Analysis
-
max time kernel
62s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 02:42
Behavioral task
behavioral1
Sample
9d08e5e62b409ef1ccd05c7996eb5432e4a36f55642cb7441d153909e823f144.exe
Resource
win7-20240903-en
Errors
General
-
Target
9d08e5e62b409ef1ccd05c7996eb5432e4a36f55642cb7441d153909e823f144.exe
-
Size
231KB
-
MD5
265b52aa4d100784d7cd39258d5e4d21
-
SHA1
5b708da62d55364477ffb77e7feb4193f4635f92
-
SHA256
9d08e5e62b409ef1ccd05c7996eb5432e4a36f55642cb7441d153909e823f144
-
SHA512
4ce9e2c41b65ce3c108765dcd934e0f2a12f6c9640cb2ae547997b26a66da1d515ea7bfeb9cc529a57fbd41f51d61068ca7b9f551119e1403ff0cf1b5684e661
-
SSDEEP
3072:AvNYkHFE9jZOjT4LD8KbgVtn8Mo8G1gVziHzZbIK1YKB/pCAcNqXhwBV3yxSQigS:srE9Z/5bTgVziHzZnSKrCbYMJZbe8tq
Malware Config
Extracted
xworm
5.0
217.136.29.82:50007
-
install_file
Mason.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/3584-1-0x0000022547980000-0x00000225479C0000-memory.dmp family_xworm behavioral2/memory/3584-344-0x0000022562040000-0x000002256204E000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3888 created 664 3888 svchost.exe 7 -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation 9d08e5e62b409ef1ccd05c7996eb5432e4a36f55642cb7441d153909e823f144.exe -
Executes dropped EXE 1 IoCs
pid Process 4872 g2onoebe.tqz.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotification.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotification.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ExtendedProperties\LID = "001840129631C35A" svchost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3756 SCHTASKS.exe 2820 SCHTASKS.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 5116 WerFault.exe 5116 WerFault.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 3888 svchost.exe 3888 svchost.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 2748 wlrmdr.exe 2748 wlrmdr.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe 4872 g2onoebe.tqz.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3584 9d08e5e62b409ef1ccd05c7996eb5432e4a36f55642cb7441d153909e823f144.exe Token: SeDebugPrivilege 4872 g2onoebe.tqz.exe Token: SeShutdownPrivilege 3124 MusNotification.exe Token: SeCreatePagefilePrivilege 3124 MusNotification.exe Token: SeShutdownPrivilege 3372 Explorer.EXE Token: SeCreatePagefilePrivilege 3372 Explorer.EXE Token: SeShutdownPrivilege 3372 Explorer.EXE Token: SeCreatePagefilePrivilege 3372 Explorer.EXE Token: SeShutdownPrivilege 3372 Explorer.EXE Token: SeCreatePagefilePrivilege 3372 Explorer.EXE Token: SeAssignPrimaryTokenPrivilege 2292 svchost.exe Token: SeIncreaseQuotaPrivilege 2292 svchost.exe Token: SeSecurityPrivilege 2292 svchost.exe Token: SeTakeOwnershipPrivilege 2292 svchost.exe Token: SeLoadDriverPrivilege 2292 svchost.exe Token: SeSystemtimePrivilege 2292 svchost.exe Token: SeBackupPrivilege 2292 svchost.exe Token: SeRestorePrivilege 2292 svchost.exe Token: SeShutdownPrivilege 2292 svchost.exe Token: SeSystemEnvironmentPrivilege 2292 svchost.exe Token: SeUndockPrivilege 2292 svchost.exe Token: SeManageVolumePrivilege 2292 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2292 svchost.exe Token: SeIncreaseQuotaPrivilege 2292 svchost.exe Token: SeSecurityPrivilege 2292 svchost.exe Token: SeTakeOwnershipPrivilege 2292 svchost.exe Token: SeLoadDriverPrivilege 2292 svchost.exe Token: SeSystemtimePrivilege 2292 svchost.exe Token: SeBackupPrivilege 2292 svchost.exe Token: SeRestorePrivilege 2292 svchost.exe Token: SeShutdownPrivilege 2292 svchost.exe Token: SeSystemEnvironmentPrivilege 2292 svchost.exe Token: SeUndockPrivilege 2292 svchost.exe