Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 19:20
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
xworm
-
Install_directory
%Userprofile%
-
install_file
mgdBroker.exe
-
pastebin_url
https://pastebin.com/raw/vsmgs6F2
Signatures
-
Detect Xworm Payload 9 IoCs
resource yara_rule behavioral1/files/0x0008000000023d28-98.dat family_xworm behavioral1/files/0x0008000000023d36-104.dat family_xworm behavioral1/files/0x0008000000023d37-115.dat family_xworm behavioral1/memory/4976-122-0x0000000000400000-0x000000000042B000-memory.dmp family_xworm behavioral1/memory/1892-123-0x0000000000840000-0x0000000000856000-memory.dmp family_xworm behavioral1/memory/4224-124-0x0000000000730000-0x0000000000744000-memory.dmp family_xworm behavioral1/memory/5332-241-0x0000000000400000-0x000000000042B000-memory.dmp family_xworm behavioral1/memory/5424-243-0x0000000000400000-0x000000000042B000-memory.dmp family_xworm behavioral1/memory/5616-269-0x0000000000400000-0x000000000042B000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5160 powershell.exe 5212 powershell.exe 5508 powershell.exe 5524 powershell.exe 5852 powershell.exe 5868 powershell.exe 2860 powershell.exe 784 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation Extreme Injector v3.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation taskhostk.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation Taskhostx.exe -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mgdBroker.lnk taskhostk.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mgdBroker.lnk taskhostk.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mgdBroker.lnk Taskhostx.exe -
Executes dropped EXE 6 IoCs
pid Process 4976 Extreme Injector v3.exe 1892 taskhostk.exe 4224 Taskhostx.exe 5332 Extreme Injector v3.exe 5424 Extreme Injector v3.exe 5616 Extreme Injector v3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mgdBroker = "C:\\Users\\Admin\\mgdBroker.exe" taskhostk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mgdBroker = "C:\\Users\\Admin\\mgdBroker.exe" Taskhostx.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 96 pastebin.com 97 pastebin.com 98 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Extreme Injector v3.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133853304570977863" chrome.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 3468 chrome.exe 3468 chrome.exe 2860 powershell.exe 2860 powershell.exe 784 powershell.exe 784 powershell.exe 2860 powershell.exe 784 powershell.exe 5160 powershell.exe 5160 powershell.exe 5212 powershell.exe 5212 powershell.exe 5160 powershell.exe 5212 powershell.exe 5524 powershell.exe 5524 powershell.exe 5508 powershell.exe 5508 powershell.exe 5508 powershell.exe 5524 powershell.exe 5868 powershell.exe 5868 powershell.exe 5852 powershell.exe 5852 powershell.exe 5868 powershell.exe 5852 powershell.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2268 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3468 chrome.exe 3468 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeRestorePrivilege 2268 7zFM.exe Token: 35 2268 7zFM.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeSecurityPrivilege 2268 7zFM.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe Token: SeCreatePagefilePrivilege 3468 chrome.exe Token: SeShutdownPrivilege 3468 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 2268 7zFM.exe 2268 7zFM.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe -
Suspicious use of SendNotifyMessage 57 IoCs
