Analysis

  • max time kernel
    7s
  • max time network
    9s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    02/03/2025, 20:57

Errors

Reason
Machine shutdown

General

  • Target

    XClient.exe

  • Size

    336KB

  • MD5

    5fcc047b04b088650ffab33ab0d3a991

  • SHA1

    310de3660d360e55e02aeabc2bb96fe1a00fbeb1

  • SHA256

    227dbbb256d5236819196deda5707bc6abd1df5ba9a483edf82443ad12f26930

  • SHA512

    5bc2803bb1fbcd18b33f7c23120fa144cb29c07376c40622f20d69386932bbf82e8160ec7ec11c781a0624a875ee198369c7b2cf8b2464986054d7c5d94c4cf4

  • SSDEEP

    6144:gv9QxBt25x/5bTgVziHzZnSKrCbYM+2ba8Mq:NxBt8/5/gVziHlBrCbYP85

Malware Config

Extracted

Family

xworm

Version

5.0

Signatures

  • Detect Xworm Payload 2 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 9 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:620
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:1056
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 1056 -s 2588
            3⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:1420
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 1056 -s 3792
            3⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:4040
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 620 -s 408
          2⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:864
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:684
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:968
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:472
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
              1⤵
              • Indicator Removal: Clear Windows Event Logs
              PID:764
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:628
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:868
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                  1⤵
                    PID:1080
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                    1⤵
                      PID:1172
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                      1⤵
                        PID:1216
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                        1⤵
                          PID:1288
                          • C:\Windows\system32\taskhostw.exe
                            taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                            2⤵
                              PID:2836
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                            1⤵
                              PID:1344
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                              1⤵
                                PID:1472
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                1⤵
                                  PID:1496
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                  1⤵
                                    PID:1504
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                    1⤵
                                      PID:1516
                                      • C:\Windows\system32\sihost.exe
                                        sihost.exe
                                        2⤵
                                          PID:2688
                                        • C:\Windows\system32\sihost.exe
                                          sihost.exe
                                          2⤵
                                            PID:1168
                                          • C:\Windows\system32\sihost.exe
                                            sihost.exe
                                            2⤵
                                              PID:1892
                                            • C:\Windows\system32\sihost.exe
                                              sihost.exe
                                              2⤵
                                                PID:3520
                                              • C:\Windows\system32\sihost.exe
                                                sihost.exe
                                                2⤵
                                                  PID:1668
                                                • C:\Windows\system32\sihost.exe
                                                  sihost.exe
                                                  2⤵
                                                    PID:3232
                                                  • C:\Windows\system32\sihost.exe
                                                    sihost.exe
                                                    2⤵
                                                      PID:3408
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                                    1⤵
                                                      PID:1592
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                      1⤵
                                                        PID:1708
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                        1⤵
                                                          PID:1748
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                          1⤵
                                                            PID:1792
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                            1⤵
                                                              PID:1916
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                              1⤵
                                                                PID:2044
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                1⤵
                                                                  PID:1152
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                  1⤵
                                                                    PID:1212
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                                    1⤵
                                                                      PID:1656
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                      1⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2072
                                                                    • C:\Windows\System32\svchost.exe
                                                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                                      1⤵
                                                                        PID:2116
                                                                      • C:\Windows\System32\spoolsv.exe
                                                                        C:\Windows\System32\spoolsv.exe
                                                                        1⤵
                                                                          PID:2264
                                                                        • C:\Windows\System32\svchost.exe
                                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                          1⤵
                                                                            PID:2412
                                                                          • C:\Windows\System32\svchost.exe
                                                                            C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                            1⤵
                                                                              PID:2420
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                              1⤵
                                                                                PID:2700
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                1⤵
                                                                                  PID:2844
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                                  1⤵
                                                                                    PID:2876
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                                    1⤵
                                                                                      PID:2884
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                                      1⤵
                                                                                      • Drops file in System32 directory
                                                                                      • Modifies data under HKEY_USERS
                                                                                      PID:3032
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                                      1⤵
                                                                                      • Enumerates connected drives
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:2272
                                                                                    • C:\Windows\sysmon.exe
                                                                                      C:\Windows\sysmon.exe
                                                                                      1⤵
                                                                                        PID:3076
                                                                                      • C:\Windows\System32\svchost.exe
                                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                        1⤵
                                                                                          PID:3104
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                          1⤵
                                                                                            PID:3124
                                                                                          • C:\Windows\system32\wbem\unsecapp.exe
                                                                                            C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                            1⤵
                                                                                              PID:3376
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                              1⤵
                                                                                                PID:3432
                                                                                              • C:\Windows\Explorer.EXE
                                                                                                C:\Windows\Explorer.EXE
                                                                                                1⤵
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:3552
                                                                                                • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                                  2⤵
                                                                                                  • Checks computer location settings
                                                                                                  • Drops startup file
                                                                                                  • Adds Run key to start application
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                  PID:4888
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\41lxku4l.lo5.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\41lxku4l.lo5.exe"
                                                                                                    3⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                    PID:4344
                                                                                                  • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                                    "SCHTASKS.exe" /create /tn "MasonXClient.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\XClient.exe'" /sc onlogon /rl HIGHEST
                                                                                                    3⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:2340
