Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2025, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
1d52c927094cc5862349a1b81ddaf10c.exe
Resource
win7-20240903-en
General
-
Target
1d52c927094cc5862349a1b81ddaf10c.exe
-
Size
988KB
-
MD5
1d52c927094cc5862349a1b81ddaf10c
-
SHA1
4f1038de14e08807f65ca8f240c034469c2479a0
-
SHA256
da551ab6e000732499227a67f2be68d1256b58d95963a903cc316e2730db9d1e
-
SHA512
7ce469e84160d9eac202c20f15bf008212cf681287055b5bacacd9ab6c18ad1ada8363db3b6a7601015caf231a00b9d29bf96b79bd43e01f5eca3e057667ec1e
-
SSDEEP
12288:4rT5UqCUfsgddxK+0wC150c6QVSeNuQXeDPVmJiW0qWkdw+bezWMcsZI0Bz:4SDl15Fbtq0++buPay
Malware Config
Extracted
nanocore
1.2.2.0
lxtihmjohnson163.airdns.org:43366
3740d544-7efc-40b2-8c32-f31974309f7d
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2024-10-21T12:36:42.768385536Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
43366
-
default_group
JAMJAM01
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
3740d544-7efc-40b2-8c32-f31974309f7d
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
lxtihmjohnson163.airdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
xworm
5.0
tunhost.duckdns.org:57891
wintun.freemyip.com:57891
87.249.134.68:57891
-
install_file
琀㴀Ā ☀☀ �䔗渀瘀椀爀漀渀洀攀渀琀�眍椀渀搀椀爀�瀝漀眀攀爀猀栀攀氀氀⸀攀砀攀�醀-C schtasks.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/memory/3032-33-0x0000000006FC0000-0x0000000007004000-memory.dmp family_xworm behavioral2/files/0x000200000001ea0b-40.dat family_xworm behavioral2/memory/3440-43-0x0000000000A90000-0x0000000000A9E000-memory.dmp family_xworm -
Nanocore family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Xmrig family
-
Xworm family
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/3060-67-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3060-69-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3060-70-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3060-71-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3060-68-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3060-72-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3060-73-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3060-74-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3060-76-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3060-75-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winlogon.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exe 1d52c927094cc5862349a1b81ddaf10c.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wanhost.exe 1d52c927094cc5862349a1b81ddaf10c.exe -
Executes dropped EXE 5 IoCs
pid Process 3616 winlogon.exe 3440 wanhost.exe 4932 system32.exe 2696 qshtkbttphgg.exe 3404 system32-checker.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DHCP Service = "C:\\Program Files (x86)\\DHCP Service\\dhcpsvc.exe" 1d52c927094cc5862349a1b81ddaf10c.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1d52c927094cc5862349a1b81ddaf10c.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 30 raw.githubusercontent.com 31 raw.githubusercontent.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 checkip.amazonaws.com 22 checkip.amazonaws.com -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 4068 powercfg.exe 868 powercfg.exe 220 powercfg.exe 2604 powercfg.exe 1232 powercfg.exe 512 powercfg.exe 4916 powercfg.exe 432 powercfg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2404 set thread context of 3032 2404 1d52c927094cc5862349a1b81ddaf10c.exe 87 PID 2696 set thread context of 4656 2696 qshtkbttphgg.exe 124 PID 2696 set thread context of 3060 2696 qshtkbttphgg.exe 129 -