pid Process 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe 5232 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3468 wrote to memory of 3496 3468 chrome.exe 87 PID 3468 wrote to memory of 3496 3468 chrome.exe 87 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 1604 3468 chrome.exe 88 PID 3468 wrote to memory of 2988 3468 chrome.exe 89 PID 3468 wrote to memory of 2988 3468 chrome.exe 89 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90 PID 3468 wrote to memory of 4020 3468 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://workupload.com/file/e37BeKxhFSE1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc9086cc40,0x7ffc9086cc4c,0x7ffc9086cc582⤵PID:3496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1844,i,4712760810552489726,8997574049851616905,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2124,i,4712760810552489726,8997574049851616905,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2156 /prefetch:32⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,4712760810552489726,8997574049851616905,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2248 /prefetch:82⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,4712760810552489726,8997574049851616905,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3112,i,4712760810552489726,8997574049851616905,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4592,i,4712760810552489726,8997574049851616905,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4604 /prefetch:82⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4972,i,4712760810552489726,8997574049851616905,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4628 /prefetch:82⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2816
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3404
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2352
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\RML.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2268
-
C:\Users\Admin\Desktop\Extreme Injector v3.exe"C:\Users\Admin\Desktop\Extreme Injector v3.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\taskhostk.exe"C:\Users\Admin\AppData\Local\Temp\taskhostk.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
PID:1892 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\taskhostk.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'taskhostk.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5160
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\mgdBroker.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5524
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'mgdBroker.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Taskhostx.exe"C:\Users\Admin\AppData\Local\Temp\Taskhostx.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
PID:4224 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Taskhostx.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:784
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Taskhostx.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5212
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\mgdBroker.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5508
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'mgdBroker.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5868
-
-
-
C:\Users\Admin\Desktop\Extreme Injector v3.exe"C:\Users\Admin\Desktop\Extreme Injector v3.exe"1⤵
- Executes dropped EXE
PID:5332
-
C:\Users\Admin\Desktop\Extreme Injector v3.exe"C:\Users\Admin\Desktop\Extreme Injector v3.exe"1⤵
- Executes dropped EXE
PID:5424
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5232
-
C:\Users\Admin\Desktop\Extreme Injector v3.exe"C:\Users\Admin\Desktop\Extreme Injector v3.exe"1⤵
- Executes dropped EXE
PID:5616
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD58e39666b2dee2531f565f68ed49f5140
SHA18dd837397829b8a94f3f206d7ea9b4a73fd5ffbd
SHA2567c0dee0a3ad681fd40d047e3e68b12a2b7d1f4d32d0e0616ab18718133ffa6c0
SHA512dc131d6d752cbc333daa03e578a9924062f135ef4f0ee8164952aef2bba7540876be6ae95639b962fd77e58bb20cd1cd297ed38c6951b281a0e75f8960b24c7f
-
Filesize
216B
MD524063a5c2acebd1a3ed2cac2689550e0
SHA18cfeff41659ba9442b86968768884767b7c0c7e7
SHA256ad56f1724a0b35ab73fbd87b2d51a79c2580693b078f0dd5410310dfef205183
SHA51273a337c5bcfd53c778b6b646ad4d1de47e12f445c49f23d428484eb93237e8a74adac9f8f804699f1a28248ecaffeaa7f4f2ab0592099d40ab826b928e0b5873
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5f13e349df1e8033ecaf93477e319a0e6
SHA1078b0cea13a831ed3facaba39859f03ae68543fa
SHA25687a5424f49fcf5e34ffa6bb69d086ae6f197c05e545bf761bf0253356bbbbb77
SHA51287b3dd0240690fb705446a740c58fd7e9d85fb225e734a80687da5d56fea88dc12f9548da44ddc76e4159b2e6882b34f1645e57731edd39aa23c1ec235cccf32