Token: SeManageVolumePrivilege 2292 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2292 svchost.exe Token: SeIncreaseQuotaPrivilege 2292 svchost.exe Token: SeSecurityPrivilege 2292 svchost.exe Token: SeTakeOwnershipPrivilege 2292 svchost.exe Token: SeLoadDriverPrivilege 2292 svchost.exe Token: SeSystemtimePrivilege 2292 svchost.exe Token: SeBackupPrivilege 2292 svchost.exe Token: SeRestorePrivilege 2292 svchost.exe Token: SeShutdownPrivilege 2292 svchost.exe Token: SeSystemEnvironmentPrivilege 2292 svchost.exe Token: SeUndockPrivilege 2292 svchost.exe Token: SeManageVolumePrivilege 2292 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2292 svchost.exe Token: SeIncreaseQuotaPrivilege 2292 svchost.exe Token: SeSecurityPrivilege 2292 svchost.exe Token: SeTakeOwnershipPrivilege 2292 svchost.exe Token: SeLoadDriverPrivilege 2292 svchost.exe Token: SeSystemtimePrivilege 2292 svchost.exe Token: SeBackupPrivilege 2292 svchost.exe Token: SeRestorePrivilege 2292 svchost.exe Token: SeShutdownPrivilege 2292 svchost.exe Token: SeSystemEnvironmentPrivilege 2292 svchost.exe Token: SeUndockPrivilege 2292 svchost.exe Token: SeManageVolumePrivilege 2292 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2292 svchost.exe Token: SeIncreaseQuotaPrivilege 2292 svchost.exe Token: SeSecurityPrivilege 2292 svchost.exe Token: SeTakeOwnershipPrivilege 2292 svchost.exe Token: SeLoadDriverPrivilege 2292 svchost.exe Token: SeSystemtimePrivilege 2292 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2748 wlrmdr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3584 wrote to memory of 4872 3584 9d08e5e62b409ef1ccd05c7996eb5432e4a36f55642cb7441d153909e823f144.exe 86 PID 3584 wrote to memory of 4872 3584 9d08e5e62b409ef1ccd05c7996eb5432e4a36f55642cb7441d153909e823f144.exe 86 PID 3584 wrote to memory of 3756 3584 9d08e5e62b409ef1ccd05c7996eb5432e4a36f55642cb7441d153909e823f144.exe 87 PID 3584 wrote to memory of 3756 3584 9d08e5e62b409ef1ccd05c7996eb5432e4a36f55642cb7441d153909e823f144.exe 87 PID 4872 wrote to memory of 616 4872 g2onoebe.tqz.exe 5 PID 4872 wrote to memory of 664 4872 g2onoebe.tqz.exe 7 PID 4872 wrote to memory of 960 4872 g2onoebe.tqz.exe 12 PID 4872 wrote to memory of 336 4872 g2onoebe.tqz.exe 13 PID 4872 wrote to memory of 740 4872 g2onoebe.tqz.exe 14 PID 4872 wrote to memory of 1020 4872 g2onoebe.tqz.exe 15 PID 4872 wrote to memory of 1128 4872 g2onoebe.tqz.exe 17 PID 4872 wrote to memory of 1136 4872 g2onoebe.tqz.exe 18 PID 4872 wrote to memory of 1144 4872 g2onoebe.tqz.exe 19 PID 4872 wrote to memory of 1212 4872 g2onoebe.tqz.exe 20 PID 4872 wrote to memory of 1224 4872 g2onoebe.tqz.exe 21 PID 4872 wrote to memory of 1252 4872 g2onoebe.tqz.exe 22 PID 4872 wrote to memory of 1304 4872 g2onoebe.tqz.exe 23 PID 4872 wrote to memory of 1392 4872 g2onoebe.tqz.exe 24 PID 4872 wrote to memory of 1444 4872 g2onoebe.tqz.exe 25 PID 4872 wrote to memory of 1548 4872 g2onoebe.tqz.exe 26 PID 4872 wrote to memory of 1556 4872 g2onoebe.tqz.exe 27 PID 4872 wrote to memory of 1660 4872 g2onoebe.tqz.exe 28 PID 4872 wrote to memory of 1672 4872 g2onoebe.tqz.exe 29 PID 4872 wrote to memory of 1716 4872 g2onoebe.tqz.exe 30 PID 4872 wrote to memory of 1752 4872 g2onoebe.tqz.exe 31 PID 4872 wrote to memory of 1800 4872 g2onoebe.tqz.exe 32 PID 4872 wrote to memory of 1868 4872 g2onoebe.tqz.exe 33 PID 4872 wrote to memory of 1880 4872 g2onoebe.tqz.exe 34 PID 4872 wrote to memory of 1948 4872 g2onoebe.tqz.exe 35 PID 4872 wrote to memory of 1964 4872 g2onoebe.tqz.exe 36 PID 4872 wrote to memory of 1012 4872 g2onoebe.tqz.exe 