resource yara_rule behavioral2/memory/3060-64-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3060-66-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3060-67-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3060-69-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3060-70-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3060-71-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3060-68-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3060-65-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3060-72-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3060-73-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3060-74-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3060-76-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3060-75-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\DHCP Service\dhcpsvc.exe 1d52c927094cc5862349a1b81ddaf10c.exe File opened for modification C:\Program Files (x86)\DHCP Service\dhcpsvc.exe 1d52c927094cc5862349a1b81ddaf10c.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 316 sc.exe 3348 sc.exe 716 sc.exe 4040 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d52c927094cc5862349a1b81ddaf10c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d52c927094cc5862349a1b81ddaf10c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier winlogon.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 winlogon.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1776 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1076 schtasks.exe 1564 schtasks.exe 464 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 3032 1d52c927094cc5862349a1b81ddaf10c.exe 3032 1d52c927094cc5862349a1b81ddaf10c.exe 3032 1d52c927094cc5862349a1b81ddaf10c.exe 3032 1d52c927094cc5862349a1b81ddaf10c.exe 3032 1d52c927094cc5862349a1b81ddaf10c.exe 3032 1d52c927094cc5862349a1b81ddaf10c.exe 3616 winlogon.exe 3616 winlogon.exe 3616 winlogon.exe 4932 system32.exe 4932 system32.exe 4932 system32.exe 4932 system32.exe 4932 system32.exe 4932 system32.exe 4932 system32.exe 4932 system32.exe 2696 qshtkbttphgg.exe 2696 qshtkbttphgg.exe 2696 qshtkbttphgg.exe 2696 qshtkbttphgg.exe 2696 qshtkbttphgg.exe 2696 qshtkbttphgg.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3032 1d52c927094cc5862349a1b81ddaf10c.exe 3616 winlogon.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 3616 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 3032 1d52c927094cc5862349a1b81ddaf10c.exe Token: SeDebugPrivilege 3616 winlogon.exe Token: SeDebugPrivilege 3616 winlogon.exe Token: SeDebugPrivilege 3440 wanhost.exe Token: SeDebugPrivilege 4932 system32.exe Token: SeShutdownPrivilege 4916 powercfg.exe Token: SeCreatePagefilePrivilege 4916 powercfg.exe Token: SeShutdownPrivilege 1232 powercfg.exe Token: SeCreatePagefilePrivilege 1232 powercfg.exe Token: SeShutdownPrivilege 512 powercfg.exe Token: SeCreatePagefilePrivilege 512 powercfg.exe Token: SeShutdownPrivilege 432 powercfg.exe Token: SeCreatePagefilePrivilege 432 powercfg.exe Token: SeDebugPrivilege 2696 qshtkbttphgg.exe Token: SeShutdownPrivilege 4068 powercfg.exe Token: SeCreatePagefilePrivilege 4068 powercfg.exe Token: SeShutdownPrivilege 220 powercfg.exe Token: SeCreatePagefilePrivilege 220 powercfg.exe Token: SeShutdownPrivilege 2604 powercfg.exe Token: SeCreatePagefilePrivilege 2604 powercfg.exe Token: SeShutdownPrivilege 868 powercfg.exe Token: SeCreatePagefilePrivilege 868 powercfg.