                                                                                                  • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                                    "SCHTASKS.exe" /create /tn "MasonXClient.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\XClient.exe'" /sc onlogon /rl HIGHEST
                                                                                                    3⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:4356
                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                      4⤵
                                                                                                        PID:3212
                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                                      3⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      PID:1992
                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
                                                                                                      3⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      PID:4116
                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                        4⤵
                                                                                                          PID:2056
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'
                                                                                                        3⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        PID:5032
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
                                                                                                        3⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        PID:800
                                                                                                      • C:\Windows\System32\schtasks.exe
                                                                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:236
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                    1⤵
                                                                                                      PID:3812
                                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                      1⤵
                                                                                                        PID:4052
                                                                                                      • C:\Windows\System32\RuntimeBroker.exe
                                                                                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                        1⤵
                                                                                                          PID:4132
                                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                          1⤵
                                                                                                            PID:4376
                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                            1⤵
                                                                                                              PID:2360
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                              1⤵
                                                                                                                PID:5060
                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                1⤵
                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                PID:4756
                                                                                                              • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                1⤵
                                                                                                                  PID:1192
                                                                                                                • C:\Windows\system32\SppExtComObj.exe
                                                                                                                  C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                  1⤵
                                                                                                                    PID:4968
                                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                                    C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                    1⤵
                                                                                                                      PID:1200
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                      1⤵
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      PID:3388
                                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                      1⤵
                                                                                                                        PID:3736
                                                                                                                      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                                                                        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                                                                        1⤵
                                                                                                                          PID:4464
                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                          1⤵
                                                                                                                            PID:3584
                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                                            1⤵
                                                                                                                              PID:992
                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                              C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
                                                                                                                              1⤵
                                                                                                                                PID:3740
                                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                1⤵
                                                                                                                                  PID:2464
                                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                                  C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                                  1⤵
                                                                                                                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                  PID:4640
                                                                                                                                  • C:\Windows\system32\WerFault.exe
                                                                                                                                    C:\Windows\system32\WerFault.exe -pss -s 504 -p 1056 -ip 1056
                                                                                                                                    2⤵
                                                                                                                                    • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                                                                                    PID:1840
                                                                                                                                  • C:\Windows\system32\WerFault.exe
                                                                                                                                    C:\Windows\system32\WerFault.exe -pss -s 528 -p 620 -ip 620
                                                                                                                                    2⤵
                                                                                                                                    • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                                                                                    PID:4848
                                                                                                                                  • C:\Windows\system32\WerFault.exe
                                                                                                                                    C:\Windows\system32\WerFault.exe -pss -s 620 -p 1056 -ip 1056
                                                                                                                                    2⤵
                                                                                                                                      PID:4368
                                                                                                                                    • C:\Windows\system32\WerFault.exe
                                                                                                                                      C:\Windows\system32\WerFault.exe -pss -s 532 -p 4888 -ip 4888
                                                                                                                                      2⤵
                                                                                                                                        PID:1832
                                                                                                                                    • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                                      C:\Windows\System32\WaaSMedicAgent.exe 7678d5c5ebb4a641684c421d04f452e4 iUJhg3MNo0GLiq/pW/cUGw.0.1.0.0.0
                                                                                                                                      1⤵
                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                      PID:4768
                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                        2⤵
                                                                                                                                          PID:4720
                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                                        1⤵
                                                                                                                                        • Drops file in Windows directory
                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                        PID:4460
                                                                                                                                      • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                        C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                        1⤵
                                                                                                                                        • Writes to the Master Boot Record (MBR)
                                                                                                                                        PID:2524

                                                                                                                                      Network

                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                      Replay Monitor

                                                                                                                                      Loading Replay Monitor...

