Analysis
-
max time kernel
900s -
max time network
902s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
miner.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
miner.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
miner.exe
Resource
win10ltsc2021-20250217-en
General
-
Target
miner.exe
-
Size
104KB
-
MD5
4a9f5b7664e2ebf47aa5fc4240dc8a22
-
SHA1
d0fc11aab0181df38d193cf8dfd1843fe06c844a
-
SHA256
5c5374eb9054e48c5ab9c6ef21c2bd228fe2e63eaa0ae83dbdb65dd1a7429369
-
SHA512
f45224b584b64d4ac32d4e6303ad87b2902ea310ac332ed0a0c7a706df2441eb0ef1f5076fe2716d004e59aa6a8e9e5e5e3a8f012008f05aef05064ad1e1eed6
-
SSDEEP
192:xjZaDMFEa4ajXPeeZnXwqXTyE1hEjjTyXfan55tfMcePLiZmGhTuRY9SRXiKqiRh:hp4ajGCnXGMsGXfwldJ99Sjvb99Sjv
Malware Config
Extracted
xworm
yNحكـX8ٍبAGLWِF6Jo2DiObلٍLZا3ا
-
Install_directory
%Port%
-
install_file
MicrosoftEdgeUpdateTaskMachineUAC.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/3168-382-0x0000012E55020000-0x0000012E5502E000-memory.dmp family_xworm -
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/files/0x000300000001e926-70.dat family_xmrig behavioral2/files/0x000300000001e926-70.dat xmrig behavioral2/memory/3168-72-0x0000012E39D20000-0x0000012E3A666000-memory.dmp xmrig behavioral2/memory/3168-244-0x0000012E54EC0000-0x0000012E55AF4000-memory.dmp xmrig behavioral2/files/0x000300000001e95b-303.dat family_xmrig behavioral2/files/0x000300000001e95b-303.dat xmrig -
Xmrig family
-
Xworm family
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DoSvc\ImagePath = "C:\\Windows\\System32\\svchost.exe -k NetworkService -p" WaaSMedicAgent.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wmiprvse.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation miner.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation xmrig.exe -
Executes dropped EXE 3 IoCs
pid Process 3168 xmrig.exe 4236 w51qamgl.a2l.exe 5084 nfxcb5sr.vkp.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 2 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Application-Experience%4Program-Compatibility-Assistant.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Program-Compatibility-Assistant%4CompatAfterUpgrade.evtx svchost.exe -
Drops file in System32 directory 13 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officeclicktorun.exe_Rules.xml OfficeClickToRun.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Scan svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\Application Experience\PcaPatchDbTask svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\WindowsUpdate\Scheduled Start svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe -
pid Process 2500 powershell.exe 3396 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 21 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\LogConf wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Mfg wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Mfg wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\LogConf wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz mousocoreworker.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier mousocoreworker.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mousocoreworker.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mousocoreworker.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz mousocoreworker.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 mousocoreworker.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU mousocoreworker.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Explorer.EXE -
Modifies data under HKEY_USERS 23 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 50,1329 10,1329 15,1329 100,1329 6" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe = "Mon, 03 Mar 2025 17:25:19 GMT" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\RulesEndpoint = "https://nexusrules.officeapps.live.com/nexus/rules?Application=officeclicktorun.exe&Version=16.0.12527.20470&ClientId={4716907A-E266-4403-9FD6-9DC7734AE833}&OSEnvironment=10&MsoAppId=37&AudienceName=Production&AudienceGroup=Production&AppVersion=16.0.12527.20470&" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,17110992,7202269,41484365,17110988,7153487,39965824,17962391,508368333,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ExtendedProperties\LID = "00184012963080C5" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414} mousocoreworker.