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2404 wrote to memory of 3032 2404 1d52c927094cc5862349a1b81ddaf10c.exe 87 PID 2404 wrote to memory of 3032 2404 1d52c927094cc5862349a1b81ddaf10c.exe 87 PID 2404 wrote to memory of 3032 2404 1d52c927094cc5862349a1b81ddaf10c.exe 87 PID 2404 wrote to memory of 3032 2404 1d52c927094cc5862349a1b81ddaf10c.exe 87 PID 2404 wrote to memory of 3032 2404 1d52c927094cc5862349a1b81ddaf10c.exe 87 PID 2404 wrote to memory of 3032 2404 1d52c927094cc5862349a1b81ddaf10c.exe 87 PID 2404 wrote to memory of 3032 2404 1d52c927094cc5862349a1b81ddaf10c.exe 87 PID 2404 wrote to memory of 3032 2404 1d52c927094cc5862349a1b81ddaf10c.exe 87 PID 3032 wrote to memory of 1076 3032 1d52c927094cc5862349a1b81ddaf10c.exe 88 PID 3032 wrote to memory of 1076 3032 1d52c927094cc5862349a1b81ddaf10c.exe 88 PID 3032 wrote to memory of 1076 3032 1d52c927094cc5862349a1b81ddaf10c.exe 88 PID 3032 wrote to memory of 1564 3032 1d52c927094cc5862349a1b81ddaf10c.exe 90 PID 3032 wrote to memory of 1564 3032 1d52c927094cc5862349a1b81ddaf10c.exe 90 PID 3032 wrote to memory of 1564 3032 1d52c927094cc5862349a1b81ddaf10c.exe 90 PID 3032 wrote to memory of 3616 3032 1d52c927094cc5862349a1b81ddaf10c.exe 92 PID 3032 wrote to memory of 3616 3032 1d52c927094cc5862349a1b81ddaf10c.exe 92 PID 3032 wrote to memory of 3616 3032 1d52c927094cc5862349a1b81ddaf10c.exe 92 PID 3032 wrote to memory of 3440 3032 1d52c927094cc5862349a1b81ddaf10c.exe 93 PID 3032 wrote to memory of 3440 3032 1d52c927094cc5862349a1b81ddaf10c.exe 93 PID 3032 wrote to memory of 1776 3032 1d52c927094cc5862349a1b81ddaf10c.exe 94 PID 3032 wrote to memory of 1776 3032 1d52c927094cc5862349a1b81ddaf10c.exe 94 PID 3032 wrote to memory of 1776 3032 1d52c927094cc5862349a1b81ddaf10c.exe 94 PID 3616 wrote to memory of 1408 3616 winlogon.exe 96 PID 3616 wrote to memory of 1408 3616 winlogon.exe 96 PID 3616 wrote to memory of 1408 3616 winlogon.exe 96 PID 3616 wrote to memory of 464 3616 winlogon.exe 98 PID 3616 wrote to memory of 464 3616 winlogon.exe 98 PID 3616 wrote to memory of 464 3616 winlogon.exe 98 PID 3032 wrote to memory of 4932 3032 1d52c927094cc5862349a1b81ddaf10c.exe 100 PID 3032 wrote to memory of 4932 3032 1d52c927094cc5862349a1b81ddaf10c.exe 100 PID 2696 wrote to memory of 4656 2696 qshtkbttphgg.exe 124 PID 2696 wrote to memory of 4656 2696 qshtkbttphgg.exe 124 PID 2696 wrote to memory of 4656 2696 qshtkbttphgg.exe 124 PID 2696 wrote to memory of 4656 2696 qshtkbttphgg.exe 124 PID 2696 wrote to memory of 4656 2696 qshtkbttphgg.exe 124 PID 2696 wrote to memory of 4656 2696 qshtkbttphgg.exe 124 PID 2696 wrote to memory of 4656 2696 qshtkbttphgg.exe 124 PID 2696 wrote to memory of 4656 2696 qshtkbttphgg.exe 124 PID 2696 wrote to memory of 4656 2696 qshtkbttphgg.exe 124 PID 2696 wrote to memory of 3060 2696 qshtkbttphgg.exe 129 PID 2696 wrote to memory of 3060 2696 qshtkbttphgg.exe 129 PID 2696 wrote to memory of 3060 2696 qshtkbttphgg.exe 129 PID 2696 wrote to memory of 3060 2696 qshtkbttphgg.exe 129 PID 2696 wrote to memory of 3060 2696 qshtkbttphgg.exe 129 PID 3032 wrote to memory of 3404 3032 1d52c927094cc5862349a1b81ddaf10c.exe 131 PID 3032 wrote to memory of 3404 3032 1d52c927094cc5862349a1b81ddaf10c.exe 131
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d52c927094cc5862349a1b81ddaf10c.exe"C:\Users\Admin\AppData\Local\Temp\1d52c927094cc5862349a1b81ddaf10c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\1d52c927094cc5862349a1b81ddaf10c.exe"C:\Users\Admin\AppData\Local\Temp\1d52c927094cc5862349a1b81ddaf10c.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DHCP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmpCDC0.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1076
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DHCP Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpCE1E.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1564
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /delete /f /tn "Microsoft\Windows\Client Server Runtime Process"4⤵
- System Location Discovery: System Language Discovery
PID:1408
