Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 21:33
Static task
static1
Behavioral task
behavioral1
Sample
Bitcoin Flash Sender.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Bitcoin Flash Sender.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Btc_Flashing_Latest_.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Btc_Flashing_Latest_.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Main.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Main.exe
Resource
win10v2004-20250217-en
General
-
Target
Main.exe
-
Size
723KB
-
MD5
da83861c41845595ac896a9ba8908166
-
SHA1
35fb04158b18389c0fa05d560b44d0c90b378bac
-
SHA256
88f0200e25ae48da6d87f5bb43c0b3ca9e3af0a55544a362a4c68fca967ab790
-
SHA512
b257db872b86fc9565222694a5bf6e74f6c825a107b3ebbc38a7e19e762b143c7ad86bce111c9eb9424d5f83fe5cb057f73456fd3c19e7f68b95acbc5fb72e90
-
SSDEEP
12288:tOhqsVIRb2yrFriBdD3aTbgLxLYjQbyGzs0yROS44MERXjI7Uh0TAXP6KH37gi:ohDsDhCU/gLijQbyGzs0yQaMKjI7kXjl
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7479631857:AAFuIUMNJYKHzJ3Bc9t4FSh9ZQXlqymhFnk/sendMessage?chat_id=6291749148
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
quasar
2.1.0.0
Office04
45.61.140.75:7812
VNM_MUTEX_DIBuVCpZfDcrHCFft2
-
encryption_key
q8RpA86xyuUHuOrxUGXa
-
install_name
Windows Security.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Service Host
-
subdirectory
SubDir
Signatures
-
Asyncrat family
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral6/files/0x000b000000023c53-6.dat disable_win_def behavioral6/memory/928-39-0x00000000002E0000-0x000000000036C000-memory.dmp disable_win_def -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" Windows Security.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection Windows Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Windows Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Windows Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" Windows Security.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Windows Security.exe -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral6/files/0x000b000000023c53-6.dat family_quasar behavioral6/memory/928-39-0x00000000002E0000-0x000000000036C000-memory.dmp family_quasar -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral6/files/0x0008000000023c99-26.dat family_stormkitty behavioral6/memory/1248-37-0x00000000001F0000-0x0000000000220000-memory.dmp family_stormkitty -
Stormkitty family
-
Venomrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral6/files/0x0008000000023c99-26.dat family_asyncrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation Windows Security.exe Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation Main.exe -
Executes dropped EXE 5 IoCs
pid Process 928 Windows Security.exe 1424 crack.exe 1248 svchost.exe 1944 Windows Security.exe 32 Windows Security.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features Windows Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Windows Security.exe -
Drops desktop.ini file(s) 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\6467b9d8f73dd277193be15ded3b8874\Admin@VETZEJGC_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\6467b9d8f73dd277193be15ded3b8874\Admin@VETZEJGC_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\6467b9d8f73dd277193be15ded3b8874\Admin@VETZEJGC_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\6467b9d8f73dd277193be15ded3b8874\Admin@VETZEJGC_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\6467b9d8f73dd277193be15ded3b8874\Admin@VETZEJGC_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\6467b9d8f73dd277193be15ded3b8874\Admin@VETZEJGC_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\6467b9d8f73dd277193be15ded3b8874\Admin@VETZEJGC_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\6467b9d8f73dd277193be15ded3b8874\Admin@VETZEJGC_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini svchost.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com 40 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4512 PING.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4472 cmd.exe 3664 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4888 timeout.