Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 21:33
Static task
static1
Behavioral task
behavioral1
Sample
Bitcoin Flash Sender.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Bitcoin Flash Sender.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Btc_Flashing_Latest_.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Btc_Flashing_Latest_.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Main.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Main.exe
Resource
win10v2004-20250217-en
General
-
Target
Bitcoin Flash Sender.exe
-
Size
1.0MB
-
MD5
fe4cf784ce07deb238da9cfc876b2c1f
-
SHA1
855c8c3535dff682b86ed8a17ede5f4e8bd068f8
-
SHA256
2826ba31add950b8bad6c19805f8a6cf0efc4710ac35c54acb19afc09f72c057
-
SHA512
51c225d338dc5a1e07f94dffba252a05b84d198444ed174ee0d7aeaaa27729a76b1c2389eaa03447f3f1cea02bff13cc97190bb70687bd535dd3874e989d8c81
-
SSDEEP
24576:o7uzTHUpq1n4CBQpUOgyuiSjKg5tVlHmxtC/ulI4Xf:oKT0pk4CBQrg2jgGjlb
Malware Config
Extracted
quasar
2.1.0.0
Office04
45.61.140.75:7812
VNM_MUTEX_DIBuVCpZfDcrHCFft2
-
encryption_key
q8RpA86xyuUHuOrxUGXa
-
install_name
Windows Security.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Service Host
-
subdirectory
SubDir
Extracted
xworm
5.0
185.252.232.158:7812
b0c5WZixE6SqaTDD
-
Install_directory
%AppData%
-
install_file
Windows Defender Security Service.exe
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7479631857:AAFuIUMNJYKHzJ3Bc9t4FSh9ZQXlqymhFnk/sendMessage?chat_id=6291749148
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
185.252.232.158:7812
64.23.232.116:7812
vsvf
-
delay
1
-
install
true
-
install_file
Windows Security Health Service.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Contains code to disable Windows Defender 4 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/files/0x00070000000120fe-5.dat disable_win_def behavioral1/memory/2388-34-0x0000000000010000-0x000000000009C000-memory.dmp disable_win_def behavioral1/memory/2604-43-0x00000000008B0000-0x000000000093C000-memory.dmp disable_win_def behavioral1/memory/2736-165-0x0000000000B60000-0x0000000000BEC000-memory.dmp disable_win_def -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x00070000000193a2-16.dat family_xworm behavioral1/memory/1680-21-0x0000000001180000-0x0000000001190000-memory.dmp family_xworm -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" Windows Security.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Windows Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" Windows Security.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Windows Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Windows Security.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Windows Security.exe -
Quasar family
-
Quasar payload 4 IoCs
resource yara_rule behavioral1/files/0x00070000000120fe-5.dat family_quasar behavioral1/memory/2388-34-0x0000000000010000-0x000000000009C000-memory.dmp family_quasar behavioral1/memory/2604-43-0x00000000008B0000-0x000000000093C000-memory.dmp family_quasar behavioral1/memory/2736-165-0x0000000000B60000-0x0000000000BEC000-memory.dmp family_quasar -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/files/0x00070000000193af-24.dat family_stormkitty behavioral1/memory/1964-35-0x0000000000910000-0x0000000000940000-memory.dmp family_stormkitty -
Stormkitty family
-
resource yara_rule behavioral1/files/0x000500000001a41c-28.dat VenomRAT behavioral1/memory/2756-31-0x0000000001310000-0x0000000001328000-memory.dmp VenomRAT behavioral1/memory/2204-60-0x0000000001300000-0x0000000001318000-memory.dmp VenomRAT -
Venomrat family
-
Xworm family
-
Async RAT payload 2 IoCs
resource yara_rule behavioral1/files/0x00070000000193af-24.dat family_asyncrat behavioral1/files/0x000500000001a41c-28.dat family_asyncrat -
Deletes itself 1 IoCs
pid Process 2912 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender Security Service.lnk Windows Defender Security Service.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender Security Service.lnk Windows Defender Security Service.exe -
Executes dropped EXE 8 IoCs
