Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
Bitcoin Flash Sender.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Bitcoin Flash Sender.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Btc_Flashing_Latest_.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Btc_Flashing_Latest_.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Main.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Main.exe
Resource
win10v2004-20250217-en
General
-
Target
Bitcoin Flash Sender.exe
-
Size
1.0MB
-
MD5
fe4cf784ce07deb238da9cfc876b2c1f
-
SHA1
855c8c3535dff682b86ed8a17ede5f4e8bd068f8
-
SHA256
2826ba31add950b8bad6c19805f8a6cf0efc4710ac35c54acb19afc09f72c057
-
SHA512
51c225d338dc5a1e07f94dffba252a05b84d198444ed174ee0d7aeaaa27729a76b1c2389eaa03447f3f1cea02bff13cc97190bb70687bd535dd3874e989d8c81
-
SSDEEP
24576:o7uzTHUpq1n4CBQpUOgyuiSjKg5tVlHmxtC/ulI4Xf:oKT0pk4CBQrg2jgGjlb
Malware Config
Extracted
xworm
5.0
185.252.232.158:7812
b0c5WZixE6SqaTDD
-
Install_directory
%AppData%
-
install_file
Windows Defender Security Service.exe
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
185.252.232.158:7812
64.23.232.116:7812
vsvf
-
delay
1
-
install
true
-
install_file
Windows Security Health Service.exe
-
install_folder
%AppData%
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7479631857:AAFuIUMNJYKHzJ3Bc9t4FSh9ZQXlqymhFnk/sendMessage?chat_id=6291749148
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
quasar
2.1.0.0
Office04
45.61.140.75:7812
VNM_MUTEX_DIBuVCpZfDcrHCFft2
-
encryption_key
q8RpA86xyuUHuOrxUGXa
-
install_name
Windows Security.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Service Host
-
subdirectory
SubDir
Signatures
-
Asyncrat family
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/files/0x0008000000023cbc-6.dat disable_win_def behavioral2/memory/468-63-0x0000000000AA0000-0x0000000000B2C000-memory.dmp disable_win_def -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023cc7-26.dat family_xworm behavioral2/memory/3376-52-0x0000000000430000-0x0000000000440000-memory.dmp family_xworm -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" Windows Security.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection Windows Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Windows Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Windows Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" Windows Security.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Windows Security.exe -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023cbc-6.dat family_quasar behavioral2/memory/468-63-0x0000000000AA0000-0x0000000000B2C000-memory.dmp family_quasar -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023cc8-38.dat family_stormkitty behavioral2/memory/452-64-0x00000000005A0000-0x00000000005D0000-memory.dmp family_stormkitty -
Stormkitty family
-
Venomrat family
-
Xworm family
-
Async RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023cc8-38.dat family_asyncrat behavioral2/files/0x0007000000023cc9-47.dat family_asyncrat -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation Windows Defender Security Service.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation Windows Security.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation Bitcoin Flash Sender.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation Cracked.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender Security Service.lnk Windows Defender Security Service.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender Security Service.lnk Windows Defender Security Service.exe -
Executes dropped EXE 11 IoCs
pid Process 468 Windows Security.exe 4640 crack.exe 3376 Windows Defender Security Service.exe 452 svchost.exe 1868 Cracked.exe 720 Windows Security.exe 3920 Windows Security Health Service.exe 5116 Windows Defender Security Service.exe 4512 Windows Security.exe 1756 Windows Defender Security Service.exe 4332 Windows Defender Security Service.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features Windows Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Windows Security.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender Security Service = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Defender Security Service.exe" Windows Defender Security Service.exe -
