Analysis
-
max time kernel
45s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
02/03/2025, 21:02
Behavioral task
behavioral1
Sample
MasonClient.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
MasonClient.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral3
Sample
MasonClient.exe
Resource
win11-20250217-en
General
-
Target
MasonClient.exe
-
Size
48KB
-
MD5
8f28ca9a926d19b481928e7943818c18
-
SHA1
c39af1be425a90eb806d2874ad210266f55f297c
-
SHA256
ea0cd48a7bbf5c3df7505631380715287c22db6cdb770dc36f211bba02bae59b
-
SHA512
2acdbfe077ebc93a50836c7a719646445e48bfb893c05ccc06260bc815b91e28b0f5cd478131be2a71e330621f50d7712a3169c4234e68ebb6d7367aac9fc789
-
SSDEEP
1536:Wt1VFdabn9SaSLxeQSoY7r8WnRzWnRYWnRVWnRyWnR899LSyYaW2ta46aXHWnRo5:m1DD3A5b3hbO1
Malware Config
Extracted
xworm
-
Install_directory
%port%
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/6EU9ps8S
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral3/memory/4800-1-0x00000000004C0000-0x00000000004D2000-memory.dmp family_xworm behavioral3/memory/4800-4-0x000000001C660000-0x000000001C672000-memory.dmp family_xworm behavioral3/files/0x001b00000002aecf-6.dat family_xworm -
Xworm family
-
Executes dropped EXE 1 IoCs
pid Process 2320 MasonClient.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000\Software\Microsoft\Windows\CurrentVersion\Run\MasonClient = "C:\\Users\\Admin\\AppData\\Roaming\\MasonClient.exe" MasonClient.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 5 raw.githubusercontent.com 1 pastebin.com 2 pastebin.com 3 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.3gp2\ShellEx reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.3mf reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.appcontent-ms\shellex\{e357fccd-a995-4576-b01f-234630154e96} reg.exe Key deleted \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\.3g2\OpenWithProgids reg.exe Key deleted \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\.amr reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.asf\PersistentHandler reg.exe Key deleted \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\.c5e2524a-ea46-4f67-841f-6a9465d9d515\OpenWithProgids reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\*\OpenWithList\IExplore.exe reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.3mf\shellex\{8895b1c6-b41f-4c1c-a562-0d564250836f} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.3mf\shellex reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.com\PersistentHandler reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.contact\ShellNew reg.exe Key deleted \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\.aac\OpenWithProgids reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.avif reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.bin\PersistentHandler reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.bin reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\UpdateEncryptionSettingsWork\Shell\Decrypt reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.ai reg.exe Key deleted \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\.arw reg.exe Key deleted \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\.asf\OpenWithProgids reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.bsc\PersistentHandler reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.cap reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.cda\OpenWithProgIds reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.3g2\ShellEx\{BB2E617C-0920-11D1-9A0B-00C04FC2D6C1} reg.exe Key deleted \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\.aac reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.asc reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.asm\PersistentHandler reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.asp\PersistentHandler reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.bcp\PersistentHandler reg.exe Key deleted \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\.3g2 reg.exe Key deleted \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\.3gp\OpenWithProgids reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.ari\ShellEx\{e357fccd-a995-4576-b01f-234630154e96} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.bay reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\UpdateEncryptionSettingsWork\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\.appinstaller\OpenWithProgids reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.3fr\ShellEx\{e357fccd-a995-4576-b01f-234630154e96} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\{a2a9545d-a0c2-42b4-9708-a0b2badd77c8} reg.exe Key deleted \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\.3gp2\OpenWithProgids reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.3fr reg.exe Key deleted \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\.c5e2524a-ea46-4f67-841f-6a9465d9d515 reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449} reg.exe Key deleted \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\.3gp reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.acrobatsecuritysettings\OpenWithProgids reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.ascx reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.avi\ShellEx\{BB2E617C-0920-11D1-9A0B-00C04FC2D6C1} reg.exe Key deleted \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\.avif\OpenWithProgids reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.cab reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.386 reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.acrobatsecuritysettings\OpenWithList\Acrobat.exe reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.ans reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.camp reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.3g2\ShellEx\{e357fccd-a995-4576-b01f-234630154e96} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.3gp2\OpenWithProgIds reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.ari reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\Open With reg.exe Key deleted \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\.arw\OpenWithProgids reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.arw\ShellEx\{e357fccd-a995-4576-b01f-234630154e96} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.acrobatsecuritysettings reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.au reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.contact reg.exe Key deleted \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\.cr2\OpenWithProgids reg.exe Key deleted \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\.3gpp\OpenWithProgids reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.3gpp\ShellEx\{e357fccd-a995-4576-b01f-234630154e96} reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2196 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4800 MasonClient.exe Token: SeDebugPrivilege 2320 MasonClient.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4800 wrote to memory of 2196 4800 MasonClient.exe 78 PID 4800 wrote to memory of 2196 4800 MasonClient.exe 78 PID 4800 wrote to memory of 4024 4800 MasonClient.exe 82 PID 4800 wrote to memory of 4024 4800 MasonClient.exe 82 PID 4024 wrote to memory of 2408 4024 cmd.exe 84 PID 4024 wrote to memory of 2408 4024 cmd.exe 84 PID 4800 wrote to memory of 1896 4800 MasonClient.exe 85 PID 4800 wrote to memory of 1896 4800 MasonClient.exe 85 PID 1896 wrote to memory of 2852 1896 cmd.exe 87 PID 1896 wrote to memory of 2852 1896 cmd.exe 87 PID 4800 wrote to memory of 992 4800 MasonClient.exe 88 PID 4800 wrote to memory of 992 4800 MasonClient.exe 88 PID 4800 wrote to memory of 3984 4800 MasonClient.exe 90 PID 4800 wrote to memory of 3984 4800 MasonClient.exe 90 PID 992 wrote to memory of 4324 992 cmd.exe 92 PID 992 wrote to memory of 4324 992 cmd.exe 92 PID 4800 wrote to memory of 5044 4800 MasonClient.exe 93 PID 4800 wrote to memory of 5044 4800 MasonClient.exe 93 PID 3984 wrote to memory of 5096 3984 cmd.exe 95 PID 3984 wrote to memory of 5096 3984 cmd.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\MasonClient.exe"C:\Users\Admin\AppData\Local\Temp\MasonClient.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "MasonClient" /tr "C:\Users\Admin\AppData\Roaming\MasonClient.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2196
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\system32\reg.exereg delete HKCR /f3⤵
- Modifies registry class
PID:2408