37 PID 4872 wrote to memory of 2088 4872 g2onoebe.tqz.exe 39 PID 4872 wrote to memory of 2248 4872 g2onoebe.tqz.exe 40 PID 4872 wrote to memory of 2292 4872 g2onoebe.tqz.exe 41 PID 4872 wrote to memory of 2388 4872 g2onoebe.tqz.exe 42 PID 4872 wrote to memory of 2396 4872 g2onoebe.tqz.exe 43 PID 4872 wrote to memory of 2464 4872 g2onoebe.tqz.exe 44 PID 4872 wrote to memory of 2504 4872 g2onoebe.tqz.exe 45 PID 4872 wrote to memory of 2556 4872 g2onoebe.tqz.exe 46 PID 4872 wrote to memory of 2572 4872 g2onoebe.tqz.exe 47 PID 4872 wrote to memory of 2580 4872 g2onoebe.tqz.exe 48 PID 4872 wrote to memory of 2928 4872 g2onoebe.tqz.exe 49 PID 4872 wrote to memory of 2940 4872 g2onoebe.tqz.exe 50 PID 4872 wrote to memory of 2952 4872 g2onoebe.tqz.exe 51 PID 4872 wrote to memory of 2548 4872 g2onoebe.tqz.exe 53 PID 4872 wrote to memory of 2596 4872 g2onoebe.tqz.exe 54 PID 4872 wrote to memory of 3292 4872 g2onoebe.tqz.exe 55 PID 4872 wrote to memory of 3372 4872 g2onoebe.tqz.exe 56 PID 4872 wrote to memory of 3556 4872 g2onoebe.tqz.exe 57 PID 4872 wrote to memory of 3736 4872 g2onoebe.tqz.exe 58 PID 4872 wrote to memory of 3904 4872 g2onoebe.tqz.exe 60 PID 4872 wrote to memory of 4172 4872 g2onoebe.tqz.exe 62 PID 4872 wrote to memory of 5112 4872 g2onoebe.tqz.exe 65 PID 4872 wrote to memory of 1032 4872 g2onoebe.tqz.exe 67 PID 4872 wrote to memory of 2124 4872 g2onoebe.tqz.exe 68 PID 4872 wrote to memory of 4664 4872 g2onoebe.tqz.exe 69 PID 4872 wrote to memory of 2600 4872 g2onoebe.tqz.exe 70 PID 4872 wrote to memory of 3344 4872 g2onoebe.tqz.exe 71 PID 4872 wrote to memory of 4964 4872 g2onoebe.tqz.exe 72 PID 4872 wrote to memory of 972 4872 g2onoebe.tqz.exe 73 PID 4872 wrote to memory of 4208 4872 g2onoebe.tqz.exe 74 PID 4872 wrote to memory of 2068 4872 g2onoebe.tqz.exe 76 PID 4872 wrote to memory of 1972 4872 g2onoebe.tqz.exe 77 PID 4872 wrote to memory of 4636 4872 g2onoebe.tqz.exe 78 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:336
-
-
C:\Windows\system32\wlrmdr.exe-s -1 -f 2 -t Your PC will automatically restart in one minute -m Windows ran into a problem and needs to restart. You should close this message now and save your work. -a 32⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:664
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 664 -s 42202⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:740
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1020
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1128
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2548
-
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3124
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1136
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1224
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1252
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1392
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2928
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1548
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1556
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1672
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1716
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1752
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1800
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1868
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1880
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1964
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1012
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2088
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2248
