Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
86073e6097e1ff9e879b0eb493f173f2.exe
Resource
win7-20241010-en
General
-
Target
86073e6097e1ff9e879b0eb493f173f2.exe
-
Size
726KB
-
MD5
86073e6097e1ff9e879b0eb493f173f2
-
SHA1
f06a1f7c37604244a80c61a2a22d1686f05626d9
-
SHA256
c3e019a0502617286408630187c0e19eb146ee3d70e0b9e0390d9e3763e041bc
-
SHA512
f3ef06f22a8c0d0894e66a25a1f6eca5d8243103b914001a430b3388d34f8c395c320c2e5827ed56c881f52added7461979211c474ebc8444e03610249fe7725
-
SSDEEP
12288:x/Sp50g7ZeK50g7M1ogf3OKoHdML29Tod5iJRZbvLgC5cJnY/XUr6xIgno8g50g7:Yp5F7AK5F7w/rL5iNbv7OsUr6xIgno5T
Malware Config
Extracted
nanocore
1.2.2.0
elroithegodofnsppd.duckdns.org:43366
elroithegodofnsppd.ddnsfree.com:43366
4991469e-2d84-4048-8aed-20a53304961e
-
activate_away_mode
false
-
backup_connection_host
elroithegodofnsppd.ddnsfree.com
- backup_dns_server
-
buffer_size
65538
-
build_time
2024-12-06T15:16:37.862063536Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
43366
-
default_group
EROI MY GOD
-
enable_debug_mode
true
-
gc_threshold
1.0485772e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.0485772e+07
-
mutex
4991469e-2d84-4048-8aed-20a53304961e
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
elroithegodofnsppd.duckdns.org
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
false
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8009
Extracted
xworm
5.0
tunhost.duckdns.org:57891
wintun.freemyip.com:57891
87.249.134.68:57891
-
install_file
琀㴀Ā ☀☀ �䔗渀瘀椀爀漀渀洀攀渀琀�眍椀渀搀椀爀�瀝漀眀攀爀猀栀攀氀氀⸀攀砀攀�醀-C schtasks.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/memory/1516-109-0x00000000067C0000-0x0000000006804000-memory.dmp family_xworm behavioral2/files/0x000c000000023bfd-116.dat family_xworm behavioral2/memory/2116-118-0x00000000004D0000-0x00000000004DE000-memory.dmp family_xworm -
Nanocore family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Xmrig family
-
Xworm family
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/4020-144-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4020-150-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4020-148-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4020-149-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4020-147-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4020-146-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4020-143-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4020-151-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4020-152-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4020-153-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4020-154-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4020-155-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 676 powershell.exe 4720 powershell.exe -
Creates new service(s) 2 TTPs
-
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winlogon.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation 86073e6097e1ff9e879b0eb493f173f2.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exe 86073e6097e1ff9e879b0eb493f173f2.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wanhost.exe 86073e6097e1ff9e879b0eb493f173f2.exe -
Executes dropped EXE 5 IoCs
