Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 19:28
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240903-en
General
-
Target
XClient.exe
-
Size
65KB
-
MD5
b2b82399ba6e9a1dad5056d76fd7c38c
-
SHA1
acd51a93c03e6375282c732e46dbba093d004277
-
SHA256
b79174702d042f1f7fb9ae8edc60262397d736b34751eb1a3bc810c9a8728c46
-
SHA512
9ba54b085761f397f8a7e0825e1d4bbba63662556bfe7a789f1895849bc6f8477d69953c75984cdac7fe501dc02954c6254943b60989934fa08331711644f75d
-
SSDEEP
1536:m3/NH4JsOCr53ewg/pFNQLDOeP8Br1+kb1bQ11XyBGqOcgoP7SQ:oNH4+VNg/pFODpgckb1a8BGqOcgaSQ
Malware Config
Extracted
xworm
paypal-themselves.gl.at.ply.gg:34855
-
Install_directory
%Userprofile%
-
install_file
winaudiog.exe
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/files/0x00060000000175f1-90.dat disable_win_def behavioral1/memory/1620-105-0x00000000020F0000-0x00000000020FE000-memory.dmp disable_win_def -
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1620-1-0x0000000000870000-0x0000000000886000-memory.dmp family_xworm -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" WScript.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" WScript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" WScript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection WScript.exe -
Xworm family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2524 netsh.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0006000000018745-89.dat acprotect -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winaudiog.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winaudiog.lnk XClient.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FPJMCI.lnk program startup.exe -
Executes dropped EXE 6 IoCs
pid Process 1436 kpwxbe.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1976 majid z hacker website.exe 1240 program startup.exe 1560 microsoft corporation.exe 2540 microsoft corporation.exe -
Loads dropped DLL 9 IoCs
pid Process 1620 XClient.exe 1436 kpwxbe.exe 1436 kpwxbe.exe 1976 majid z hacker website.exe 1976 majid z hacker website.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1240 program startup.exe 1560 microsoft corporation.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\FPJMCI = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windata\\program startup.exe\"" program startup.exe -
pid Process 2516 powershell.exe 2292 powershell.exe 2608 powershell.exe 1568 powershell.exe 2000 powershell.exe 3024 powershell.exe 1696 powershell.exe 2640 powershell.exe 3044 powershell.exe 2864 powershell.exe 928 powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ipapi.co 18 ipapi.co -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000016cab-26.dat autoit_exe behavioral1/memory/1240-46-0x0000000000400000-0x00000000004CA000-memory.dmp autoit_exe behavioral1/memory/1764-98-0x0000000000810000-0x0000000001E17000-memory.dmp autoit_exe behavioral1/memory/1764-110-0x0000000000810000-0x0000000001E17000-memory.dmp autoit_exe behavioral1/memory/1764-166-0x0000000000810000-0x0000000001E17000-memory.dmp autoit_exe behavioral1/memory/1764-149-0x0000000000810000-0x0000000001E17000-memory.dmp autoit_exe behavioral1/memory/1764-138-0x0000000000810000-0x0000000001E17000-memory.dmp autoit_exe behavioral1/memory/1240-339-0x0000000000400000-0x00000000004CA000-memory.dmp autoit_exe -