                                                                                                                                      Downloads

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\WER\Temp\WER3469.tmp.csv

                                                                                                                                        Filesize

                                                                                                                                        37KB

                                                                                                                                        MD5

                                                                                                                                        b0c989bff842e6d66645ec9af86d8568

                                                                                                                                        SHA1

                                                                                                                                        6c7f62e8894c59759f6e45d5544257bbd1df3443

                                                                                                                                        SHA256

                                                                                                                                        174d252117a332fd8d9d521637d3d39bdece8c0e8ea4afc850c5140ca1d937af

                                                                                                                                        SHA512

                                                                                                                                        6bdd71d67cc074ed0b244edf9414c65a2de0526ad5cb823381e18dc7a2539948742fe2f81090f2974c35007b1007e44f4894edb11b0de9729aad66bae6fa62af

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\WER\Temp\WER3489.tmp.txt

                                                                                                                                        Filesize

                                                                                                                                        13KB

                                                                                                                                        MD5

                                                                                                                                        1dd6ce079aef2449a6841fd63440dbc4

                                                                                                                                        SHA1

                                                                                                                                        8a30e3870608ba41533128eb8d40fd0bd800ff87

                                                                                                                                        SHA256

                                                                                                                                        cbcaddfd9b1467e5d400d52a49604e1fd4c288a4b3fa49aaaafe012b0ac27213

                                                                                                                                        SHA512

                                                                                                                                        7a223421149b84d82f9e60c26c1d585a707635a462906578f0abb2f5d1835efa1acbff91d966148c70832b563bdc9531c73fdb2ee937902cf98897b71e9ca155

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\WER\Temp\WER3575.tmp.csv

                                                                                                                                        Filesize

                                                                                                                                        36KB

                                                                                                                                        MD5

                                                                                                                                        b7516b7967f51c24c486d78fe3337699

                                                                                                                                        SHA1

                                                                                                                                        eab4727942cf66f0c8e9262fa59af2394fe6b40d

                                                                                                                                        SHA256

                                                                                                                                        48b9117f4d2083851824b9086dc36e6b2ecbf30faf4063e4afcafc0a7e93a4fc

                                                                                                                                        SHA512

                                                                                                                                        b360595d17e58cf7c2ffcecafd70002a2c37c22ad61a694b0b75c7248456687f52ac889b2af55ce5dc6c19604bf372390cd593d5ead082f041df3924dd77d207

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\WER\Temp\WER35B4.tmp.txt

                                                                                                                                        Filesize

                                                                                                                                        13KB

                                                                                                                                        MD5

                                                                                                                                        b3b43cc667730d6d3b7c079d0cee4c6a

                                                                                                                                        SHA1

                                                                                                                                        53e467f9ddca1d2a60e3c5ba1420fa9b33c08775

                                                                                                                                        SHA256

                                                                                                                                        aefd7eddc68cdbc86fc4361884ce3e146f109cdb2f83bc9cfecb404b5c763e23

                                                                                                                                        SHA512

                                                                                                                                        67d96c2e343f3592c1080f9a6fb5147065c7d3f1d80c0c43acae1cbf0b954a92906b6579b8746a81d8cf6ff3798c80aa48ec8f44560cd280f18646efd6f364b1

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\WER\Temp\WER3690.tmp.csv

                                                                                                                                        Filesize

                                                                                                                                        35KB

                                                                                                                                        MD5

                                                                                                                                        4792ac2c90578290a070ac4959f21023

                                                                                                                                        SHA1

                                                                                                                                        19609fb4369a0d0ce7d709e27439fd827be5c9c4

                                                                                                                                        SHA256

                                                                                                                                        9444960d231dbaa253396130e28c78aa96340db8239dd45fab4f9b691fe7ddb8

                                                                                                                                        SHA512

                                                                                                                                        e9c4e672d48374becf7097b39179a60811b83b88bac4465d8a28c3fc578714622f9213023afeecdba93112c1050fdf7677c4988aa15e7bbd16f87628c438d16a

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\WER\Temp\WER36B0.tmp.txt

                                                                                                                                        Filesize

                                                                                                                                        13KB

                                                                                                                                        MD5

                                                                                                                                        dbf51cb1a15ad456526834fe1560cf01

                                                                                                                                        SHA1

                                                                                                                                        bc067fc6d12e153668a88b8195cb27f7dccb43ed

                                                                                                                                        SHA256

                                                                                                                                        5b6ad16622f4376ba0fa330eaa43f8db04abbbdfae9bb0216d974d834f1cf460

                                                                                                                                        SHA512

                                                                                                                                        d29df95a863ff7147de08afd3d958ab7bd6b63def68780de59b0948b4a56a74aa96777b238c02f85697cc47e8c756dacb459b017ecd6799b9cd5f5db181197eb