pid Process 2388 Windows Security.exe 2584 crack.exe 1680 Windows Defender Security Service.exe 1964 svchost.exe 2756 Cracked.exe 2604 Windows Security.exe 2204 Windows Security Health Service.exe 2736 Windows Security.exe -
Loads dropped DLL 1 IoCs
pid Process 2388 Windows Security.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features Windows Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Windows Security.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Defender Security Service = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Defender Security Service.exe" Windows Defender Security Service.exe -
Drops desktop.ini file(s) 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\e65e591c19e941630a5fdba9d941a0f5\Admin@XPAJOTIY_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\e65e591c19e941630a5fdba9d941a0f5\Admin@XPAJOTIY_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\e65e591c19e941630a5fdba9d941a0f5\Admin@XPAJOTIY_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\e65e591c19e941630a5fdba9d941a0f5\Admin@XPAJOTIY_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\e65e591c19e941630a5fdba9d941a0f5\Admin@XPAJOTIY_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini svchost.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com 21 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1604 PING.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 2720 netsh.exe 2884 cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1420 timeout.exe 2004 timeout.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1604 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 552 schtasks.exe 1424 schtasks.exe 832 schtasks.exe 1908 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1680 Windows Defender Security Service.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2672 powershell.exe 2756 Cracked.exe 2756 Cracked.exe 2756 Cracked.exe 2756 Cracked.exe 1680 Windows Defender Security Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 1964 svchost.exe 2204 Windows Security Health Service.exe 1964 svchost.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 1964 svchost.exe 1964 svchost.exe 2204 Windows Security Health Service.exe 1964 svchost.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe 2204 Windows Security Health Service.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 1680 Windows Defender Security Service.exe Token: SeDebugPrivilege 2756 Cracked.exe Token: SeDebugPrivilege 1964 svchost.exe Token: SeDebugPrivilege 2388 Windows Security.exe Token: SeDebugPrivilege 2584 crack.exe Token: SeDebugPrivilege 2604 Windows Security.exe Token: SeDebugPrivilege 2672 powershell.exe Token: SeDebugPrivilege 2756 Cracked.exe Token: SeDebugPrivilege 2604 Windows Security.exe Token: SeDebugPrivilege 2204 Windows Security Health Service.exe Token: SeDebugPrivilege 2204 Windows Security Health Service.exe Token: SeDebugPrivilege 2736 Windows Security.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2604 Windows Security.exe 1680 Windows Defender Security Service.exe 2204 Windows Security Health Service.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2388 1704 Bitcoin Flash Sender.exe 30 PID 1704 wrote to memory of 2388 1704 Bitcoin Flash Sender.exe 30 PID 1704 wrote to memory of 2388 1704 Bitcoin Flash Sender.exe 30 PID 1704 wrote to memory of 2388 1704 Bitcoin Flash Sender.exe 30 PID 1704 wrote to memory of 2584 1704 Bitcoin Flash Sender.exe 31 PID 1704 wrote to memory of 2584 1704 Bitcoin Flash Sender.exe 31 PID 1704 wrote to memory of 2584 1704 Bitcoin Flash Sender.exe 31 PID 1704 wrote to memory of 2584 1704 Bitcoin Flash Sender.exe 31 PID 1704 wrote to memory of 1680 1704 Bitcoin Flash Sender.exe 32 PID 1704 wrote to memory of 1680 1704 Bitcoin Flash Sender.exe 32 PID 1704 wrote to memory of 1680 1704 Bitcoin Flash Sender.exe 32 PID 1704 wrote to memory of 1964 1704 Bitcoin Flash Sender.exe 33 PID 1704 wrote to memory of 1964 1704 Bitcoin Flash Sender.exe 33 PID 1704 wrote to memory of 1964 1704 Bitcoin Flash Sender.exe 33 PID 1704 wrote to memory of 1964 1704 Bitcoin Flash Sender.exe 33 PID 1704 wrote to memory of 2756 1704 Bitcoin Flash Sender.exe 34 PID 1704 wrote to memory of 2756 1704 Bitcoin Flash Sender.exe 34 PID 