pid Process 2108 winlogon.exe 2116 wanhost.exe 1872 system32.exe 3892 qshtkbttphgg.exe 1832 system32-checker.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\IMAP Subsystem = "C:\\Program Files (x86)\\IMAP Subsystem\\imapss.exe" 86073e6097e1ff9e879b0eb493f173f2.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 86073e6097e1ff9e879b0eb493f173f2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 81 raw.githubusercontent.com 80 raw.githubusercontent.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 72 checkip.amazonaws.com 73 checkip.amazonaws.com -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 468 powercfg.exe 2576 powercfg.exe 728 powercfg.exe 1180 powercfg.exe 4976 powercfg.exe 2196 powercfg.exe 3120 powercfg.exe 4152 powercfg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4820 set thread context of 1516 4820 86073e6097e1ff9e879b0eb493f173f2.exe 102 PID 3892 set thread context of 3324 3892 qshtkbttphgg.exe 147 PID 3892 set thread context of 4020 3892 qshtkbttphgg.exe 152 -
resource yara_rule behavioral2/memory/4020-139-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4020-144-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4020-150-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4020-148-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4020-149-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4020-147-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4020-146-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4020-143-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4020-142-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4020-141-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4020-138-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4020-140-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4020-151-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4020-152-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4020-153-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4020-154-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4020-155-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\IMAP Subsystem\imapss.exe 86073e6097e1ff9e879b0eb493f173f2.exe File opened for modification C:\Program Files (x86)\IMAP Subsystem\imapss.exe 86073e6097e1ff9e879b0eb493f173f2.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4772 sc.exe 2696 sc.exe 1216 sc.exe 4460 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86073e6097e1ff9e879b0eb493f173f2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86073e6097e1ff9e879b0eb493f173f2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 winlogon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier winlogon.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4084 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3604 schtasks.exe 1180 schtasks.exe 2572 schtasks.exe 4932 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 4820 86073e6097e1ff9e879b0eb493f173f2.exe 4720 powershell.exe 4720 powershell.exe 676 powershell.exe 676 powershell.exe 4820 86073e6097e1ff9e879b0eb493f173f2.exe 4820 86073e6097e1ff9e879b0eb493f173f2.exe 4720 powershell.exe 676 powershell.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 1516 86073e6097e1ff9e879b0eb493f173f2.exe 2108 winlogon.exe 2108 winlogon.exe 2108 winlogon.exe 1872 system32.exe 1872 system32.exe 1872 system32.exe 1872 system32.exe 1872 system32.exe 1872 system32.exe 1872 system32.exe 1872 system32.exe 3892 qshtkbttphgg.exe 3892 qshtkbttphgg.exe 3892 qshtkbttphgg.exe 3892 qshtkbttphgg.exe 3892 qshtkbttphgg.exe 3892 qshtkbttphgg.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1516 86073e6097e1ff9e879b0eb493f173f2.exe 2108 winlogon.