Drops desktop.ini file(s) 8 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\613c02d236243ed132f290e75267d273\Admin@FRAVVDAE_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\613c02d236243ed132f290e75267d273\Admin@FRAVVDAE_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\613c02d236243ed132f290e75267d273\Admin@FRAVVDAE_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\613c02d236243ed132f290e75267d273\Admin@FRAVVDAE_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\613c02d236243ed132f290e75267d273\Admin@FRAVVDAE_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\613c02d236243ed132f290e75267d273\Admin@FRAVVDAE_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Local\613c02d236243ed132f290e75267d273\Admin@FRAVVDAE_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\613c02d236243ed132f290e75267d273\Admin@FRAVVDAE_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini svchost.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com 46 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2264 PING.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 3996 cmd.exe 4320 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3000 timeout.exe 2752 timeout.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2264 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4860 schtasks.exe 324 schtasks.exe 1600 schtasks.exe 1412 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3376 Windows Defender Security Service.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 1868 Cracked.exe 4056 powershell.exe 4056 powershell.exe 3376 Windows Defender Security Service.exe 3376 Windows Defender Security Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe 3920 Windows Security Health Service.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 3376 Windows Defender Security Service.exe Token: SeDebugPrivilege 1868 Cracked.exe Token: SeDebugPrivilege 452 svchost.exe Token: SeDebugPrivilege 1868 Cracked.exe Token: SeDebugPrivilege 468 Windows Security.exe Token: SeDebugPrivilege 4640 crack.exe Token: SeDebugPrivilege 4056 powershell.exe Token: SeDebugPrivilege 720 Windows Security.exe Token: SeDebugPrivilege 3920 Windows Security Health Service.exe Token: SeDebugPrivilege 720 Windows Security.exe Token: SeDebugPrivilege 5116 Windows Defender Security Service.exe Token: SeDebugPrivilege 3920 Windows Security Health Service.exe Token: SeDebugPrivilege 4512 Windows Security.exe Token: SeDebugPrivilege 1756 Windows Defender Security Service.exe Token: SeDebugPrivilege 4332 Windows Defender Security Service.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3376 Windows Defender Security Service.exe 720 Windows Security.exe 3920 Windows Security Health Service.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4740 wrote to memory of 468 4740 Bitcoin Flash Sender.exe 85 PID 4740 wrote to memory of 468 4740 Bitcoin Flash Sender.exe 85 PID 4740 wrote to memory of 468 4740 Bitcoin Flash Sender.exe 85 PID 4740 wrote to memory of 4640 4740 Bitcoin Flash Sender.exe 86 PID 4740 wrote to memory of 4640 4740 Bitcoin Flash Sender.exe 86 PID 4740 wrote to memory of 4640 4740 Bitcoin Flash Sender.exe 86 PID 4740 wrote to memory of 3376 4740 Bitcoin Flash Sender.exe 87 PID 4740 wrote to memory of 3376 4740 Bitcoin Flash Sender.exe 87 PID 4740 wrote to memory of 452 4740 Bitcoin Flash Sender.exe 88 PID 4740 wrote to memory of 452 4740 Bitcoin Flash Sender.exe 88 PID 4740 wrote to memory of 452 4740 Bitcoin Flash Sender.exe 88 PID 4740 wrote to memory of 1868 4740 Bitcoin Flash Sender.exe 89 PID 4740 wrote to memory of 1868 4740 Bitcoin Flash Sender.exe 89 PID 1868 wrote to memory of 1040 1868 Cracked.exe 92 PID 1868 wrote to memory of 1040 1868 Cracked.exe 92 PID 1868 wrote to memory of 2868 1868 Cracked.exe 94 PID 1868 wrote to memory of 2868 1868 Cracked.exe 94 PID 2868 wrote to memory of 3000 2868 cmd.exe 97 PID 2868 wrote to memory of 3000 2868 cmd.exe 97 PID 1040 wrote to memory of 4860 1040 cmd.exe 98 PID 1040 wrote to memory of 4860 1040 cmd.exe 98 PID 468 wrote to memory of 324 468 Windows Security.exe 100 PID 468 wrote to memory of 324 468 Windows Security.exe 100 PID 468 wrote to memory of 324 468 Windows Security.exe 100 PID 468 wrote to memory of 720 468 Windows Security.exe 102 PID 468 wrote to memory of 720 468 Windows Security.exe 102 PID 468 wrote to memory of 720 468 Windows Security.exe 102 PID 468 wrote to memory of 4056 468 Windows Security.exe 103 PID 468 wrote to memory of 4056 468 Windows Security.exe 103 PID 468 wrote to memory of 4056 468 Windows Security.exe 103 PID 3376 wrote to memory of 1600 3376 Windows Defender Security Service.exe 105 PID 3376 wrote to memory of 1600 3376 Windows Defender Security Service.exe 105 PID 4640 wrote to memory of 3540 4640 crack.exe 