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414}\DeviceTicket = 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 mousocoreworker.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414}\ApplicationFlags = "1" mousocoreworker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Property mousocoreworker.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414}\DeviceId = "00184012963080C5" mousocoreworker.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe_queried = "1741022718" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Property\00184012963080C5 = 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 mousocoreworker.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{D6D9E004-CD87-442B-9D57-5E0AEB4F6F72}\FFlags = "18874385" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{D6D9E004-CD87-442B-9D57-5E0AEB4F6F72}\GroupView = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\NodeSlot = "3" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\20551896-083c-4aae = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\1bb63005-e713-45d3 = "0" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0\0 Explorer.EXE Key deleted \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\0dd668ac-1d49-4a0c RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\0dd668ac-1d49-4a0c = "\\\\?\\Volume{241E003F-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\4253d7bdb84d8b30a068b2d405453787d25e0affb02c54beeec344f20b6b4806" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a94ea773-f13f-49b1 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@%SystemRoot%\System32\telephon.cpl,-1#immutable1 = "Phone and Modem" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{D6D9E004-CD87-442B-9D57-5E0AEB4F6F72}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000060000001800000030f125b7ef471a10a5f102608c9eebac0a000000f0000000334b179bff40d211a27e00c04fc3087102000000f0000000334b179bff40d211a27e00c04fc3087103000000a000000030f125b7ef471a10a5f102608c9eebac0c00000050000000a66a63283d95d211b5d600c04fd918d00b0000007800000030f125b7ef471a10a5f102608c9eebac0e00000090000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "48" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\2cab5a76-efe5-4062 RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0 = 5600310000000000515a367812004170704461746100400009000400efbe515a3678635af88a2e0000005de10100000001000000000000000000000000000000364e69004100700070004400610074006100000016000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\b808220a-e994-4abb = 77b36f1b618cdb01 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\bd26b865-0314-4f8a RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@%SystemRoot%\System32\systemcpl.dll,-1#immutable1 = "System" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{D6D9E004-CD87-442B-9D57-5E0AEB4F6F72}\IconSize = "16" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\bd26b865-0314-4f8a = "8324" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@%SystemRoot%\system32\colorcpl.exe,-6#immutable1 = "Color Management" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\e06a4fdf-01cb-4484 = "\\\\?\\Volume{241E003F-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\0082480c74862e7b953053a42b7c60924ddd36b23cdf4028615a25beb0996752" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a94ea773-f13f-49b1 = 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 RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\abbc790d-e0d7-49a6 = a74f831a618cdb01 RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\MRUListEx = 00000000ffffffff Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\0111a574-95f4-4f4e = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\2cf6b334-37e9-4930 = 28c59a1b618cdb01 RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{D6D9E004-CD87-442B-9D57-5E0AEB4F6F72}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\2cab5a76-efe5-4062 = "\\\\?