Analysis
-
max time kernel
6s -
max time network
20s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 20:57
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral3
Sample
XClient.exe
Resource
win11-20250217-en
Errors
General
-
Target
XClient.exe
-
Size
336KB
-
MD5
5fcc047b04b088650ffab33ab0d3a991
-
SHA1
310de3660d360e55e02aeabc2bb96fe1a00fbeb1
-
SHA256
227dbbb256d5236819196deda5707bc6abd1df5ba9a483edf82443ad12f26930
-
SHA512
5bc2803bb1fbcd18b33f7c23120fa144cb29c07376c40622f20d69386932bbf82e8160ec7ec11c781a0624a875ee198369c7b2cf8b2464986054d7c5d94c4cf4
-
SSDEEP
6144:gv9QxBt25x/5bTgVziHzZnSKrCbYM+2ba8Mq:NxBt8/5/gVziHlBrCbYP85
Malware Config
Extracted
xworm
5.0
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/4228-1-0x0000025127900000-0x000002512795A000-memory.dmp family_xworm behavioral1/memory/4228-333-0x0000025142070000-0x0000025142098000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3532 powershell.exe 5024 powershell.exe 4000 powershell.exe 1620 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation XClient.exe -
Executes dropped EXE 1 IoCs
pid Process 3976 gfwkwksb.psl.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-WindowsUpdateClient%4Operational.evtx svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 24 pastebin.com 25 pastebin.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe File opened for modification C:\Windows\System32\Tasks\MasonXClient.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe -
Modifies data under HKEY_USERS 62 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ExtendedProperties\LID = "001800127D1B497B" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System RuntimeBroker.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1696 SCHTASKS.exe 2936 SCHTASKS.exe 5112 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 2876 WerFault.exe 2876 WerFault.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 448 svchost.exe 448 svchost.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe 3976 gfwkwksb.psl.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4228 XClient.exe Token: SeDebugPrivilege 3976 gfwkwksb.psl.exe Token: SeShutdownPrivilege 3464 Explorer.EXE Token: SeCreatePagefilePrivilege 3464 Explorer.EXE Token: SeShutdownPrivilege 3464 Explorer.EXE Token: SeCreatePagefilePrivilege 3464 Explorer.EXE Token: SeCreateGlobalPrivilege 2840 dwm.exe Token: SeChangeNotifyPrivilege 2840 dwm.exe Token: 33 2840 dwm.exe Token: SeIncBasePriorityPrivilege 2840 dwm.exe Token: SeShutdownPrivilege 3464 Explorer.EXE Token: SeCreatePagefilePrivilege 3464 Explorer.EXE Token: SeDebugPrivilege 3532 powershell.exe Token: SeShutdownPrivilege 3464 Explorer.EXE Token: SeCreatePagefilePrivilege 3464 Explorer.EXE Token: SeShutdownPrivilege 3308 svchost.exe Token: SeCreatePagefilePrivilege 3308 svchost.exe Token: SeShutdownPrivilege 3308 svchost.exe Token: SeCreatePagefilePrivilege 3308 svchost.exe Token: SeShutdownPrivilege 3308 svchost.exe Token: SeCreatePagefilePrivilege 3308 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1740 svchost.exe Token: SeIncreaseQuotaPrivilege 1740 svchost.exe Token: SeSecurityPrivilege 1740 svchost.exe Token: SeTakeOwnershipPrivilege 1740 svchost.exe Token: SeLoadDriverPrivilege 1740 svchost.exe Token: SeBackupPrivilege 1740 svchost.exe Token: SeRestorePrivilege 1740 svchost.exe Token: SeShutdownPrivilege 1740 svchost.exe Token: SeSystemEnvironmentPrivilege 1740 svchost.exe Token: SeManageVolumePrivilege 1740 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1740 svchost.exe Token: SeIncreaseQuotaPrivilege 1740 svchost.exe Token: SeSecurityPrivilege 1740 svchost.exe Token: SeTakeOwnershipPrivilege 1740 svchost.exe Token: SeLoadDriverPrivilege 1740 svchost.exe Token: SeSystemtimePrivilege 1740 svchost.exe Token: SeBackupPrivilege 1740 svchost.exe Token: SeRestorePrivilege 1740 svchost.exe Token: SeShutdownPrivilege 1740 svchost.exe Token: SeSystemEnvironmentPrivilege 1740 svchost.exe Token: SeUndockPrivilege 1740 svchost.exe