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
PID:2464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2504
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2556
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2572
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2580
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2940
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2596
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3292
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\9d08e5e62b409ef1ccd05c7996eb5432e4a36f55642cb7441d153909e823f144.exe"C:\Users\Admin\AppData\Local\Temp\9d08e5e62b409ef1ccd05c7996eb5432e4a36f55642cb7441d153909e823f144.exe"2⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\g2onoebe.tqz.exe"C:\Users\Admin\AppData\Local\Temp\g2onoebe.tqz.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4872
-
-
C:\Windows\SYSTEM32\SCHTASKS.exe"SCHTASKS.exe" /create /tn "Mason9d08e5e62b409ef1ccd05c7996eb5432e4a36f55642cb7441d153909e823f144.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\9d08e5e62b409ef1ccd05c7996eb5432e4a36f55642cb7441d153909e823f144.exe'" /sc onlogon /rl HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3756
-
-
C:\Windows\SYSTEM32\SCHTASKS.exe"SCHTASKS.exe" /create /tn "Mason9d08e5e62b409ef1ccd05c7996eb5432e4a36f55642cb7441d153909e823f144.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\9d08e5e62b409ef1ccd05c7996eb5432e4a36f55642cb7441d153909e823f144.exe'" /sc onlogon /rl HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2820
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3556
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3736
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3904
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4172
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Modifies data under HKEY_USERS
PID:5112
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:1032
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:2124
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:4664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:2600
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:3344
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:4964
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:972
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:2068
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1972
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4636
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:3888 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 476 -p 664 -ip 6642⤵PID:4436
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD56b689abd443157c17f28c010bc14e767
SHA1c54e4ad39c7fa6c31c51dc093d9898df4cd65316
SHA256145f8c0124f9c7be55fcfc277f75f672e8fb346f77f20a06bcb6de7572e317ea
SHA512350eff5cb40879587f9d94a8f55b9fccb204e0e75ae3c8027495ec029df8847570f56e4a95979c5d586a2036bac7b5867a39977574bacd904e0378868f912707
-
Filesize
13KB
MD5830a915eccafcbc2828b864638e2d79a
SHA1675ad9173fa6b0764f9f5dddad2dd98d56b6a003
SHA2566f77cde66ba2a1f8c6fca6754a6ec01ec191a3c45a2b8fe24aae8ccdf96fd5a5
SHA512b6c3e0ff49eb1b40d4d21b13c2371f2fe232a31ca2c90d75e761d3c64930f0bac62f37601c0a33906309e9161d52addb899f1f36e03f0fe08b4ff894520cb9f9
-
Filesize
161KB
MD594f1ab3a068f83b32639579ec9c5d025
SHA138f3d5bc5de46feb8de093d11329766b8e2054ae
SHA256879cc20b41635709bb304e315aaa5ca4708b480a1bfc2f4935fcf2215188efb0
SHA51244d5236a804d63302b21ca25ebc148a64605508d03c990a244c44ceb8630849da0510b7b2d0bee72e01ca6681e2d86d7e6aee8847674a26f0028d149b9abee0c