\\Volume{241E003F-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\8da9e4a28969d8de10781b4d0159df85e5793afe28e45c5917959c4955e8350b" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\2cf6b334-37e9-4930 = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\bd26b865-0314-4f8a = 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 RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\NodeSlot = "5" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\abbc790d-e0d7-49a6 = "\\\\?\\Volume{241E003F-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\afb8ca313a3add31e2b75071034627cfd8c56f1a107fd696f4a7557a772c3d4f" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a94ea773-f13f-49b1 = "0" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@%SystemRoot%\System32\fhcpl.dll,-52#immutable1 = "File History" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f7840f05f6481501b109f0800aa002f954e0000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = 00000000ffffffff Explorer.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3416 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3396 powershell.exe 3396 powershell.exe 2500 powershell.exe 2500 powershell.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe 4236 w51qamgl.a2l.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3416 Explorer.EXE 3224 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3396 powershell.exe Token: SeDebugPrivilege 2500 powershell.exe Token: SeDebugPrivilege 3168 xmrig.exe Token: SeDebugPrivilege 4236 w51qamgl.a2l.exe Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 1476 svchost.exe Token: SeCreatePagefilePrivilege 1476 svchost.exe Token: SeShutdownPrivilege 1952 mousocoreworker.exe Token: SeCreatePagefilePrivilege 1952 mousocoreworker.exe Token: SeShutdownPrivilege 1952 mousocoreworker.exe Token: SeCreatePagefilePrivilege 1952 mousocoreworker.exe Token: SeShutdownPrivilege 1952 mousocoreworker.exe Token: SeCreatePagefilePrivilege 1952 mousocoreworker.exe Token: SeShutdownPrivilege 2092 RuntimeBroker.exe Token: SeShutdownPrivilege 1952 mousocoreworker.exe Token: SeCreatePagefilePrivilege 1952 mousocoreworker.exe Token: SeShutdownPrivilege 2092 RuntimeBroker.exe Token: SeShutdownPrivilege 1952 mousocoreworker.exe Token: SeCreatePagefilePrivilege 1952 mousocoreworker.exe Token: SeAssignPrimaryTokenPrivilege 2024 svchost.exe Token: SeIncreaseQuotaPrivilege 2024 svchost.exe Token: SeSecurityPrivilege 2024 svchost.exe Token: SeTakeOwnershipPrivilege 2024 svchost.exe Token: SeLoadDriverPrivilege 2024 svchost.exe Token: SeSystemtimePrivilege 2024 svchost.exe Token: SeBackupPrivilege 2024 svchost.exe Token: SeRestorePrivilege 2024 svchost.exe Token: SeShutdownPrivilege 2024 svchost.exe Token: SeSystemEnvironmentPrivilege 2024 svchost.exe Token: SeUndockPrivilege 2024 svchost.exe Token: SeManageVolumePrivilege 2024 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2024 svchost.exe Token: SeIncreaseQuotaPrivilege 2024 svchost.exe Token: SeSecurityPrivilege 2024 svchost.exe Token: SeTakeOwnershipPrivilege 2024 svchost.exe Token: SeLoadDriverPrivilege 2024 svchost.exe Token: SeSystemtimePrivilege 2024 svchost.exe Token: SeBackupPrivilege 2024 svchost.exe Token: SeRestorePrivilege 2024 svchost.exe Token: SeShutdownPrivilege 2024 svchost.exe Token: SeSystemEnvironmentPrivilege 2024 svchost.exe Token: SeUndockPrivilege 2024 svchost.exe Token: SeManageVolumePrivilege 2024 svchost.exe Token: SeAuditPrivilege 2940 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2024 svchost.exe Token: SeIncreaseQuotaPrivilege 2024 svchost.exe Token: SeSecurityPrivilege 2024 svchost.exe Token: SeTakeOwnershipPrivilege 2024 svchost.exe Token: SeLoadDriverPrivilege 2024 svchost.exe Token: SeSystemtimePrivilege 2024 svchost.exe Token: SeBackupPrivilege 2024 svchost.exe Token: SeRestorePrivilege 2024 svchost.exe Token: SeShutdownPrivilege 2024 svchost.exe Token: SeSystemEnvironmentPrivilege 2024 svchost.exe Token: SeUndockPrivilege 2024 svchost.exe Token: SeManageVolumePrivilege 2024 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2024 svchost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3416 Explorer.EXE 3416 Explorer.EXE 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