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 2108 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 4820 86073e6097e1ff9e879b0eb493f173f2.exe Token: SeDebugPrivilege 676 powershell.exe Token: SeDebugPrivilege 4720 powershell.exe Token: SeDebugPrivilege 1516 86073e6097e1ff9e879b0eb493f173f2.exe Token: SeDebugPrivilege 1516 86073e6097e1ff9e879b0eb493f173f2.exe Token: SeDebugPrivilege 2108 winlogon.exe Token: SeDebugPrivilege 2108 winlogon.exe Token: SeDebugPrivilege 2116 wanhost.exe Token: SeDebugPrivilege 1872 system32.exe Token: SeShutdownPrivilege 2576 powercfg.exe Token: SeCreatePagefilePrivilege 2576 powercfg.exe Token: SeShutdownPrivilege 728 powercfg.exe Token: SeCreatePagefilePrivilege 728 powercfg.exe Token: SeShutdownPrivilege 468 powercfg.exe Token: SeCreatePagefilePrivilege 468 powercfg.exe Token: SeShutdownPrivilege 1180 powercfg.exe Token: SeCreatePagefilePrivilege 1180 powercfg.exe Token: SeDebugPrivilege 3892 qshtkbttphgg.exe Token: SeShutdownPrivilege 4976 powercfg.exe Token: SeCreatePagefilePrivilege 4976 powercfg.exe Token: SeShutdownPrivilege 3120 powercfg.exe Token: SeCreatePagefilePrivilege 3120 powercfg.exe Token: SeLockMemoryPrivilege 4020 explorer.exe Token: SeShutdownPrivilege 2196 powercfg.exe Token: SeCreatePagefilePrivilege 2196 powercfg.exe Token: SeShutdownPrivilege 4152 powercfg.exe Token: SeCreatePagefilePrivilege 4152 powercfg.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 4820 wrote to memory of 4720 4820 86073e6097e1ff9e879b0eb493f173f2.exe 96 PID 4820 wrote to memory of 4720 4820 86073e6097e1ff9e879b0eb493f173f2.exe 96 PID 4820 wrote to memory of 4720 4820 86073e6097e1ff9e879b0eb493f173f2.exe 96 PID 4820 wrote to memory of 676 4820 86073e6097e1ff9e879b0eb493f173f2.exe 98 PID 4820 wrote to memory of 676 4820 86073e6097e1ff9e879b0eb493f173f2.exe 98 PID 4820 wrote to memory of 676 4820 86073e6097e1ff9e879b0eb493f173f2.exe 98 PID 4820 wrote to memory of 3604 4820 86073e6097e1ff9e879b0eb493f173f2.exe 100 PID 4820 wrote to memory of 3604 4820 86073e6097e1ff9e879b0eb493f173f2.exe 100 PID 4820 wrote to memory of 3604 4820 86073e6097e1ff9e879b0eb493f173f2.exe 100 PID 4820 wrote to memory of 1516 4820 86073e6097e1ff9e879b0eb493f173f2.exe 102 PID 4820 wrote to memory of 1516 4820 86073e6097e1ff9e879b0eb493f173f2.exe 102 PID 4820 wrote to memory of 1516 4820 86073e6097e1ff9e879b0eb493f173f2.exe 102 PID 4820 wrote to memory of 1516 4820 86073e6097e1ff9e879b0eb493f173f2.exe 102 PID 4820 wrote to memory of 1516 4820 86073e6097e1ff9e879b0eb493f173f2.exe 102 PID 4820 wrote to memory of 1516 4820 86073e6097e1ff9e879b0eb493f173f2.exe 102 PID 4820 wrote to memory of 1516 4820 86073e6097e1ff9e879b0eb493f173f2.exe 102 PID 4820 wrote to memory of 1516 4820 86073e6097e1ff9e879b0eb493f173f2.exe 102 PID 1516 wrote to memory of 1180 1516 86073e6097e1ff9e879b0eb493f173f2.exe 103 PID 1516 wrote to memory of 1180 1516 86073e6097e1ff9e879b0eb493f173f2.exe 103 PID 1516 wrote to memory of 1180 1516 86073e6097e1ff9e879b0eb493f173f2.exe 103 PID 1516 wrote to memory of 2572 1516 86073e6097e1ff9e879b0eb493f173f2.exe 105 PID 1516 wrote to memory of 2572 1516 86073e6097e1ff9e879b0eb493f173f2.exe 105 PID 1516 wrote to memory of 2572 1516 86073e6097e1ff9e879b0eb493f173f2.exe 105 PID 1516 wrote to memory of 2108 1516 86073e6097e1ff9e879b0eb493f173f2.exe 117 PID 1516 wrote to memory of 2108 1516 86073e6097e1ff9e879b0eb493f173f2.exe 117 PID 1516 wrote to memory of 2108 1516 86073e6097e1ff9e879b0eb493f173f2.exe 117 PID 1516 wrote to memory of 2116 1516 86073e6097e1ff9e879b0eb493f173f2.exe 118 PID 1516 wrote to memory of 2116 1516 86073e6097e1ff9e879b0eb493f173f2.exe 118 PID 1516 wrote to memory of 4084 1516 