1704 wrote to memory of 2756 1704 Bitcoin Flash Sender.exe 34 PID 2388 wrote to memory of 1424 2388 Windows Security.exe 36 PID 2388 wrote to memory of 1424 2388 Windows Security.exe 36 PID 2388 wrote to memory of 1424 2388 Windows Security.exe 36 PID 2388 wrote to memory of 1424 2388 Windows Security.exe 36 PID 2388 wrote to memory of 2604 2388 Windows Security.exe 38 PID 2388 wrote to memory of 2604 2388 Windows Security.exe 38 PID 2388 wrote to memory of 2604 2388 Windows Security.exe 38 PID 2388 wrote to memory of 2604 2388 Windows Security.exe 38 PID 2388 wrote to memory of 2672 2388 Windows Security.exe 39 PID 2388 wrote to memory of 2672 2388 Windows Security.exe 39 PID 2388 wrote to memory of 2672 2388 Windows Security.exe 39 PID 2388 wrote to memory of 2672 2388 Windows Security.exe 39 PID 2756 wrote to memory of 1328 2756 Cracked.exe 41 PID 2756 wrote to memory of 1328 2756 Cracked.exe 41 PID 2756 wrote to memory of 1328 2756 Cracked.exe 41 PID 2756 wrote to memory of 2932 2756 Cracked.exe 43 PID 2756 wrote to memory of 2932 2756 Cracked.exe 43 PID 2756 wrote to memory of 2932 2756 Cracked.exe 43 PID 1328 wrote to memory of 832 1328 cmd.exe 45 PID 1328 wrote to memory of 832 1328 cmd.exe 45 PID 1328 wrote to memory of 832 1328 cmd.exe 45 PID 2932 wrote to memory of 1420 2932 cmd.exe 46 PID 2932 wrote to memory of 1420 2932 cmd.exe 46 PID 2932 wrote to memory of 1420 2932 cmd.exe 46 PID 2604 wrote to memory of 1908 2604 Windows Security.exe 47 PID 2604 wrote to memory of 1908 2604 Windows Security.exe 47 PID 2604 wrote to memory of 1908 2604 Windows Security.exe 47 PID 2604 wrote to memory of 1908 2604 Windows Security.exe 47 PID 1680 wrote to memory of 552 1680 Windows Defender Security Service.exe 49 PID 1680 wrote to memory of 552 1680 Windows Defender Security Service.exe 49 PID 1680 wrote to memory of 552 1680 Windows Defender Security Service.exe 49 PID 2932 wrote to memory of 2204 2932 cmd.exe 51 PID 2932 wrote to memory of 2204 2932 cmd.exe 51 PID 2932 wrote to memory of 2204 2932 cmd.exe 51 PID 2584 wrote to memory of 2236 2584 crack.exe 52 PID 2584 wrote to memory of 2236 2584 crack.exe 52 PID 2584 wrote to memory of 2236 2584 crack.exe 52 PID 2584 wrote to memory of 2236 2584 crack.exe 52 PID 2236 wrote to memory of 2004 2236 cmd.exe 54 PID 2236 wrote to memory of 2004 2236 cmd.exe 54 PID 2236 wrote to memory of 2004 2236 cmd.exe 54 PID 2236 wrote to memory of 2004 2236 cmd.exe 54 PID 1964 wrote to memory of 2884 1964 svchost.exe 55 PID 1964 wrote to memory of 2884 1964 svchost.exe 55 PID 1964 wrote to memory of 2884 1964 svchost.exe 55 PID 1964 wrote to memory of 2884 1964 svchost.exe 55 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bitcoin Flash Sender.exe"C:\Users\Admin\AppData\Local\Temp\Bitcoin Flash Sender.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Roaming\Windows Security.exe"C:\Users\Admin\AppData\Roaming\Windows Security.exe"2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Service Host" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Windows Security.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1424
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Service Host" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe" /rl HIGHEST /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1908
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit3⤵
- System Location Discovery: System Language Discovery
PID:984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*4⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2912
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\z49MPLr4dSDf.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:2932
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1604
-
-
C:\Users\Admin\AppData\Roaming\Windows Security.exe"C:\Users\Admin\AppData\Roaming\Windows Security.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
-
-
C:\Users\Admin\AppData\Roaming\crack.exe"C:\Users\Admin\AppData\Roaming\crack.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpBE9E.tmp.cmd""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\timeout.exetimeout 44⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2004