resource yara_rule behavioral1/files/0x00070000000174f8-41.dat upx behavioral1/memory/1240-46-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral1/files/0x0006000000018745-89.dat upx behavioral1/memory/1764-94-0x0000000010000000-0x00000000100BB000-memory.dmp upx behavioral1/memory/1240-339-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral1/memory/1764-341-0x0000000010000000-0x00000000100BB000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 888_RAT_1.0.9 Cracked by Shark M!nd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsoft corporation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsoft corporation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language majid z hacker website.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language program startup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WSCript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kpwxbe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x0007000000016ca0-21.dat nsis_installer_1 behavioral1/files/0x0007000000016ca0-21.dat nsis_installer_2 behavioral1/files/0x00070000000174b4-24.dat nsis_installer_1 behavioral1/files/0x00070000000174b4-24.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 2608 powershell.exe 2292 powershell.exe 1696 powershell.exe 2864 powershell.exe 2640 powershell.exe 3044 powershell.exe 1568 powershell.exe 2516 powershell.exe 928 powershell.exe 2000 powershell.exe 3024 powershell.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe 1240 program startup.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1240 program startup.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 1620 XClient.exe Token: SeDebugPrivilege 2608 powershell.exe Token: SeDebugPrivilege 2516 powershell.exe Token: SeDebugPrivilege 1568 powershell.exe Token: SeDebugPrivilege 3044 powershell.exe Token: SeDebugPrivilege 2640 powershell.exe Token: SeDebugPrivilege 2864 powershell.exe Token: SeDebugPrivilege 1696 powershell.exe Token: SeDebugPrivilege 2292 powershell.exe Token: SeDebugPrivilege 2000 powershell.exe Token: SeDebugPrivilege 928 powershell.exe Token: SeDebugPrivilege 3024 powershell.exe Token: SeDebugPrivilege 1560 microsoft corporation.exe Token: 33 908 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 908 AUDIODG.EXE Token: 33 908 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 908 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 1620 XClient.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1764 888_RAT_1.0.9 Cracked by Shark M!nd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1436 1620 XClient.exe 32 PID 1620 wrote to memory of 1436 1620 XClient.exe 32 PID 1620 wrote to memory of 1436 1620 XClient.exe 32 PID 1620 wrote to memory of 1436 1620 XClient.exe 32 PID 1436 wrote to memory of 1764 1436 kpwxbe.exe 33 PID 1436 wrote to memory of 1764 1436 kpwxbe.exe 33 PID 1436 wrote to memory of 1764 1436 kpwxbe.exe 33 PID 1436 wrote to memory of 1764 1436 kpwxbe.exe 33 PID 1436 wrote to memory of 1976 1436 kpwxbe.exe 34 PID 1436 wrote to memory of 1976 1436 kpwxbe.exe 34 PID 1436 wrote to memory of 1976 1436 kpwxbe.exe 34 PID 1436 wrote to memory of 1976 1436 kpwxbe.exe 34 PID 1976 wrote to memory of 1240 1976 majid z hacker website.exe 35 PID 1976 wrote to memory of 1240 1976 majid z hacker website.exe 35 PID 1976 wrote to memory of 1240 1976 majid z hacker website.exe 35 PID 1976 wrote to memory of 1240 1976 majid z hacker website.exe 35 PID 1976 wrote to memory of 1560 1976 majid z hacker website.exe 36 PID 1976 wrote to memory of 1560 1976 majid z hacker website.exe 36 PID 1976 wrote to memory of 1560 1976 majid z hacker website.exe 36 PID 1976 wrote to memory of 1560 1976 majid z hacker website.exe 36 PID 1976 wrote to memory of 1068 1976 majid z hacker website.exe 37 PID 1976 wrote to memory of 1068 1976 majid z hacker website.exe 37 PID 1976 wrote to memory of 1068 1976 majid z hacker website.exe 37 PID 1976 wrote to memory of 1068 1976 majid z hacker website.exe 37 PID 1068 wrote to memory of 916 1068 WScript.exe 38 PID 1068 wrote to memory of 916 1068 WScript.exe 38 PID 1068 wrote to memory of 916 1068 WScript.exe 38 PID 1068 wrote to memory of 916 1068 WScript.exe 38 PID 916 wrote to