86073e6097e1ff9e879b0eb493f173f2.exe 119 PID 1516 wrote to memory of 4084 1516 86073e6097e1ff9e879b0eb493f173f2.exe 119 PID 1516 wrote to memory of 4084 1516 86073e6097e1ff9e879b0eb493f173f2.exe 119 PID 2108 wrote to memory of 2532 2108 winlogon.exe 121 PID 2108 wrote to memory of 2532 2108 winlogon.exe 121 PID 2108 wrote to memory of 2532 2108 winlogon.exe 121 PID 2108 wrote to memory of 4932 2108 winlogon.exe 123 PID 2108 wrote to memory of 4932 2108 winlogon.exe 123 PID 2108 wrote to memory of 4932 2108 winlogon.exe 123 PID 1516 wrote to memory of 1872 1516 86073e6097e1ff9e879b0eb493f173f2.exe 125 PID 1516 wrote to memory of 1872 1516 86073e6097e1ff9e879b0eb493f173f2.exe 125 PID 3892 wrote to memory of 3324 3892 qshtkbttphgg.exe 147 PID 3892 wrote to memory of 3324 3892 qshtkbttphgg.exe 147 PID 3892 wrote to memory of 3324 3892 qshtkbttphgg.exe 147 PID 3892 wrote to memory of 3324 3892 qshtkbttphgg.exe 147 PID 3892 wrote to memory of 3324 3892 qshtkbttphgg.exe 147 PID 3892 wrote to memory of 3324 3892 qshtkbttphgg.exe 147 PID 3892 wrote to memory of 3324 3892 qshtkbttphgg.exe 147 PID 3892 wrote to memory of 3324 3892 qshtkbttphgg.exe 147 PID 3892 wrote to memory of 3324 3892 qshtkbttphgg.exe 147 PID 3892 wrote to memory of 4020 3892 qshtkbttphgg.exe 152 PID 3892 wrote to memory of 4020 3892 qshtkbttphgg.exe 152 PID 3892 wrote to memory of 4020 3892 qshtkbttphgg.exe 152 PID 3892 wrote to memory of 4020 3892 qshtkbttphgg.exe 152 PID 3892 wrote to memory of 4020 3892 qshtkbttphgg.exe 152 PID 1516 wrote to memory of 1832 1516 86073e6097e1ff9e879b0eb493f173f2.exe 154 PID 1516 wrote to memory of 1832 1516 86073e6097e1ff9e879b0eb493f173f2.exe 154
Processes
-
C:\Users\Admin\AppData\Local\Temp\86073e6097e1ff9e879b0eb493f173f2.exe"C:\Users\Admin\AppData\Local\Temp\86073e6097e1ff9e879b0eb493f173f2.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\86073e6097e1ff9e879b0eb493f173f2.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4720
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\AOhdPA.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AOhdPA" /XML "C:\Users\Admin\AppData\Local\Temp\tmp37E4.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3604
-
-
C:\Users\Admin\AppData\Local\Temp\86073e6097e1ff9e879b0eb493f173f2.exe"C:\Users\Admin\AppData\Local\Temp\86073e6097e1ff9e879b0eb493f173f2.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "IMAP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp3C97.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1180
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "IMAP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp4254.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2572
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /delete /f /tn "Microsoft\Windows\Client Server Runtime Process"4⤵
- System Location Discovery: System Language Discovery
PID:2532
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "Microsoft\Windows\Client Server Runtime Process" /xml "C:\Users\Admin\AppData\Local\Temp\tmp6FD7.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4932
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wanhost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wanhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Windows\SysWOW64\reg.exe"reg.exe" ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4084
-
-
C:\Users\Admin\AppData\Local\system32.exe"C:\Users\Admin\AppData\Local\system32.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:468
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:728