-
-
-
-
C:\Users\Admin\AppData\Roaming\Windows Defender Security Service.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Security Service.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Defender Security Service" /tr "C:\Users\Admin\AppData\Roaming\Windows Defender Security Service.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:552
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2884 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:2500
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2720
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1704
-
-
-
-
C:\Users\Admin\AppData\Roaming\Cracked.exe"C:\Users\Admin\AppData\Roaming\Cracked.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows Security Health Service" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows Security Health Service" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:832
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpB423.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:1420
-
-
C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2204
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7077809D-19D8-402B-A085-9EBB45367FBC} S-1-5-21-3533259084-2542256011-65585152-1000:XPAJOTIY\Admin:Interactive:[1]1⤵PID:2168
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
2System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
5.0MB
MD5e87d64670a56c2a625658096ae73408f
SHA19dee648b8d5660e09416e33d66b7d09b3fc3db98
SHA256d3fbdfb580352a821362428d3f90d8fc11dc00afecd1b1bae5bb125de15435e6
SHA51223de58acd9030113477588ac1c55e8cc1011babdf06f0fde1f6cfd51cf65fe33f7774faff028e8c69eae860419c44e326126b7e2960ca68c25687e48236b8138
-
Filesize
175B
MD5ece33fe8fb5749b0c1ae55ef43043071
SHA1d38a81e0461262b3736c634a16035d9eea9f20d7
SHA25622c0b219f282c7c81446a720f100c00648828cc745a399fa0ada8440bb984a35
SHA5124d196eb70d184d60e0ec234daa9aa80e2fade55bef280f0a2cb51d2451c7a7bb3176bd43f830cea3175f3de8481c74de29795741bec768e002f90a921b22d109
-
Filesize
151B
MD5cb97f9edbcd9fb18a3e8e967d638c334
SHA1e9270ad37e69dfc963acc65419b70d93c2157114
SHA2563fa00c09dfec00edd64cd1e3011b535679936c8d88774b5af6d44eadc493687b
SHA5127ff17573ef5e4f8dbf6239bbb26c647d10f638101d8ec6fe5f30428603ae4daa7b876ed472204c033fdf7e04bc7dfe274e6c3972cc0d369e34340500cdaa6a98
-
Filesize
210B
MD566a50134a4188dcd952e5b2f01884eb4
SHA1e6547c4ff2f8f26f2d16556cf611563e044eb0ab
SHA256910a19f85d2cf9490728c18f5a4c7b5c1f2dc733b938e33c2e81d352debf2fa8
SHA5128bf02564d49df1d113a573b038897ce18354f6d6cc0e8951f1aaefef178665e056c2629ec87b6c954d0e137871b6c23aea7eaacfc3611cdb33a24f97b238e0d2
-
Filesize
74KB
MD50dfa83a82f6418c73406d78296de61be
SHA1dd7eceef8a434c43e0751e180bf714e08771d336
SHA2568d27369ffa8b29d561fa9daf485be14d2fc00287bb1c69d4c84d514891c8db5e
SHA5129a4b026250b18c29ab7dd48203f321c2ef2f12695bd2dcb52ebbc15001c8ddf019d5a7e04da056c50c1881ce269d1810259bf6d04b61f471e8751b7192fc73d4
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
42KB
MD57a5ea6a11fdb03f789a2246aa8ff1501
SHA15e1289096418c7f8b5901963c34c89f9902cbbba
SHA256bde45f854d6c434717ea7b59587e020c2403123728c49deb56cba8132de5e96a
SHA512cfca94f3d78675bbe56f02119e3943f7067898d7b7d14e91bca7220a235665363f69930acdeb9f7df388a49a6b62812bcf74bbffad20a96915257b54c4e78a73
-
Filesize
534KB
MD5e08257dba54a675925b5fe410fb044b6
SHA14a15b592c595bae0abe7a3b160c026805700c6b6
SHA25603ebf0bf1d1017311113a4a32b757a5ad415d29301ff1c736d504beba7244621
SHA51245a343389a78269a861f99e7b1cf72c6be384043b36491b330ff48f7c940d2bcecd3d2f688adfa5b77029f39cc745926960f50d5506025726a0437d4b94bc2c2
-
Filesize
8KB
MD59215015740c937980b6b53cee5087769
SHA1a0bfe95486944f1548620d4de472c3758e95d36a
SHA256a5390a297f14ef8f5be308009ec436d2a58598188dbb92d7299795a10ba1c541
SHA5125b9bbf1836466d803d3e160a38e10c8397aa3966c120ab6435a52b7d0a09eb664ef2172bf0e7e2de1cc3eae261167c9355fa7ac3b1b7e4504a7e07b82c4b90e2
-
Filesize
170KB
MD536e79d9c029304417b9e0a142eb22a42
SHA1ec3e50b99c320bf80cf990558da8707fbb52edab
SHA256b9b3b3630d78ed68c6cca1fb41fe51fa1626c6a58bd62387d824e344b8e451bb
SHA512d2732de13b780eff3c14a4122410f02395a2d1cc36f7c28f9d8a58f07cc20528860ff169d35ba72cb64f0f0d58ca98f5a8bd962447c33f637ef9e8a0fc3ae9c8