memory of 1696 916 WScript.exe 39 PID 916 wrote to memory of 1696 916 WScript.exe 39 PID 916 wrote to memory of 1696 916 WScript.exe 39 PID 916 wrote to memory of 1696 916 WScript.exe 39 PID 916 wrote to memory of 2608 916 WScript.exe 41 PID 916 wrote to memory of 2608 916 WScript.exe 41 PID 916 wrote to memory of 2608 916 WScript.exe 41 PID 916 wrote to memory of 2608 916 WScript.exe 41 PID 916 wrote to memory of 2640 916 WScript.exe 43 PID 916 wrote to memory of 2640 916 WScript.exe 43 PID 916 wrote to memory of 2640 916 WScript.exe 43 PID 916 wrote to memory of 2640 916 WScript.exe 43 PID 916 wrote to memory of 2292 916 WScript.exe 45 PID 916 wrote to memory of 2292 916 WScript.exe 45 PID 916 wrote to memory of 2292 916 WScript.exe 45 PID 916 wrote to memory of 2292 916 WScript.exe 45 PID 916 wrote to memory of 2516 916 WScript.exe 47 PID 916 wrote to memory of 2516 916 WScript.exe 47 PID 916 wrote to memory of 2516 916 WScript.exe 47 PID 916 wrote to memory of 2516 916 WScript.exe 47 PID 916 wrote to memory of 928 916 WScript.exe 50 PID 916 wrote to memory of 928 916 WScript.exe 50 PID 916 wrote to memory of 928 916 WScript.exe 50 PID 916 wrote to memory of 928 916 WScript.exe 50 PID 916 wrote to memory of 2864 916 WScript.exe 51 PID 916 wrote to memory of 2864 916 WScript.exe 51 PID 916 wrote to memory of 2864 916 WScript.exe 51 PID 916 wrote to memory of 2864 916 WScript.exe 51 PID 916 wrote to memory of 3024 916 WScript.exe 54 PID 916 wrote to memory of 3024 916 WScript.exe 54 PID 916 wrote to memory of 3024 916 WScript.exe 54 PID 916 wrote to memory of 3024 916 WScript.exe 54 PID 916 wrote to memory of 3044 916 WScript.exe 55 PID 916 wrote to memory of 3044 916 WScript.exe 55 PID 916 wrote to memory of 3044 916 WScript.exe 55 PID 916 wrote to memory of 3044 916 WScript.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\kpwxbe.exe"C:\Users\Admin\AppData\Local\Temp\kpwxbe.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\888_RAT_1.0.9 Cracked by Shark M!nd.exe"C:\Users\Admin\AppData\Local\Temp\888_RAT_1.0.9 Cracked by Shark M!nd.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1764
-
-
C:\Users\Admin\AppData\Local\Temp\majid z hacker website.exe"C:\Users\Admin\AppData\Local\Temp\majid z hacker website.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\program startup.exe"C:\Users\Admin\AppData\Local\Temp\program startup.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1240 -
C:\Windows\SysWOW64\WSCript.exeWSCript C:\Users\Admin\AppData\Local\Temp\FPJMCI.vbs5⤵
- System Location Discovery: System Language Discovery
PID:1736
-
-
-
C:\Users\Admin\AppData\Local\Temp\microsoft corporation.exe"C:\Users\Admin\AppData\Local\Temp\microsoft corporation.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1560 -
C:\ProgramData\microsoft corporation.exe"C:\ProgramData\microsoft corporation.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2540 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\ProgramData\microsoft corporation.exe" "microsoft corporation.exe" ENABLE6⤵
- Modifies Windows Firewall
PID:2524
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\script.vbs"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\SysWOW64\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\script.vbs" /elevate5⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $true6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBehaviorMonitoring $true6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 26⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:928
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 06⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 66⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 66⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 66⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
