191KB
MD5ed3b00caa7c83ab730df4a14aeb5d6bf
SHA1453eeebd3cd4a0faf5e7eca63ea6cdb0ed96971a
SHA256456b4cf130884ff7283aa415425ff6e3f6c610211bc7504e41bba9346dacd827
SHA512fb64f0d53215cfcbd18f9de977e2f41323192b9329e67f7c26f53692970a2688f0a6a80f836c073945404e84364620f49790b22499bbf65c904341b90ccba954