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4512 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3156 schtasks.exe 4320 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 1196 powershell.exe 1196 powershell.exe 1248 svchost.exe 1248 svchost.exe 1248 svchost.exe 1248 svchost.exe 1248 svchost.exe 1248 svchost.exe 1248 svchost.exe 1248 svchost.exe 928 Windows Security.exe 928 Windows Security.exe 928 Windows Security.exe 928 Windows Security.exe 928 Windows Security.exe 928 Windows Security.exe 928 Windows Security.exe 1248 svchost.exe 1248 svchost.exe 1248 svchost.exe 1248 svchost.exe 1248 svchost.exe 1248 svchost.exe 1248 svchost.exe 1248 svchost.exe 1248 svchost.exe 1248 svchost.exe 1248 svchost.exe 1248 svchost.exe 1248 svchost.exe 1248 svchost.exe 1248 svchost.exe 32 Windows Security.exe 32 Windows Security.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1248 svchost.exe Token: SeDebugPrivilege 928 Windows Security.exe Token: SeDebugPrivilege 1196 powershell.exe Token: SeDebugPrivilege 1424 crack.exe Token: SeDebugPrivilege 1944 Windows Security.exe Token: SeDebugPrivilege 1944 Windows Security.exe Token: SeDebugPrivilege 32 Windows Security.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1944 Windows Security.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 840 wrote to memory of 928 840 Main.exe 83 PID 840 wrote to memory of 928 840 Main.exe 83 PID 840 wrote to memory of 928 840 Main.exe 83 PID 840 wrote to memory of 1424 840 Main.exe 84 PID 840 wrote to memory of 1424 840 Main.exe 84 PID 840 wrote to memory of 1424 840 Main.exe 84 PID 840 wrote to memory of 1248 840 Main.exe 85 PID 840 wrote to memory of 1248 840 Main.exe 85 PID 840 wrote to memory of 1248 840 Main.exe 85 PID 928 wrote to memory of 3156 928 Windows Security.exe 90 PID 928 wrote to memory of 3156 928 Windows Security.exe 90 PID 928 wrote to memory of 3156 928 Windows Security.exe 90 PID 928 wrote to memory of 1944 928 Windows Security.exe 92 PID 928 wrote to memory of 1944 928 Windows Security.exe 92 PID 928 wrote to memory of 1944 928 Windows Security.exe 92 PID 928 wrote to memory of 1196 928 Windows Security.exe 93 PID 928 wrote to memory of 1196 928 Windows Security.exe 93 PID 928 wrote to memory of 1196 928 Windows Security.exe 93 PID 1944 wrote to memory of 4320 1944 Windows Security.exe 95 PID 1944 wrote to memory of 4320 1944 Windows Security.exe 95 PID 1944 wrote to memory of 4320 1944 Windows Security.exe 95 PID 1424 wrote to memory of 3000 1424 crack.exe 97 PID 1424 wrote to memory of 3000 1424 crack.exe 97 PID 1424 wrote to memory of 3000 1424 crack.exe 97 PID 3000 wrote to memory of 4888 3000 cmd.exe 99 PID 3000 wrote to memory of 4888 3000 cmd.exe 99 PID 3000 wrote to memory of 4888 3000 cmd.exe 99 PID 928 wrote to memory of 1420 928 Windows Security.exe 104 PID 928 wrote to memory of 1420 928 Windows Security.exe 104 PID 928 wrote to memory of 1420 928 Windows Security.exe 104 PID 1420 wrote to memory of 2604 1420 cmd.exe 106 PID 1420 wrote to memory of 2604 1420 cmd.exe 106 PID 1420 wrote to memory of 2604 1420 cmd.exe 106 PID 1248 wrote to memory of 4472 1248 svchost.exe 109 PID 1248 wrote to memory of 4472 1248 svchost.exe 109 PID 1248 wrote to memory of 4472 1248 svchost.exe 109 PID 4472 wrote to memory of 3124 4472 cmd.exe 111 PID 4472 wrote to memory of 3124 4472 cmd.exe 111 PID 4472 wrote to memory of 3124 4472 cmd.exe 111 PID 4472 wrote to memory of 3664 4472 cmd.exe 112 PID 4472 wrote to memory of 3664 4472 cmd.exe 112 PID 4472 wrote to memory of 3664 4472 cmd.exe 112 PID 4472 wrote to memory of 3156 4472 cmd.exe 113 PID 4472 wrote to memory of 3156 4472 cmd.exe 113 PID 4472 wrote to memory of 3156 4472 cmd.exe 113 PID 1248 wrote to memory of 2232 1248 svchost.exe 114 PID 1248 wrote to memory of 2232 1248 svchost.exe 114 PID 1248 wrote to memory of 2232 1248 svchost.exe 114 PID 2232 wrote to memory of 1280 2232 cmd.exe 116 PID 2232 wrote to memory of 1280 2232 cmd.exe 116 PID 2232 wrote to memory of 1280 2232 cmd.exe 116 PID 2232 wrote to memory of 4872 2232 cmd.exe 117 PID 2232 wrote to memory of 4872 2232 cmd.exe 117 PID 2232 wrote to memory of 4872 2232 cmd.exe 117 PID 928 wrote to memory of 2436 928 Windows Security.exe 119 PID 928 wrote to memory of 2436 928 Windows Security.exe 119 PID 928 wrote to memory of 2436 928 Windows Security.exe 119 PID 2436 wrote to memory of 2076 2436 cmd.exe 121 PID 2436 wrote to memory of 2076 2436 cmd.exe 121 PID 2436 wrote to memory of 2076 2436 cmd.exe 121 PID 2436 wrote to memory of 4512 2436 cmd.exe 122 PID 2436 wrote to memory of 4512 2436 cmd.exe 122 PID 2436 wrote to memory of 4512 2436 cmd.exe 122 PID 2436 wrote to memory of 32 2436 cmd.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\Main.exe"C:\Users\Admin\AppData\Local\Temp\Main.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Roaming\Windows Security.exe"C:\Users\Admin\AppData\Roaming\Windows Security.exe"2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Service Host" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Windows Security.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3156