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\WER\Temp\WER4F2B.tmp.csv

                                                                                                                                        Filesize

                                                                                                                                        35KB

                                                                                                                                        MD5

                                                                                                                                        9eae59c40b6a4c0a3f7f4256dab1c561

                                                                                                                                        SHA1

                                                                                                                                        5789b821c2050ae25e2c398f1c16d495fc73e0b1

                                                                                                                                        SHA256

                                                                                                                                        da869c729148eae4d25ae16a7a8679c99927721fc5929bbfa55442e3e64fe268

                                                                                                                                        SHA512

                                                                                                                                        afb00cf4510aa8e5aa226a7d5dba9f237dccf6c697a505ef1e7b026d63bbdb0a9b84d9a7667ae9ccfec3efb174cf241e6b42a371da24ea71d252f022b68bfb2a

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\WER\Temp\WER4F4B.tmp.txt

                                                                                                                                        Filesize

                                                                                                                                        13KB

                                                                                                                                        MD5

                                                                                                                                        d0c28da256036c1aa9b7a93dc333001a

                                                                                                                                        SHA1

                                                                                                                                        771a4b1c49468bace979cb93566b3eb565dce989

                                                                                                                                        SHA256

                                                                                                                                        562f8debd517f05fc7914a23428ed631753697e2626a432232834b713cd4b22e

                                                                                                                                        SHA512

                                                                                                                                        1225d88ccf57822c76d0bb69c66efb97973f046fe583d07710963637f47c3f77899a9e74873cf6921d09d08e93ce508707bf8efc1039d7aa57355a09c28d9dd3

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\41lxku4l.lo5.exe

                                                                                                                                        Filesize

                                                                                                                                        161KB

                                                                                                                                        MD5

                                                                                                                                        94f1ab3a068f83b32639579ec9c5d025

                                                                                                                                        SHA1

                                                                                                                                        38f3d5bc5de46feb8de093d11329766b8e2054ae

                                                                                                                                        SHA256

                                                                                                                                        879cc20b41635709bb304e315aaa5ca4708b480a1bfc2f4935fcf2215188efb0

                                                                                                                                        SHA512

                                                                                                                                        44d5236a804d63302b21ca25ebc148a64605508d03c990a244c44ceb8630849da0510b7b2d0bee72e01ca6681e2d86d7e6aee8847674a26f0028d149b9abee0c

                                                                                                                                      • memory/620-50-0x00007FF86BBAD000-0x00007FF86BBAE000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        4KB

                                                                                                                                      • memory/620-335-0x0000021966070000-0x000002196609B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/620-18-0x0000021966070000-0x000002196609B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/620-16-0x0000021966040000-0x0000021966065000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        148KB

                                                                                                                                      • memory/620-320-0x00007FF86BBAF000-0x00007FF86BBB0000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        4KB

                                                                                                                                      • memory/620-48-0x0000021966070000-0x000002196609B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/684-63-0x000001E2E7520000-0x000001E2E754B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/684-21-0x000001E2E7520000-0x000001E2E754B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/684-65-0x00007FF86BBAD000-0x00007FF86BBAE000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        4KB

                                                                                                                                      • memory/684-23-0x00007FF82BB90000-0x00007FF82BBA0000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/1056-82-0x000001A9839F0000-0x000001A983A1B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/1056-349-0x000001A9839F0000-0x000001A983A1B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/1056-28-0x000001A9839F0000-0x000001A983A1B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/3552-86-0x00000000028D0000-0x00000000028FB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/3552-89-0x00007FF82BB90000-0x00007FF82BBA0000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/3552-72-0x00000000028D0000-0x00000000028FB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/4344-15-0x00007FF86BA10000-0x00007FF86BACD000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        756KB

                                                                                                                                      • memory/4344-14-0x00007FF86BB10000-0x00007FF86BD08000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        2.0MB

                                                                                                                                      • memory/4888-0-0x00007FF84D843000-0x00007FF84D845000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        8KB

                                                                                                                                      • memory/4888-424-0x000002B338520000-0x000002B338548000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        160KB

                                                                                                                                      • memory/4888-462-0x00007FF84D843000-0x00007FF84D845000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        8KB

                                                                                                                                      • memory/4888-483-0x00007FF86BB10000-0x00007FF86BD08000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        2.0MB

                                                                                                                                      • memory/4888-2-0x000002B31F960000-0x000002B31F98C000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        176KB

                                                                                                                                      • memory/4888-1-0x000002B31DCA0000-0x000002B31DCFA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        360KB