Token: SeManageVolumePrivilege 1740 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1740 svchost.exe Token: SeIncreaseQuotaPrivilege 1740 svchost.exe Token: SeSecurityPrivilege 1740 svchost.exe Token: SeTakeOwnershipPrivilege 1740 svchost.exe Token: SeLoadDriverPrivilege 1740 svchost.exe Token: SeSystemtimePrivilege 1740 svchost.exe Token: SeBackupPrivilege 1740 svchost.exe Token: SeRestorePrivilege 1740 svchost.exe Token: SeShutdownPrivilege 1740 svchost.exe Token: SeSystemEnvironmentPrivilege 1740 svchost.exe Token: SeUndockPrivilege 1740 svchost.exe Token: SeManageVolumePrivilege 1740 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1740 svchost.exe Token: SeIncreaseQuotaPrivilege 1740 svchost.exe Token: SeSecurityPrivilege 1740 svchost.exe Token: SeTakeOwnershipPrivilege 1740 svchost.exe Token: SeLoadDriverPrivilege 1740 svchost.exe Token: SeSystemtimePrivilege 1740 svchost.exe Token: SeBackupPrivilege 1740 svchost.exe Token: SeRestorePrivilege 1740 svchost.exe Token: SeShutdownPrivilege 1740 svchost.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
pid Process 3464 Explorer.EXE 3464 Explorer.EXE 3464 Explorer.EXE 3464 Explorer.EXE 3464 Explorer.EXE 3464 Explorer.EXE 3464 Explorer.EXE 3464 Explorer.EXE 3464 Explorer.EXE 3464 Explorer.EXE 3464 Explorer.EXE 3464 Explorer.EXE 3464 Explorer.EXE 3464 Explorer.EXE 3464 Explorer.EXE 3464 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3464 Explorer.EXE 3464 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4552 Conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4228 wrote to memory of 3976 4228 XClient.exe 85 PID 4228 wrote to memory of 3976 4228 XClient.exe 85 PID 4228 wrote to memory of 1696 4228 XClient.exe 86 PID 4228 wrote to memory of 1696 4228 XClient.exe 86 PID 3976 wrote to memory of 628 3976 gfwkwksb.psl.exe 5 PID 3976 wrote to memory of 696 3976 gfwkwksb.psl.exe 7 PID 3976 wrote to memory of 976 3976 gfwkwksb.psl.exe 12 PID 3976 wrote to memory of 376 3976 gfwkwksb.psl.exe 13 PID 696 wrote to memory of 2768 696 lsass.exe 48 PID 3976 wrote to memory of 528 3976 gfwkwksb.psl.exe 14 PID 696 wrote to memory of 2768 696 lsass.exe 48 PID 3976 wrote to memory of 1012 3976 gfwkwksb.psl.exe 16 PID 3976 wrote to memory of 1120 3976 gfwkwksb.psl.exe 17 PID 3976 wrote to memory of 1128 3976 gfwkwksb.psl.exe 18 PID 3976 wrote to memory of 1136 3976 gfwkwksb.psl.exe 19 PID 3976 wrote to memory of 1144 3976 gfwkwksb.psl.exe 20 PID 696 wrote to memory of 2768 696 lsass.exe 48 PID 3976 wrote to memory of 1224 3976 gfwkwksb.psl.exe 21 PID 3976 wrote to memory of 1304 3976 gfwkwksb.psl.exe 22 PID 3976 wrote to memory of 1328 3976 gfwkwksb.psl.exe 23 PID 3976 wrote to memory of 1432 3976 gfwkwksb.psl.exe 24 PID 3976 wrote to memory of 1440 3976 gfwkwksb.psl.exe 25 PID 3976 wrote to memory of 1572 3976 gfwkwksb.psl.exe 26 PID 3976 wrote to memory of 1580 3976 gfwkwksb.psl.exe 27 PID 3976 wrote to memory of 1640 3976 gfwkwksb.psl.exe 28 PID 3976 wrote to memory of 1708 3976 gfwkwksb.psl.exe 29 PID 3976 wrote to memory of 1744 3976 gfwkwksb.psl.exe 30 PID 3976 wrote to memory of 1756 3976 gfwkwksb.psl.exe 31 PID 3976 wrote to memory of 1832 3976 gfwkwksb.psl.exe 32 PID 3976 wrote to memory of 1964 3976 gfwkwksb.psl.exe 33 PID 3976 wrote to memory of 1972 3976 gfwkwksb.psl.exe 34 PID 3976 wrote to memory of 1996 3976 gfwkwksb.psl.exe 35 PID 3976 wrote to memory of 64 3976 gfwkwksb.psl.exe 36 PID 3976 wrote to memory of 1740 3976 gfwkwksb.psl.exe 37 PID 3976 wrote to memory of 2076 3976 gfwkwksb.psl.exe 38 PID 3976 wrote to memory of 2228 3976 gfwkwksb.psl.exe 40 PID 3976 wrote to memory of 2292 3976 gfwkwksb.psl.exe 41 PID 3976 wrote to memory of 2452 3976 gfwkwksb.psl.exe 42 PID 3976 wrote to memory of 2472 3976 gfwkwksb.psl.exe 43 PID 3976 wrote to memory of 2552 3976 gfwkwksb.psl.exe 44 PID 3976 wrote to memory of 2600 3976 gfwkwksb.psl.exe 45 PID 3976 wrote to memory of 2712 3976 gfwkwksb.psl.exe 46 PID 3976 wrote to memory of 2736 3976 