pid Process 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 4596 Conhost.exe -
Suspicious use of UnmapMainImage 7 IoCs
pid Process 2924 svchost.exe 2924 svchost.exe 2924 svchost.exe 3416 Explorer.EXE 3148 RuntimeBroker.exe 4184 RuntimeBroker.exe 2912 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1776 wrote to memory of 3396 1776 miner.exe 89 PID 1776 wrote to memory of 3396 1776 miner.exe 89 PID 3396 wrote to memory of 2500 3396 powershell.exe 91 PID 3396 wrote to memory of 2500 3396 powershell.exe 91 PID 1776 wrote to memory of 3168 1776 miner.exe 95 PID 1776 wrote to memory of 3168 1776 miner.exe 95 PID 3168 wrote to memory of 4236 3168 xmrig.exe 96 PID 3168 wrote to memory of 4236 3168 xmrig.exe 96 PID 4236 wrote to memory of 612 4236 w51qamgl.a2l.exe 5 PID 4236 wrote to memory of 676 4236 w51qamgl.a2l.exe 7 PID 4236 wrote to memory of 960 4236 w51qamgl.a2l.exe 12 PID 4236 wrote to memory of 316 4236 w51qamgl.a2l.exe 13 PID 4236 wrote to memory of 428 4236 w51qamgl.a2l.exe 14 PID 4236 wrote to memory of 1052 4236 w51qamgl.a2l.exe 16 PID 4236 wrote to memory of 1136 4236 w51qamgl.a2l.exe 17 PID 4236 wrote to memory of 1144 4236 w51qamgl.a2l.exe 18 PID 4236 wrote to memory of 1172 4236 w51qamgl.a2l.exe 19 PID 4236 wrote to memory of 1180 4236 w51qamgl.a2l.exe 20 PID 4236 wrote to memory of 1264 4236 w51qamgl.a2l.exe 21 PID 4236 wrote to memory of 1312 4236 w51qamgl.a2l.exe 22 PID 4236 wrote to memory of 1340 4236 w51qamgl.a2l.exe 23 PID 4236 wrote to memory of 1424 4236 w51qamgl.a2l.exe 24 PID 4236 wrote to memory of 1440 4236 w51qamgl.a2l.exe 25 PID 4236 wrote to memory of 1592 4236 w51qamgl.a2l.exe 26 PID 4236 wrote to memory of 1600 4236 w51qamgl.a2l.exe 27 PID 4236 wrote to memory of 1656 4236 w51qamgl.a2l.exe 28 PID 4236 wrote to memory of 1716 4236 w51qamgl.a2l.exe 29 PID 4236 wrote to memory of 1764 4236 w51qamgl.a2l.exe 30 PID 4236 wrote to memory of 1796 4236 w51qamgl.a2l.exe 31 PID 4236 wrote to memory of 1884 4236 w51qamgl.a2l.exe 32 PID 4236 wrote to memory of 2028 4236 w51qamgl.a2l.exe 33 PID 4236 wrote to memory of 2040 4236 w51qamgl.a2l.exe 34 PID 4236 wrote to memory of 1724 4236 w51qamgl.a2l.exe 35 PID 4236 wrote to memory of 1812 4236 w51qamgl.a2l.exe 36 PID 4236 wrote to memory of 2024 4236 w51qamgl.a2l.exe 37 PID 4236 wrote to memory of 2132 4236 w51qamgl.a2l.exe 38 PID 4236 wrote to memory of 2264 4236 w51qamgl.a2l.exe 40 PID 4236 wrote to memory of 2280 4236 w51qamgl.a2l.exe 41 PID 4236 wrote to memory of 2572 4236 w51qamgl.a2l.exe 42 PID 4236 wrote to memory of 2588 4236 w51qamgl.a2l.exe 43 PID 4236 wrote to memory of 2688 4236 w51qamgl.a2l.exe 44 PID 4236 wrote to memory of 2720 4236 w51qamgl.a2l.exe 45 PID 4236 wrote to memory of 2728 4236 w51qamgl.a2l.exe 46 PID 4236 wrote to memory of 2776 4236 w51qamgl.a2l.exe 47 PID 4236 wrote to memory of 2924 4236 w51qamgl.a2l.exe 48 PID 4236 wrote to memory of 2940 4236 w51qamgl.a2l.exe 49 PID 4236 wrote to memory of 2980 4236 w51qamgl.a2l.exe 50 PID 4236 wrote to memory of 2992 4236 w51qamgl.a2l.exe 51 PID 4236 wrote to memory of 3004 4236 w51qamgl.a2l.exe 52 PID 4236 wrote to memory of 3256 4236 w51qamgl.a2l.exe 54 PID 4236 wrote to memory of 3404 4236 w51qamgl.a2l.exe 55 PID 4236 wrote to memory of 3416 4236 w51qamgl.a2l.exe 56 PID 4236 wrote to memory of 3716 4236 w51qamgl.a2l.exe 57 PID 4236 wrote to memory of 3888 4236 w51qamgl.a2l.exe 58 PID 4236 wrote to memory of 2092 4236 w51qamgl.a2l.exe 60 PID 4236 wrote to memory of 4184 4236 w51qamgl.a2l.exe 62 PID 4236 wrote to memory of 3600 4236 w51qamgl.a2l.exe 65 PID 4236 wrote to memory of 3728 4236 w51qamgl.a2l.exe 67 PID 4236 wrote to memory of 3264 4236 w51qamgl.a2l.exe 68 PID 4236 wrote to memory of 2396 4236 w51qamgl.a2l.exe 69 PID 4236 wrote to memory of 1076 4236 w51qamgl.a2l.exe 70 PID 4236 wrote to memory of 4216 4236 w51qamgl.a2l.exe 71 PID 4236 wrote to memory of 632 4236 w51qamgl.a2l.exe 72 PID 4236 wrote to memory of 2752 4236 w51qamgl.a2l.exe 73 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:316
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:428
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
PID:1136 -
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2688