-
-
-
-
C:\Windows\system32\shutdown.exeshutdown.exe /f /s /t 02⤵PID:1692
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5701⤵
- Suspicious use of AdjustPrivilegeToken
PID:908
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2672
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
850B
MD56cd1e52fee0feec8ac4be7a1ec19eb0a
SHA145faaeea51c1a75cdca982d4ef0b0c2c266afe26
SHA2565bee13a4b988a73518c23f9c6ff5a088e903769bac1fb5561c1e7ba0396716d5
SHA51240ef44e566f63564c0e688b791c224c789668bf2d9d29dbd54acb3a1d4a183d7ae73c4bd138aa5be9e1494af82fcf148b0ac2cc3e5a1425625ef79bade5b5a11
-
Filesize
22.0MB
MD554c6dc01ba6c748106085665ff8ad61b
SHA1f75d970df21d277d39656aeff50752d415b47c6e
SHA25627e3e3350715b83a2a3059c008517e1e97b2531557aaefd3b4cee38f62039b1c
SHA5129b5498b40de25dc788a728979518e3b6edcc1f0a0444f96bb19c68f91036b552b248d78b5f783ee5247eb7f7bb1272b4e4edf3f2c6650674c16b72593eec7f8d
-
Filesize
417KB
MD524995d61ddcd09aca3877ee88552d57c
SHA1cf3bba8be96058daff0eba22c3e17510fabd458d
SHA25634ddd8dafe9e6fabe4cac3428ce0f9b1d51183ecd3d70aa4d483086ee64a514f
SHA5123de2434f9c75634921165daec270ffc6c4d9c14ff89328213f245d1b042ed4329b1817001c3eb27cd586bd86c2513585b9b516d2322c92e7b6f74a40e3b3d7c7
-
Filesize
1KB
MD577a4da4863ffcaba51ce05d3c632158d
SHA1253f9a594a6ca3a7a23acb90f8dc81939215ba4b
SHA256ecd586281fc4655e40108fcf118beeae3411c1c1176951a763e47fb66d2e421f
SHA512ba215fa65a011f5841f5e92b4053895c13368e894817551a982ca3e821726b8bbb13616bca8781fed08f4c83528d0d3ac233fa1f3e14ad4253fdefd9a22253cf
-
Filesize
239KB
MD5bc8a6f4d28474d90a687ed00a9b5b60f
SHA1c8a4c0816e2fc3d728f1a715ac6190b66f027e3a
SHA256b78c160c882d08f98bc209dd2722b4f01290dd46a19e0be70d21473dae1c8ff2
SHA512b90c9bcbfb08b1d63cd6066869896bbb13cfef15a6f30483e31868aca5b3c29150e71984ba3d07ba91da81d47a9d2dd29917851ec5bb04f8f463df113502078f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LSW3YH8HF24M8X18Z4LC.temp
Filesize7KB
MD5254f7d968eeb3a375a9e8333ef20d535
SHA1c423904126fa35276e7d972c693210ff37a5225d
SHA25652873b9163b18915cb22532edaf2b6315ff9c760080842e471939718455ce071
SHA512c01ec01730c5e02effaca651bea274af49554b20a5754501d9e89385e99ed7e8d9a812d746901ed77809efcbc505cc1e0f37e595daa0594d98cfda982fc345a6
-
Filesize
22.0MB
MD532004e656640aad1672f0ee98434bc3c
SHA1d665b4e03e9d75f87079d65cff791147b7ee6e4f
SHA256beb837e8832f27dacfd3719cf617310f1b9e74badbfca8705ecafce3ed5e6a33
SHA5121cd55008d6352469a937f168d6d72cfd202d81c24a6be4c6256a4c73c576577aefe8da912c5cb09e12f12a58e46f99381fa9834b58bc356e0c530908b236785f
-
Filesize
33KB
MD523fb3146d1455b890afdbd9511b48351
SHA19e0118366167c76de2d88fb354606d5e58677eb7
SHA25658c8e3599d16762dfc51decf16c3d014cd8c8dd1aab59a0acff5372c5182bda7
SHA51292a816b16f854cb19a28a9bd186223dd3f7961800b6486b32be1f270b26a0240c0f68ebe0f6c555b72f0e3388f3aa1a061fad50c0b09aaec1af9de1185fc8cf4
-
Filesize
356KB
MD54caacd7358ca6be0197a8d7dd73f1347
SHA1b0a0c0f64cfb9db363e423f1f2a72312c7d551fb
SHA256ddfaaf02cbb33b9bbc9117dcdea0da555f4a6bf1d852e7e121bf9930cc2e4404
SHA51284b19e735896baa67d996e91a7144092944147eb6949d887308519699ceec481f0ed16c766103ba62e90a679c397bb0f0e0ec7f45fab554d89cc54f373fd801f
-
Filesize
3.3MB
MD5ea5d5266b8a7bcc8788c83ebb7c8c7d5
SHA13e9ac1ab7d5d54db9b3d141e82916513e572b415
SHA25691ac4d215b8d90aef9a000900c9088d4c33d58c5f35a720a385a3f2d2299e5d1
SHA512404b35fca478a1f489ec1af7be1df897190d7deb0cd8139c2c89d68c24fa377d904cf0c5e30c09ab448d74d87a47aaa3a872bf66a9bc9c124f52798320d34e60
-
Filesize
100KB
MD51b942faa8e8b1008a8c3c1004ba57349
SHA1cd99977f6c1819b12b33240b784ca816dfe2cb91
SHA256555ccb7ecd9ae52a75135fdd81ab443a49d5785b0621ed6468d28c4234e46ccc
SHA5125aee3d59478d41ddd5885c99b394c9c4983064e2b3528db1a3f7fc289662bced4f57d072517bbe7573c6d1789435e987ef1aa9cc91f372bcfd30bc016675fa43