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\system32\reg.exereg delete HKCR /f3⤵
- Modifies registry class
PID:2852
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\system32\reg.exereg delete HKCR /f3⤵
- Modifies registry class
PID:4324
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:5096
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:5044
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:5012
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:4772
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:4508
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:1996
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:3368
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:2840
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:2784
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:4616
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:4700
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:556
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:1908
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:3956
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:4748
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:1040
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:4656
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:1116
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:3212
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:1384
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:2212
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:3324
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:2624
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:3036
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:2668
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:864
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:4860
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:4688
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:3716
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:844
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:2100
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:2380
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:5028
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:4992
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:3148
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:4660
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:1056
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:404
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:4844
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:2032
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:792
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:1248
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:3628
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:3172
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:4968
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:772
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:5184
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:3364
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:5176
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:780
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:5280
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:5192
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:5396
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:5300
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:5604
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:5364
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:5500
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:5444
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:5756
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:5528
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:5848
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:5620
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:5696
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:5684
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:5968
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:5780
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:6088
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:5840
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:3864
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:5912
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:4372
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:5984
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:5372
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:6056
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:5124
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:1992
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:3440
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:4012
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:3208
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:2976
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:5996
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:3196
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:5940
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:2336
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:1508
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:2036
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:3156
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:5548
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:3360
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:4804
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:1256
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:6040
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:2612
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:4308
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:236
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:3736
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:5172
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:4740
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:5876
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:8
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:1820
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:5152
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:6268
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:3108
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:6388
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:5724
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:6480
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:4988
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:6536
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:3016
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:6620
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:6196
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:6636
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:6260
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:6692
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:6356
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:6776
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:6408
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:6704
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:6516
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:6952
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:6572
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:6800
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCR /f2⤵PID:6684
-
C:\Windows\system32\reg.exereg delete HKCR /f3⤵PID:7136
-
-
-
C:\Users\Admin\AppData\Roaming\MasonClient.exeC:\Users\Admin\AppData\Roaming\MasonClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
C:\Users\Admin\AppData\Roaming\MasonClient.exeC:\Users\Admin\AppData\Roaming\MasonClient.exe1⤵PID:6036
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52cbbb74b7da1f720b48ed31085cbd5b8
SHA179caa9a3ea8abe1b9c4326c3633da64a5f724964
SHA256e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3
SHA512ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9
-
Filesize
48KB
MD58f28ca9a926d19b481928e7943818c18
SHA1c39af1be425a90eb806d2874ad210266f55f297c
SHA256ea0cd48a7bbf5c3df7505631380715287c22db6cdb770dc36f211bba02bae59b
SHA5122acdbfe077ebc93a50836c7a719646445e48bfb893c05ccc06260bc815b91e28b0f5cd478131be2a71e330621f50d7712a3169c4234e68ebb6d7367aac9fc789