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1172
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:1180
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1264
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1424
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2572
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1592
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1600
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1656
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1716
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1764
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1796
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1884
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:2028
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2040
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1724
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1812
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2132
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2264
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2280
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2588
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2720
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2776
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
- Suspicious use of UnmapMainImage
PID:2924
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2980
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2992
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:3004
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3256
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3404
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\miner.exe"C:\Users\Admin\AppData\Local\Temp\miner.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" powershell -Command "Expand-Archive -Path 'C:\Users\Admin\AppData\Roaming\xmrig.zip' -DestinationPath 'C:\Users\Admin\AppData\Roaming\xmrig' -Force"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Expand-Archive -Path C:\Users\Admin\AppData\Roaming\xmrig.zip -DestinationPath C:\Users\Admin\AppData\Roaming\xmrig -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
-
C:\Users\Admin\AppData\Roaming\xmrig\xmrig.exe"C:\Users\Admin\AppData\Roaming\xmrig\xmrig.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\w51qamgl.a2l.exe"C:\Users\Admin\AppData\Local\Temp\w51qamgl.a2l.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4236
-
-
C:\Users\Admin\AppData\Local\Temp\nfxcb5sr.vkp.exe"C:\Users\Admin\AppData\Local\Temp\nfxcb5sr.vkp.exe"4⤵
- Executes dropped EXE
PID:5084 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2200
-
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /72⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\xmrig\start.cmd" "2⤵PID:2564
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Suspicious use of SetWindowsHookEx
PID:4596
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3716
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3888
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of UnmapMainImage
PID:4184
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:3600
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:3728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:3264
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2396
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:1076
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Modifies data under HKEY_USERS
PID:632
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2752
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4920
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of UnmapMainImage
PID:3148
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of UnmapMainImage
PID:2912
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4108
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe fbaa6f3d9349ea287b510969c535d185 Ym/rjLg2rkmNPCkomLvVKQ.0.1.0.0.01⤵
- Sets service image path in registry
PID:1364 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1744
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
PID:3616
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks BIOS information in registry