107 PID 4640 wrote to memory of 3540 4640 crack.exe 107 PID 4640 wrote to memory of 3540 4640 crack.exe 107 PID 720 wrote to memory of 1412 720 Windows Security.exe 109 PID 720 wrote to memory of 1412 720 Windows Security.exe 109 PID 720 wrote to memory of 1412 720 Windows Security.exe 109 PID 3540 wrote to memory of 2752 3540 cmd.exe 111 PID 3540 wrote to memory of 2752 3540 cmd.exe 111 PID 3540 wrote to memory of 2752 3540 cmd.exe 111 PID 2868 wrote to memory of 3920 2868 cmd.exe 112 PID 2868 wrote to memory of 3920 2868 cmd.exe 112 PID 468 wrote to memory of 4552 468 Windows Security.exe 118 PID 468 wrote to memory of 4552 468 Windows Security.exe 118 PID 468 wrote to memory of 4552 468 Windows Security.exe 118 PID 4552 wrote to memory of 3864 4552 cmd.exe 120 PID 4552 wrote to memory of 3864 4552 cmd.exe 120 PID 4552 wrote to memory of 3864 4552 cmd.exe 120 PID 452 wrote to memory of 3996 452 svchost.exe 123 PID 452 wrote to memory of 3996 452 svchost.exe 123 PID 452 wrote to memory of 3996 452 svchost.exe 123 PID 3996 wrote to memory of 644 3996 cmd.exe 125 PID 3996 wrote to memory of 644 3996 cmd.exe 125 PID 3996 wrote to memory of 644 3996 cmd.exe 125 PID 3996 wrote to memory of 4320 3996 cmd.exe 126 PID 3996 wrote to memory of 4320 3996 cmd.exe 126 PID 3996 wrote to memory of 4320 3996 cmd.exe 126 PID 3996 wrote to memory of 672 3996 cmd.exe 127 PID 3996 wrote to memory of 672 3996 cmd.exe 127 PID 3996 wrote to memory of 672 3996 cmd.exe 127 PID 452 wrote to memory of 4776 452 svchost.exe 128 PID 452 wrote to memory of 4776 452 svchost.exe 128 PID 452 wrote to memory of 4776 452 svchost.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bitcoin Flash Sender.exe"C:\Users\Admin\AppData\Local\Temp\Bitcoin Flash Sender.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Roaming\Windows Security.exe"C:\Users\Admin\AppData\Roaming\Windows Security.exe"2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Service Host" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Windows Security.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:324
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Service Host" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe" /rl HIGHEST /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1412
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*4⤵
- System Location Discovery: System Language Discovery
PID:3864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EQWtvTNcYEp8.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4332 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:1176
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2264
-
-
C:\Users\Admin\AppData\Roaming\Windows Security.exe"C:\Users\Admin\AppData\Roaming\Windows Security.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
-
-
C:\Users\Admin\AppData\Roaming\crack.exe"C:\Users\Admin\AppData\Roaming\crack.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpECE0.tmp.cmd""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\timeout.exetimeout 44⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2752
-
-
-
-
C:\Users\Admin\AppData\Roaming\Windows Defender Security Service.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Security Service.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Defender Security Service" /tr "C:\Users\Admin\AppData\Roaming\Windows Defender Security Service.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1600
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:644
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4320
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵
- System Location Discovery: System Language Discovery
PID:672
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵
- System Location Discovery: System Language Discovery
PID:4776 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:4628
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2256
-
-
-
-
C:\Users\Admin\AppData\Roaming\Cracked.exe"C:\Users\Admin\AppData\Roaming\Cracked.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows Security Health Service" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows Security Health Service" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:4860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpE762.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:3000
-
-
C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3920
-
-
-
-
C:\Users\Admin\AppData\Roaming\Windows Defender Security Service.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Security Service.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