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "AHMOQNZH"4⤵
- Launches sc.exe
PID:2696
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "AHMOQNZH" binpath= "C:\ProgramData\ipbodjvyupmv\qshtkbttphgg.exe" start= "auto"4⤵
- Launches sc.exe
PID:1216
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:4460
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "AHMOQNZH"4⤵
- Launches sc.exe
PID:4772
-
-
-
C:\Users\Admin\AppData\Local\system32-checker.exe"C:\Users\Admin\AppData\Local\system32-checker.exe"3⤵
- Executes dropped EXE
PID:1832
-
-
-
C:\ProgramData\ipbodjvyupmv\qshtkbttphgg.exeC:\ProgramData\ipbodjvyupmv\qshtkbttphgg.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:3324
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5f21b1cf2eefbe6310caf09c130965dfd
SHA116c2102bba1481b858d7b9c2e4da802357686d43
SHA256998a981f0bb25dd7aba5ce02cbe4f6d08400b41cf0a3eff4eb2efecff7604836
SHA51248dcfd5cd7be19297a44eed477ea86dfdca18f4677a086acae1c64820ea5ff17d12d38d7a82c533e4c913d2f8b54864fb0808edf5802de18491a46b7e1955b5a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD59b37acf7e80a051b5b1a98068b92b569
SHA1f83dee35fec38532780a930a1e6225a6646d5c58
SHA256cc518b15293409b1644912b5a95646508588836405ea29a70921459c314df44f
SHA512653ee3f517c4c10ec3e6eb1313811d9eecbe34172c66d0fa8c68c4820904df18e2dd250601a591099463ed7d4c2a8416f34693b62068f0c5414d334af2cb0780
-
Filesize
1KB
MD57e7e4a390fe8f14dadd0e9ff2bfc5dc0
SHA18aa3bb41f555d92aab1e917ba5eaf03b96d05017
SHA25690344f0ce614dee4fb8bec55db91e7bc34efb2ab507e94083df006b98b0ff534
SHA512cb1cd9e8938e877bf476dcec09bdbc00ec6e89695a1c0bb3a35c73dd2f61af40bec7d48c6c58c1201eef108a458f68804de497dafcdd5a25b2a672745841429b
-
Filesize
1KB
MD54a0b600dc69a91b7134c8cedda9e49d3
SHA1788e74e33a9dc48a45074b7226730a299352f2ef
SHA256113b96e45fb075b17d381d3933db3eb2afcd1d08f7066a27b701ed9efd6c55f7
SHA512e2c7b7ad53ae28f895bbc8f5781b4748af1998832e6f6dadca77a961a123fc5507f84ddac3f1c6851a80d279416485515a7bd1798053aee5ff38e62ce4c7c44c
-
Filesize
1KB
MD555f737e134714dd479fb8d4417a14df5
SHA14195b4131fb1215140baaaf5a6d8e26f305572af
SHA256f306ee4e70a9dd3281131c476541b78f8cbe387a8a507f3b98a48ef34ecf2835
SHA512446fa2af1cfb7057fd96fbaa26b4dcec67427399c8859c85ed11d5fb7b64f6abca39581faa2f17ca32c5e57759a448266d4be6af39e730d5e596cc41701fd1bf
-
Filesize
6KB
MD57c1867586dfd01366878ae08415c612c
SHA14526353fbb9b8be77f3c0f46778a740f84882f83
SHA256521f29dd7236b22daba7ea9537ef6be31057a08eec9526805b4685d7970e1372
SHA512ef4ff7128de21fcdec5019322247ae958b46c2ff20b36d65f32fd6921e2f7c7bd018168fb3a7c0c728f071160057c790b3d5b691aad24cd5ebd975e7abc409ba
-
Filesize
2.5MB
MD5a5c4e57922031e587bf09fb90453d73e
SHA14bc3a265800ef4f7df8402292d8218553b2860b6
SHA2563720ffed8da2ba9d4cabbe64331f939f36e750e7dd3d5b9ff4d937325b35543b
SHA5120fd81c9ca1ea8587fa33f2da3f45896b9d22e9f8a014513316274674a4256a4f04654462ed4ed87021e999964c895734aa2814e5a37f23a2010c594ad113a491
-
Filesize
32KB
MD5bb88af07d7f92e77086eb2a090b508fd
SHA12fcf43147b61ed5c8e1d7d46398eb3749e649e78
SHA25677ce6f10d6034a1d7ab7768278cf8322b719729f612e6afe8cff72cb637cd6ec
SHA5127a41def72de640dbf057c41971b02213e75202a1863b41491e36644da17bcbfb16c41ae6c6af121b5b2f7fee4f0608f867a404f1bbbf8db5dc9444978868f7c3
-
Filesize
191KB
MD5ed3b00caa7c83ab730df4a14aeb5d6bf
SHA1453eeebd3cd4a0faf5e7eca63ea6cdb0ed96971a
SHA256456b4cf130884ff7283aa415425ff6e3f6c610211bc7504e41bba9346dacd827
SHA512fb64f0d53215cfcbd18f9de977e2f41323192b9329e67f7c26f53692970a2688f0a6a80f836c073945404e84364620f49790b22499bbf65c904341b90ccba954