- Checks SCSI registry key(s)
- Enumerates system info in registry
PID:3240
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:3784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:1380
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:4036
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:ShellFeedsUI.AppXnj65k2d1a1rnztt2t2nng5ctmk3e76pn.mca1⤵PID:3668
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:4904
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:2916
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{7966B4D8-4FDC-4126-A10B-39A3209AD251}1⤵PID:4244
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}1⤵PID:1836
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1512
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵PID:4212
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:4004
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵PID:1068
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:1028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5cfa15d48af384510f69cdc66cc4bbbc1
SHA1fc9d90052c0d2f8efa12e89ccb9fd469d569a01e
SHA2568a1b4471575c8e690629164847ce42f8c213d8654328430a56ca2b9243256c85
SHA512bb343d592a5c650ea962b0bb8446dcf1c3b86d2b913141f6df7a7d99516a7084c375e0e4006ce35f39268c58cd46a6fc527aaf5bbc36be68a7e917128cef298d
-
Filesize
60KB
MD5f8b85175c13ededa2d625a5f1172983b
SHA15352108fcf113ab196b948fa4909226ea92a2285
SHA2567ee5f646c4806b8fd89d1fe624b5b84dba0ff239f19e61441f78ed1fc1e534ac
SHA512f8128884a3de74b062555eff76d54796587e1f35214d9394f97800a57b3456f24dd736f42cf0a5efb6fb71f1d32175bdfa3ffdc94fb46b19d82ae0fac7eaa89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Filesize340B
MD5a4c5e5932fda4bf0b2f887a15bcd8dd6
SHA16d3b053b69b3260280361732740a3b5adaceca78
SHA256e81944bc046149690cc082f353ee40671a8654c45101d2cbc2d8ea00534cbc9d
SHA51218024746b1482b3563299664ae95bf1f8af99804030b350f3d550c865d6b9c589ab328a353a7b89bc236427c718d74735bf8d82541706391439d9c6107a8702b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25
Filesize482B
MD54540b90145b209dcdd6aabfb102b5b36
SHA110f5c5abb4ff8ca4bb5aaa7f1e8342d34531363a
SHA2562f60f9f02949194dc5c4f13f2a8ab0ba3cb023b79fc0dc16b7b1f2e202e29a89
SHA512eb5111dbff3b834377b8528c4265ec4fa2c916265ad5dcb0a1f5ab94c894eb2f02de2c6b25ffa2a79979326eaac789f00927e6e6f2558679de95606c5d64f6a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90
Filesize480B
MD587737a497dc8858763f33a0d9e68d3f4
SHA1964b69314f45334a84ad93cbcae9fef64b819001
SHA2566d4c22fd0c9e40c9da406afef8c04643fb15ae0becfa691a753c040e43128482
SHA512313c7be7569771de3d062806bf5064f55675f115b9b57daaf021a1ce164b1dad684cb12d849895437ff49a8919e5fc02a9798879bf65e79fb67cbb44ae5386fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D9CA54E0FA212456E1DB00704A97658E
Filesize476B
MD53fbd92676f9850c33be125eb849c6ced
SHA1424a848f4b967993ef083a5a731317c084451c46
SHA2566115db644ca6d9c73f21db1ff5635a970bc454ea512bdd34e540e1acb422a999
SHA512d5d8a2b4c2c81e2a8af99dcb11ad1ebeffa13f9bd335c4f4194cd534193ceeb956e934b4708b49a31ce0c8b608535f3f5e0732d3322abd0c4cf6aa3a4cfd81a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize412B
MD551615cde62061ddab1af658c8b2c1ad3
SHA1ad74c7dbef96909ad696fea379f5465c38377130
SHA2568cd63fb701fe74d327583bd4a23055bcc8080f491c006b796d6712a22af5e3a7
SHA51265699ef085a88b66a19fc95b5be7194922d5b761b9f62837e0f50c19161d14c56d93a21ff0342d8b499e975aba532b91706660f6098d4327286bf614b0bb4e4e
-
Filesize
3KB
MD5fe3aab3ae544a134b68e881b82b70169
SHA1926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6
SHA256bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b
SHA5123fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280
-
Filesize
8KB
MD5ed115fd9b7695a1d733201d811c3ce71
SHA19164ca71f21c3a47193969a33999c03eb4db9e8b
SHA256fa6fefd6bcd669ce2d7a6a61c44c551e4257afc364287677e113617dbf98c353
SHA51204c58cff34e890bd7a3bc4994f1f88160466683f9288eb4eaf2b6911b9f688649a7514a144d16c4a4ed3ef4d6f167c109f9bbef7fa9e47149e2135d1f09f3608
-
Filesize
64B
MD55caad758326454b5788ec35315c4c304
SHA13aef8dba8042662a7fcf97e51047dc636b4d4724
SHA25683e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391
SHA5124e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AppData\Indexed DB\edb.chk