gfwkwksb.psl.exe 47 PID 3976 wrote to memory of 2768 3976 gfwkwksb.psl.exe 48 PID 3976 wrote to memory of 2776 3976 gfwkwksb.psl.exe 49 PID 3976 wrote to memory of 2788 3976 gfwkwksb.psl.exe 50 PID 3976 wrote to memory of 2800 3976 gfwkwksb.psl.exe 51 PID 3976 wrote to memory of 2880 3976 gfwkwksb.psl.exe 52 PID 3976 wrote to memory of 3084 3976 gfwkwksb.psl.exe 53 PID 3976 wrote to memory of 3464 3976 gfwkwksb.psl.exe 55 PID 3976 wrote to memory of 3476 3976 gfwkwksb.psl.exe 56 PID 3976 wrote to memory of 3672 3976 gfwkwksb.psl.exe 57 PID 3976 wrote to memory of 3840 3976 gfwkwksb.psl.exe 58 PID 3976 wrote to memory of 4056 3976 gfwkwksb.psl.exe 60 PID 3976 wrote to memory of 4156 3976 gfwkwksb.psl.exe 62 PID 3976 wrote to memory of 5012 3976 gfwkwksb.psl.exe 64 PID 3976 wrote to memory of 4784 3976 gfwkwksb.psl.exe 66 PID 3976 wrote to memory of 720 3976 gfwkwksb.psl.exe 67 PID 3976 wrote to memory of 3832 3976 gfwkwksb.psl.exe 68 PID 3976 wrote to memory of 4896 3976 gfwkwksb.psl.exe 70 PID 3976 wrote to memory of 3320 3976 gfwkwksb.psl.exe 71 PID 3976 wrote to memory of 4920 3976 gfwkwksb.psl.exe 72 PID 3976 wrote to memory of 1072 3976 gfwkwksb.psl.exe 73 PID 3976 wrote to memory of 3196 3976 gfwkwksb.psl.exe 74 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:628
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:376
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 376 -s 35643⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2876
-
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:696
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:976
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:528
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1012
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
PID:1120 -
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2776
-
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵PID:4128
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:1128
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1136
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1224
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1432
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2552
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1440
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1572
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1580
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1708
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1744
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1756
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1832
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1964
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1996
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:64
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2076
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2228
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2292
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2452
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2600
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
PID:2712
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2736
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2768
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2788
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2800
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2880
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3084
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"2⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\gfwkwksb.psl.exe"C:\Users\Admin\AppData\Local\Temp\gfwkwksb.psl.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3976
-
-
C:\Windows\SYSTEM32\SCHTASKS.exe"SCHTASKS.exe" /create /tn "MasonXClient.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\XClient.exe'" /sc onlogon /rl HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1696 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:5028