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Service Host" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe" /rl HIGHEST /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4320
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*4⤵
- System Location Discovery: System Language Discovery
PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0DtYeQ5NjDuF.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:2076
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4512
-
-
C:\Users\Admin\AppData\Roaming\Windows Security.exe"C:\Users\Admin\AppData\Roaming\Windows Security.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:32
-
-
-
-
C:\Users\Admin\AppData\Roaming\crack.exe"C:\Users\Admin\AppData\Roaming\crack.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp902A.tmp.cmd""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\timeout.exetimeout 44⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4888
-
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:3124
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3664
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵
- System Location Discovery: System Language Discovery
PID:3156
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:1280
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4872
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\6467b9d8f73dd277193be15ded3b8874\Admin@VETZEJGC_en-US\Browsers\Firefox\Bookmarks.txt
Filesize105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
C:\Users\Admin\AppData\Local\6467b9d8f73dd277193be15ded3b8874\Admin@VETZEJGC_en-US\System\Process.txt
Filesize4KB
MD50fb63652fc8299a127387529cf72bdb3
SHA1890e5dcd6b4497c6cf62a7ab47dd61db573523d2
SHA2562503de618ab6d3121be4e3360dc4e3e069b91dab7ebf357b75f9bcdef0a131f2
SHA5129d0705365b3623d669285553c409c7e58c68bee2097f6d753abea5fb2d2707a385e2f31c84a2143c864a77b38de1e36f4f27ad65776cca6f4f98fa79dc8ae089
-
Filesize
6B
MD5e5ef3a4279aebe7127e8f4782bc6b283
SHA1bfd9405e5dcbb1dc612637fa3d2f703dc24e3302
SHA2560f657c2fa6dc8c05deeb4e1a2db8f567a562ac62f9b74fe991a259ebbb36475c
SHA5120075d2c00d66e999fb82c41d66cdccf173af1bd1f5bbc8d18be7e7daaff0681bb1ae903b7ddec5fe27353b25f3ff8581a47bfb6193fc35562ccdf5d0af8db040
-
Filesize
1KB
MD510eab9c2684febb5327b6976f2047587
SHA1a12ed54146a7f5c4c580416aecb899549712449e
SHA256f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928
SHA5127e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50
-
Filesize
210B
MD5498b79559f166b7bf9908641e3c588e9
SHA169ce5b88fd9fce99a6756e6d8b88bd1374639238
SHA2569b85d79b3f8c54f77cc9e8388fcc33105692bf2461ca3a5266d1b04ef37c7583
SHA512052ca1e2283cf24192edd262075f670f3a421ce19b7fefff91e9c500381428b57ee66a538fce3f523d37add7223499b662e237793f0b1c89d1ec2adadec915e9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5.0MB
MD52af05c837619933dba8ef7413b504701
SHA1ccd925653d6c87816768b7f8c0592f88d30c7fb5
SHA2566f74c08b173af69de63ffa61dba097befc758e3108f2abc00e43bb7e563fa2cc
SHA512bbd711c89ccc3f0184e2e8686d1c285b1d28ef81889d049a5c8325f8c6a6f6b4ea938023af25d868a61517b2957951ed17ce94b07415aa0e324c22f0012d1f76
-
Filesize
151B
MD58bc95eaac9a883b4c9c21367dab4d440
SHA19411b51b28927738acae109797b3eeadff044639
SHA256b3407cf3dedadac2669a1ad969c33ffe0e31fa60e66c42277cb534db98f35a01
SHA51254c28f9acb5a69f474efcee6518541bffddb8f72c5e4697c1042d99d5d3fe1e9237215bc66b593f4e5123ae8af112bd8e44bab61ebf9d32e584714ef46725d7e
-
Filesize
534KB
MD5e08257dba54a675925b5fe410fb044b6
SHA14a15b592c595bae0abe7a3b160c026805700c6b6
SHA25603ebf0bf1d1017311113a4a32b757a5ad415d29301ff1c736d504beba7244621
SHA51245a343389a78269a861f99e7b1cf72c6be384043b36491b330ff48f7c940d2bcecd3d2f688adfa5b77029f39cc745926960f50d5506025726a0437d4b94bc2c2
-
Filesize
8KB
MD59215015740c937980b6b53cee5087769
SHA1a0bfe95486944f1548620d4de472c3758e95d36a
SHA256a5390a297f14ef8f5be308009ec436d2a58598188dbb92d7299795a10ba1c541
SHA5125b9bbf1836466d803d3e160a38e10c8397aa3966c120ab6435a52b7d0a09eb664ef2172bf0e7e2de1cc3eae261167c9355fa7ac3b1b7e4504a7e07b82c4b90e2
-
Filesize
170KB
MD536e79d9c029304417b9e0a142eb22a42
SHA1ec3e50b99c320bf80cf990558da8707fbb52edab
SHA256b9b3b3630d78ed68c6cca1fb41fe51fa1626c6a58bd62387d824e344b8e451bb
SHA512d2732de13b780eff3c14a4122410f02395a2d1cc36f7c28f9d8a58f07cc20528860ff169d35ba72cb64f0f0d58ca98f5a8bd962447c33f637ef9e8a0fc3ae9c8