Filesize8KB
MD5e86fae99ba3a13ea951b849e4eaca60b
SHA1b9a93de06f0f3bd36d44dda7c0e39578c09e2bc2
SHA2569da9e93754f3a46318bf136b24ad868c21918b518c25924ad52e0f5aad69bd2e
SHA5120efa18dd6d2162eef2ecd633a8547bcf9059718cfaac5a288552cde62e13b9452f43cc25ad9f253f62cb0a3b08c34087c3364a0bdb04619290a5d8bc111f8e4e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
9.1MB
MD5cb166d49ce846727ed70134b589b0142
SHA18f5e1c7792e9580f2b10d7bef6dc7e63ea044688
SHA25649da580656e51214d59702a1d983eff143af3560a344f524fe86326c53fb5ddb
SHA512a39bd86a148af26fd31a0d171078fb7bce0951bb8ea63658d87f6bde97dbc214c62e8bd7152d1e621051de8a0ba77ffd7bda7c1106afb740584c80e68e1912ed
-
Filesize
161KB
MD594f1ab3a068f83b32639579ec9c5d025
SHA138f3d5bc5de46feb8de093d11329766b8e2054ae
SHA256879cc20b41635709bb304e315aaa5ca4708b480a1bfc2f4935fcf2215188efb0
SHA51244d5236a804d63302b21ca25ebc148a64605508d03c990a244c44ceb8630849da0510b7b2d0bee72e01ca6681e2d86d7e6aee8847674a26f0028d149b9abee0c
-
Filesize
3.8MB
MD59895805962f3b439c3eb845cd30303c6
SHA1d488cfa52f17c60432813e7906ee812e0ae37fec
SHA256e30b7057712cdb8760a87b44eb2db03879f4ff54344aaf562e927814b5ce7e5b
SHA512ec526ca0cc850d03d220c46f9b592045983c392edc30a5cdee5157fe1ea38711f49a475e566c7e2017956f1aa6b1c64a9a4565a26bd466f5ac679aae728c98ce
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
Filesize
44B
MD5eaf3a00cc0465f8af471b849ada29843
SHA13042e97874706189aa9704d77c9e74a94e519106
SHA2568e70ef38fe14a2ee2848df3d6f7e260d1caf8cfc15de694d678b8af151d62333
SHA51256b9f3991ae4bad5e06097d095931e746e6b2ac955649a5c793d9f4f6861c6ffc9316b063c34d7a8079af201354c87bf3008bc0fd4321e59b27e1d8120b078cf
-
Filesize
9.3MB
MD572107c3009343491bdbd5a2bf27e0d17
SHA179ae9dd4ffc65810342c093fb3dd1413a830660d
SHA2569af0d7469bffba8aea58c666b94ae68e34373f554ba8a145ec5fcc78baf0e6c6
SHA512eab28e887aeb275527f4d4fa9a7ccd69dfaf21d249005eb9c9a9c098ca062cfabed02da2133e84c0b6109fbd4b6358e905199c24cdc9bb41799e63ccfbe3768e
-
Filesize
2KB
MD58abf2d6067c6f3191a015f84aa9b6efe
SHA198f2b0a5cdb13cd3d82dc17bd43741bf0b3496f7
SHA256ee18bd3259f220c41062abcbe71a421da3e910df11b9f86308a16cdc3a66fbea
SHA512c2d686a6373efcff583c1ef50c144c59addb8b9c4857ccd8565cd8be3c94b0ac0273945167eb04ebd40dfb0351e4b66cffe4c4e478fb7733714630a11f765b63
-
Filesize
2KB
MD5f313c5b4f95605026428425586317353
SHA106be66fa06e1cffc54459c38d3d258f46669d01a
SHA256129d0b993cd3858af5b7e87fdf74d8e59e6f2110184b5c905df8f5f6f2c39d8b
SHA512b87a829c86eff1d10e1590b18a9909f05101a535e5f4cef914a4192956eb35a8bfef614c9f95d53783d77571687f3eb3c4e8ee2f24d23ad24e0976d8266b8890
-
Filesize
2KB
MD5ceb7caa4e9c4b8d760dbf7e9e5ca44c5
SHA1a3879621f9493414d497ea6d70fbf17e283d5c08
SHA25698c054088df4957e8d6361fd2539c219bcf35f8a524aad8f5d1a95f218e990e9
SHA5121eddfbf4cb62d3c5b4755a371316304aaeabb00f01bad03fb4f925a98a2f0824f613537d86deddd648a74d694dc13ed5183e761fdc1ec92589f6fa28beb7fbff
-
Filesize
2KB
MD57d612892b20e70250dbd00d0cdd4f09b
SHA163251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5
SHA256727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02
SHA512f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1
-
Filesize
2KB
MD51e8e2076314d54dd72e7ee09ff8a52ab
SHA15fd0a67671430f66237f483eef39ff599b892272
SHA25655f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f
SHA5125b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6
-
Filesize
2KB
MD50b990e24f1e839462c0ac35fef1d119e
SHA19e17905f8f68f9ce0a2024d57b537aa8b39c6708
SHA256a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a
SHA512c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD530c307cc3215014af55ff57b7f7f3d3a
SHA19a9eef3e79aa44a0728325db5a728afa507e7060
SHA256d1b5e350c8c870e9aa76247a5b9690d067fca4c5cc8d75f286794e4ba89c1a14
SHA5127a872c600f96c71b482f848e26c28c57b3198db679f2e636873e5122dca7e9fe50f9565d370622fa72df4f776bbb0ba64a285a0644ce0acff38d3487635fcbdf
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749
Filesize330B
MD5354cd49a231524bc72bd0aea931a722d
SHA14eb78c0fe318c6107bf15fa250e27d4b5f33e119
SHA25686b7cd482381b33a36d9cf2ae91946e73ad492b5c863440e60e09692d64130b5
SHA51262432bb8b3e4e8ba8ff3deb783a0a9e9269db12cebc6194bdffa85a2cf1c958f36ab711825a08551a43fe1a73fe38b0019eb45f4e7ecac5629475521f161c683