-
-
-
C:\Windows\SYSTEM32\SCHTASKS.exe"SCHTASKS.exe" /create /tn "MasonXClient.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\XClient.exe'" /sc onlogon /rl HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2936 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3772
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3532 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4928
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:5024 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Suspicious use of SetWindowsHookEx
PID:4552
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:4000
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:1620
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:5112
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3672
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3840
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4056
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4156
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:5012
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4784
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:720
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:3832
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:3320
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:4920
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:1072
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4800
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4004
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious behavior: EnumeratesProcesses
PID:448
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
PID:564
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 524ed5dbf78ebe21c90dab37103d9b04 oXcEQ6No3kWufrgGh5YzPQ.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
PID:4664 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1252
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5072546f850bf275f3a2a3db79969cf7a
SHA103e289735c912ca83cf4d9dd348d4fc2b6e08e1f
SHA2562f787a931c981c322fd832d8c4bb9c9bcd4cbd6221ae7de9606a4262e18640e7
SHA512b3e803956022505b9e90bb660f89f7013441f4ad4619046edc9596cbed5f523c266698bc8d04fe0b7e79fe889ae6d65cbc3d7d3a5c08f96e63c36f10b06a7568
-
Filesize
13KB
MD5f7dd4fbe4bb739b939283dcc13a9d853
SHA137e397b00d04e6eca951cecd15e10bef76001fe4
SHA256ec94626174255c1a651c71ff9abdb1734e5eb07357176cb05b0ccd971ad924d7
SHA51227d15d587a85f796eaca3a2b7102e0ac82db1a968a17a6a29afa19a903d6e81a852eb08eb226fe2cedaae77ef824406ce3c6778ffa1d29080898ab73e94bfcef
-
Filesize
40KB
MD5211dad3389a8a7f114dac791dd949ea5
SHA11806fc2df92e27cf1fb16e0dcbf99b017e4316e9
SHA256ce881647b63348925d0b53f27a653e3f2b571b1e17868e4bfac44e4e9eff0d75
SHA5127bff1e93f29ec2322312af5ad4fad7a60ed7215fd9c4ee38660b2c5c0167ac21085b1de0d6c491c104c993d92a3f1e3a149f4221ebfafcd2c9b01a74f787c1de
-
Filesize
13KB
MD5dc33f08c54302941db5e2dc37c096ba7
SHA1bd84cb10a6ce43d48f6bf444e00e3c9f9dff7906
SHA256e417494f679835b8c3310aced9eb2dc7f853db80ca01a7c71cc289b3579b96e6
SHA512de9cd202fa0652d2d68d5002109900c60e3f08af2196d13a352c9f90bd3f6835a2be94ccd571c6275ef70d77fccd6e06d99299beef359fde6c11dea1abae9cb8
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD501fff31a70e26012f37789b179059e32
SHA1555b6f05cce7daf46920df1c01eb5c55dc62c9e6
SHA256adf65afaf1c83572f05a99bf2ede8eb7be1aab0717d5254f501d5e09ba6f587b
SHA512ac310c9bc5c1effc45e1e425972b09d1f961af216b50e1a504caa046b7f1a5f3179760e0b29591d83756ecb686d17a24770cf06fcea57e6f287ca5bbf6b6971b
-
Filesize
944B
MD5d8cb3e9459807e35f02130fad3f9860d
SHA15af7f32cb8a30e850892b15e9164030a041f4bd6
SHA2562b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68
SHA512045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
161KB
MD594f1ab3a068f83b32639579ec9c5d025
SHA138f3d5bc5de46feb8de093d11329766b8e2054ae
SHA256879cc20b41635709bb304e315aaa5ca4708b480a1bfc2f4935fcf2215188efb0
SHA51244d5236a804d63302b21ca25ebc148a64605508d03c990a244c44ceb8630849da0510b7b2d0bee72e01ca6681e2d86d7e6aee8847674a26f0028d149b9abee0c