-
Filesize
9KB
MD5eca65a71d5c4f4e25f331830ed2a8090
SHA1799f3f7003622af7a01ae16f1f0344819d41bb84
SHA25682db4adeab35ff3c74ee47d4f7a130cd6d9abf08f0405201c7a6cca49d395fba
SHA512c24d4f8562289c8bd2268334ea9f2650a0fb750c1203c2c8bae4d6741770a90d3ce6f167be69accd9479c117335cef03015f62b90c3045bc173f7d8d3835ba64
-
Filesize
9KB
MD5e80a0f11bcc7d42a2182bcf5c5c6c4b1
SHA1fb1d8744432356ae6a4c9ac5c46650d2aa7c1b65
SHA25677f01fc2352db28c2d274260b1e886cf4717b1eefa065043018ae137252e2c64
SHA512a5991c40d06b70caaa6f3a35db143afcc2cfc35ddcbcc94c5f5c5f1c3f710430af44d87ee5009e9fdc7a5912f103c1c59f18c22838b23c99f428c0042ebe476d
-
Filesize
9KB
MD5d3cfbe7f31f563a3d595ef22a5c3fd42
SHA1e8691990f105b4560aeffeffe06b60116810b2fe
SHA2564659c75eb5138a23853a657a88e79c4052d7c3b09352b46e9ff75cc0584c944d
SHA512b484368a26c0fb205bd4d2d4c5c2c746f6a9072ddadb132ab7cfbccdfead16ed55c7f85b34efa1a137459a1c635156cbc1775015aca7075dac8bfdeba12bb3b4
-
Filesize
123KB
MD560f5c4a543d1ca892b3625e41e66d9f9
SHA19a9ec5ab4ad22e96b27c7c33a1e3a09e83debd27
SHA2564f26fae87599d2769a5a480466f38dbcd7e4fd050cbc9cb244429dbf57cc725c
SHA5129f7d33cd59fbb3e24fd314b432ba7e5816c8d43c42e4ad2bd8c24a4bf44168329e2e2d4c9edca0a965eb73101b16375535476bfa91105d0c1d3097a031211594
-
Filesize
123KB
MD57a18fc8ab6174e81adada4bab6e269d6
SHA1006c9a74102b073606128bf166f9b14441823aec
SHA2562f02c3c021503cbaf41fa5f456e56896695af58f1bc7e8116bda36241b71d9f7
SHA512eacad66e34ac26935c55732e82e5af5a12709e0fc57bf4c532b02b4a6a54d2fb483a56c1df02489d422257a854875861c4ae6b5ffca99da3cee13d69ee9711b5
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
944B
MD5a2c8179aaa149c0b9791b73ce44c04d1
SHA1703361b0d43ec7f669304e7c0ffbbfdeb1e484ff
SHA256c1d30342a40a2b6e7553da30ceb85754d33820f6fbb3bbbed1ceb30d6390de4a
SHA5122e201dd457d055baad86f68c15bcc7beb48d6dc2ffc10db7f304eb93f697e7b45991cbde857d25da2c9c60c23f3e13df8b5ed5809c1753737a23096e296cc9e3
-
Filesize
944B
MD5ef647504cf229a16d02de14a16241b90
SHA181480caca469857eb93c75d494828b81e124fda0
SHA25647002672443e80410e55a0b6d683573ac27d70d803b57ee3c2818d1008669710
SHA512a6d8c08c708eee6f7e700880ce79d2ba7cd0acbe8529d96e18f3e90ea1f3cf33fd801dd6eba6017cdd02769e968c48278c090c1deeac710124f79423cd862ee1
-
Filesize
944B
MD522310ad6749d8cc38284aa616efcd100
SHA1440ef4a0a53bfa7c83fe84326a1dff4326dcb515
SHA25655b1d8021c4eb4c3c0d75e3ed7a4eb30cd0123e3d69f32eeb596fe4ffec05abf
SHA5122ef08e2ee15bb86695fe0c10533014ffed76ececc6e579d299d3365fafb7627f53e32e600bb6d872b9f58aca94f8cb7e1e94cdfd14777527f7f0aa019d9c6def
-
Filesize
56KB
MD5d075deb1cc427151c877a0c292ae6ac2
SHA1a6ba5721b318764dd9d8cb8ba5edadaf23b23a3e
SHA25673b64c9c294be0a4eb67946597d082b60fcd91f479dc3a5cdf9911e6cd2049e9
SHA512cf3444ec5fd903f4860fb2c75c1a552ee7c15fc5769966e033645f21cbe2389444f07c2759d780f9e5fb51be077e262bf0117137c1ef85d2da3622fb84c46aed
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
62KB
MD5b2ea4c16a4a92912b3b34c14f498318a
SHA1d3ffab4fa3ac543377e2217a3e9c4c7049b3b3f4
SHA256e04f5afe758d98e943d0acf2d0bea0a428a1b108721cb05cb0e9ce210bfa66e1
SHA512d7ec5e6d77839867973a7243f8bf687876544a7550383278345954a7324673ce85d575ae8352a41aa4003ffcba03d741db8f307dbcf8374a7134140e39fe0f63
-
Filesize
788B
MD5dd40c3cc9f1a4b1198121e7860643c9f
SHA1806c0a9886b9c801d64650573c3aec2c9bc2eb1f
SHA25679e9fe55ec83e0b651b69a60703abfaaa1d08f0a0a5476fd6e7a966701c03e5a
SHA5129547f41c3141b7fd5fc6c3e44ee2590c8796aad0bf78d3c021bc90ce231759c805b0fad28d47955ede1f821bc5c4d2570cebbc5012d4e2cdcbeeae1d9a88c9af
-
Filesize
144KB
MD53790561cf5628275a01a1572360cdb58
SHA1952587b5f39f04d825fdce38b19c9c2ee04c9d25
SHA256aad19fdaef49c05b86cdacd933a8985c328b413ad2b9a66989b4220cab4a302d
SHA512da03b374917eaa84b90d0393169436bce0f367f7b06b9fbb38fbd312c961aff53257fd869a6051b8738550ff573bb43e25b1dabacdb78fa7b1f5989a9a588e87
-
Filesize
281KB
MD55c001ede32c920739faf0b42fc429e16
SHA1524b25ceeb4e4ce68685c721dada14f221778fd2
SHA2562bbf9a2ebb51e818b72a53f9003a1599c2b82172e76af3a5de363548edb6d37e
SHA512ec03bca1f5269469ac2e51062b22cb6b99a7a874233a0dee307c18aef48a58ad20b034d9e98ea3febffadd651ba81fcc83d1fb402727a9acca96573f7ec482b3