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "Microsoft\Windows\Client Server Runtime Process" /xml "C:\Users\Admin\AppData\Local\Temp\tmpF472.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:464
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wanhost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wanhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3440
-
-
C:\Windows\SysWOW64\reg.exe"reg.exe" ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1776
-
-
C:\Users\Admin\AppData\Local\system32.exe"C:\Users\Admin\AppData\Local\system32.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4932 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:512
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "AHMOQNZH"4⤵
- Launches sc.exe
PID:3348
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "AHMOQNZH" binpath= "C:\ProgramData\ipbodjvyupmv\qshtkbttphgg.exe" start= "auto"4⤵
- Launches sc.exe
PID:716
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:4040
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "AHMOQNZH"4⤵
- Launches sc.exe
PID:316
-
-
-
C:\Users\Admin\AppData\Local\system32-checker.exe"C:\Users\Admin\AppData\Local\system32-checker.exe"3⤵
- Executes dropped EXE
PID:3404
-
-
-
C:\ProgramData\ipbodjvyupmv\qshtkbttphgg.exeC:\ProgramData\ipbodjvyupmv\qshtkbttphgg.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:4656
-
-
C:\Windows\explorer.exeexplorer.exe2⤵PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\1d52c927094cc5862349a1b81ddaf10c.exe.log
Filesize1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
1KB
MD5c5294abdc5d48ad2cfc408919358ecea
SHA16cdac5fd37dc54fa66178d77f6a7c9334b2dcc43
SHA2568a74ba61a288c81c96f06f5d3bfcdc9019c7b9895e6cd898ca68f7aa44812934
SHA5124063b221df0512fd4eb570c4b061d1114ed2e773459aca5d840b6628c7feaf6f796b875330cfae616e8ecf7711fe297ed4737c7ddae2168cc390ef993115a859
-
Filesize
1KB
MD57f4b37265a0a4b0fea67999d11d911e8
SHA11b8e13e6a27c3768c30cf713b79eaa8a757e1349
SHA25639b16b3a00b6b43c6820357127228c0768a577153014ce7b0ea3c585244dc08b
SHA512ef97ccfb663555aedc7fdc4b3ac4cd6536c80a778b4ec3bc6124a09544733988de1dac1e6a3714b0d6e8713e3523e0732d5dfcf674f2c5e1f3eadacb0c8e5e03
-
Filesize
1KB
MD555f737e134714dd479fb8d4417a14df5
SHA14195b4131fb1215140baaaf5a6d8e26f305572af
SHA256f306ee4e70a9dd3281131c476541b78f8cbe387a8a507f3b98a48ef34ecf2835
SHA512446fa2af1cfb7057fd96fbaa26b4dcec67427399c8859c85ed11d5fb7b64f6abca39581faa2f17ca32c5e57759a448266d4be6af39e730d5e596cc41701fd1bf
-
Filesize
6KB
MD57c1867586dfd01366878ae08415c612c
SHA14526353fbb9b8be77f3c0f46778a740f84882f83
SHA256521f29dd7236b22daba7ea9537ef6be31057a08eec9526805b4685d7970e1372
SHA512ef4ff7128de21fcdec5019322247ae958b46c2ff20b36d65f32fd6921e2f7c7bd018168fb3a7c0c728f071160057c790b3d5b691aad24cd5ebd975e7abc409ba
-
Filesize
2.5MB
MD5a5c4e57922031e587bf09fb90453d73e
SHA14bc3a265800ef4f7df8402292d8218553b2860b6
SHA2563720ffed8da2ba9d4cabbe64331f939f36e750e7dd3d5b9ff4d937325b35543b
SHA5120fd81c9ca1ea8587fa33f2da3f45896b9d22e9f8a014513316274674a4256a4f04654462ed4ed87021e999964c895734aa2814e5a37f23a2010c594ad113a491
-
Filesize
32KB
MD5bb88af07d7f92e77086eb2a090b508fd
SHA12fcf43147b61ed5c8e1d7d46398eb3749e649e78
SHA25677ce6f10d6034a1d7ab7768278cf8322b719729f612e6afe8cff72cb637cd6ec
SHA5127a41def72de640dbf057c41971b02213e75202a1863b41491e36644da17bcbfb16c41ae6c6af121b5b2f7fee4f0608f867a404f1bbbf8db5dc9444978868f7c3
-
Filesize
191KB
MD5ed3b00caa7c83ab730df4a14aeb5d6bf
SHA1453eeebd3cd4a0faf5e7eca63ea6cdb0ed96971a
SHA256456b4cf130884ff7283aa415425ff6e3f6c610211bc7504e41bba9346dacd827
SHA512fb64f0d53215cfcbd18f9de977e2f41323192b9329e67f7c26f53692970a2688f0a6a80f836c073945404e84364620f49790b22499bbf65c904341b90ccba954