C:\Users\Admin\AppData\Roaming\Windows Defender Security Service.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Security Service.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
C:\Users\Admin\AppData\Roaming\Windows Defender Security Service.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Security Service.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4332
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Query Registry
3Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6B
MD52cc4dd39fd5bb26ff6deb47b849fa1df
SHA1b45a557e6f4490f282cbd8d3317dde09dae54e03
SHA25636582bf27906553b86102a5a6922abf9cdd364c1db85b1b69fdd0565b84d0280
SHA51223334d17ddd7f40bb3d1310fd2bde9a0274ebbe7cd39f3087e817607dbda3f7f666ab710b9a8349d98de8073390c9db1dd6a02e9c8b31c974688e2b068f0c2ba
-
C:\Users\Admin\AppData\Local\613c02d236243ed132f290e75267d273\Admin@FRAVVDAE_en-US\Browsers\Firefox\Bookmarks.txt
Filesize105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
C:\Users\Admin\AppData\Local\613c02d236243ed132f290e75267d273\Admin@FRAVVDAE_en-US\System\Process.txt
Filesize4KB
MD579c7083a52c6ed13bf1e6663eaad2ffe
SHA1476710dfdac62b1c59158906d37c975a1fd80133
SHA2565262b2fe0455bb19d0ad3daf60ead0400a0ad29467d324c8ff27c2410a0f2feb
SHA51205f4d5df0d5f2df6e015669092d273cb590b08d2a220b666df88116c5db52dc0f79aeacc204786bbe8253ee0caef1712e63cdf1409c08b0e4ccbade07207a755
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
1KB
MD510eab9c2684febb5327b6976f2047587
SHA1a12ed54146a7f5c4c580416aecb899549712449e
SHA256f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928
SHA5127e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50
-
Filesize
210B
MD54a1d27383918017876485eedf161333b
SHA10bd8a4e40dbcf3d09f9f7bb80f87ac7d3b7e3150
SHA256d9c698fdd8426b88aced56bb5d9ba334c04f5a3180d2fce45a363309e8103f5c
SHA512f52d7bf792594985774dbe8507bca05ea2b1940d155c5f4aa1803c1d6bb941880f4b5856a9f9d0892a7f270cfd916647b83e44cffe3d5fa0a08a5e52823a862b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5.0MB
MD5272808b33c7ad60a7c2cd5f4b26674f2
SHA12c16795c74d5e5cfd9f79bcdba42bb4f6fea5ec5
SHA2568dfd5bd51acacc69dde78fe280ecf0685f8ec281d790cd2409dd4c593eaeefbb
SHA5122cac1bde55d82ac119fb1e057b71435dd6ff1035336a83b785a61d51183afbae6a539aa2c11dfb031cb27ffbbaa04f4c78e99ab4a77c588e6239d52f89bc9aae
-
Filesize
175B
MD5fef240acb91312a3ea81ee5b8883e9c1
SHA127dc22651d7ce7c300a99584d46cd3e42f52e5d1
SHA2561ee350b1d4ccf6372ac09053ab344f269ed59401bced20d9c881050e84c8535d
SHA51213c426d46063216c3ad9599f10e8839f8efdbd51d504ef0e792c95e36fcad83a87cd12ed62a980b6f5dde83be43cb501348584788ce518cd4ce390691a3be78c
-
Filesize
151B
MD568257dc16feca29d24e2fd7bd364f902
SHA16a7d12a34d411f0b963b75fab7560d690a98f4a8
SHA256cf49b1b81f41b6b216fa3d48a2d03ff6bbc807de8c18bc32630035a76d68dcda
SHA5125d6f45f6be507298e403e0bfd624419b8630fb06078d03caef07c9600008da3b3f2fbd60ff72901912a3ca63ed6e8bbf845cb60b8f443ec8f237da3e2abd9052
-
Filesize
74KB
MD50dfa83a82f6418c73406d78296de61be
SHA1dd7eceef8a434c43e0751e180bf714e08771d336
SHA2568d27369ffa8b29d561fa9daf485be14d2fc00287bb1c69d4c84d514891c8db5e
SHA5129a4b026250b18c29ab7dd48203f321c2ef2f12695bd2dcb52ebbc15001c8ddf019d5a7e04da056c50c1881ce269d1810259bf6d04b61f471e8751b7192fc73d4
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
42KB
MD57a5ea6a11fdb03f789a2246aa8ff1501
SHA15e1289096418c7f8b5901963c34c89f9902cbbba
SHA256bde45f854d6c434717ea7b59587e020c2403123728c49deb56cba8132de5e96a
SHA512cfca94f3d78675bbe56f02119e3943f7067898d7b7d14e91bca7220a235665363f69930acdeb9f7df388a49a6b62812bcf74bbffad20a96915257b54c4e78a73
-
Filesize
534KB
MD5e08257dba54a675925b5fe410fb044b6
SHA14a15b592c595bae0abe7a3b160c026805700c6b6
SHA25603ebf0bf1d1017311113a4a32b757a5ad415d29301ff1c736d504beba7244621
SHA51245a343389a78269a861f99e7b1cf72c6be384043b36491b330ff48f7c940d2bcecd3d2f688adfa5b77029f39cc745926960f50d5506025726a0437d4b94bc2c2
-
Filesize
8KB
MD59215015740c937980b6b53cee5087769
SHA1a0bfe95486944f1548620d4de472c3758e95d36a
SHA256a5390a297f14ef8f5be308009ec436d2a58598188dbb92d7299795a10ba1c541
SHA5125b9bbf1836466d803d3e160a38e10c8397aa3966c120ab6435a52b7d0a09eb664ef2172bf0e7e2de1cc3eae261167c9355fa7ac3b1b7e4504a7e07b82c4b90e2
-
Filesize
170KB
MD536e79d9c029304417b9e0a142eb22a42
SHA1ec3e50b99c320bf80cf990558da8707fbb52edab
SHA256b9b3b3630d78ed68c6cca1fb41fe51fa1626c6a58bd62387d824e344b8e451bb
SHA512d2732de13b780eff3c14a4122410f02395a2d1cc36f7c28f9d8a58f07cc20528860ff169d35ba72cb64f0f0d58ca98f5a8bd962447c33f637ef9e8a0fc3ae9c8