Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2025, 19:26
Static task
static1
Behavioral task
behavioral1
Sample
injector.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
injector.msi
Resource
win10v2004-20250217-en
General
-
Target
injector.msi
-
Size
1.2MB
-
MD5
f2ab259a57ce31c7a61cdb4266f28a58
-
SHA1
91569473b6fea4dc90541e25d2239cf7b1ade8ae
-
SHA256
2d6e6b6590d2541da93aaf4690fec839fc56fbabcbd110d18f3d53ae4105c012
-
SHA512
bec918973d2aa44411b5ff1c003a50180dc50b9c19f3fa23776337e99d94757c4c0ec39b39cb4d1bc5fb5c68675b45a2c26eb5e45aaea67479c88161e3be8353
-
SSDEEP
24576:gt9cpVDhtnJlL52UoehMFc+8CrgyZRcO/WrtrDFJIGL5UGWq:/pRhtJB5RbKF7nzZ0ZJb
Malware Config
Extracted
xworm
-
Install_directory
%Userprofile%
-
install_file
injector.exe
-
pastebin_url
https://pastebin.com/raw/DSFaHH8B
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023d76-88.dat family_xworm behavioral2/memory/5448-97-0x0000000000CC0000-0x0000000000CD4000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 724 powershell.exe 4244 powershell.exe 4652 powershell.exe 6128 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\injector.lnk clienthook.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\injector.lnk clienthook.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 5680 ICACLS.EXE 4928 ICACLS.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\injector = "C:\\Users\\Admin\\injector.exe" clienthook.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 39 pastebin.com 40 pastebin.com -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation injector.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation clienthook.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI2F29.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3564.tmp msiexec.exe File created C:\Windows\Installer\e582e6e.msi msiexec.exe File opened for modification C:\Windows\Installer\e582e6e.msi msiexec.exe File created C:\Windows\Installer\SourceHash{E215C676-3483-4D54-958D-A4ADB281BAE8} msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\LOGS\DPX\setupact.log EXPAND.EXE File opened for modification C:\Windows\LOGS\DPX\setuperr.log EXPAND.EXE File opened for modification C:\Windows\Installer\MSI3565.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe -
Executes dropped EXE 5 IoCs
pid Process 3116 injector.exe 5228 WindowsServiceHost.exe 5448 clienthook.exe 4508 injector.exe 3188 injector.exe -
Loads dropped DLL 2 IoCs
pid Process 5636 MsiExec.exe 5636 MsiExec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 2544 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPAND.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ICACLS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ICACLS.EXE -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2044 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1268 msiexec.exe 1268 msiexec.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 724 powershell.exe 724 powershell.exe 724 powershell.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 4244 powershell.exe 4244 powershell.exe 4244 powershell.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 4652 powershell.exe 4652 powershell.exe 4652 powershell.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 6128 powershell.exe 6128 powershell.exe 6128 powershell.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5448 clienthook.exe 5448 clienthook.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe 5228 WindowsServiceHost.exe -
Suspicious use of AdjustPrivilegeToken 61 IoCs
description pid Process Token: SeShutdownPrivilege 2544 msiexec.exe Token: SeIncreaseQuotaPrivilege 2544 msiexec.exe Token: SeSecurityPrivilege 1268 msiexec.exe Token: SeCreateTokenPrivilege 2544 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2544 msiexec.exe Token: SeLockMemoryPrivilege 2544 msiexec.exe Token: SeIncreaseQuotaPrivilege 2544 msiexec.exe Token: SeMachineAccountPrivilege 2544 msiexec.exe Token: SeTcbPrivilege 2544 msiexec.exe Token: SeSecurityPrivilege 2544 msiexec.exe Token: SeTakeOwnershipPrivilege 2544 msiexec.exe Token: SeLoadDriverPrivilege 2544 msiexec.exe Token: SeSystemProfilePrivilege 2544 msiexec.exe Token: SeSystemtimePrivilege 2544 msiexec.exe Token: SeProfSingleProcessPrivilege 2544 msiexec.exe Token: SeIncBasePriorityPrivilege 2544 msiexec.exe Token: SeCreatePagefilePrivilege 2544 msiexec.exe Token: SeCreatePermanentPrivilege 2544 msiexec.exe Token: SeBackupPrivilege 2544 msiexec.exe Token: SeRestorePrivilege 2544 msiexec.exe Token: SeShutdownPrivilege 2544 msiexec.exe Token: SeDebugPrivilege 2544 msiexec.exe Token: SeAuditPrivilege 2544 msiexec.exe Token: SeSystemEnvironmentPrivilege 2544 msiexec.exe Token: SeChangeNotifyPrivilege 2544 msiexec.exe Token: SeRemoteShutdownPrivilege 2544 msiexec.exe Token: SeUndockPrivilege 2544 msiexec.exe Token: SeSyncAgentPrivilege 2544 msiexec.exe Token: SeEnableDelegationPrivilege 2544 msiexec.exe Token: SeManageVolumePrivilege 2544 msiexec.exe Token: SeImpersonatePrivilege 2544 msiexec.exe Token: SeCreateGlobalPrivilege 2544 msiexec.exe Token: SeBackupPrivilege 6016 vssvc.exe Token: SeRestorePrivilege 6016 vssvc.exe Token: SeAuditPrivilege 6016 vssvc.exe Token: SeBackupPrivilege 1268 msiexec.exe Token: SeRestorePrivilege 1268 msiexec.exe Token: SeRestorePrivilege 1268 msiexec.exe Token: SeTakeOwnershipPrivilege 1268 msiexec.exe Token: SeRestorePrivilege 1268 msiexec.exe Token: SeTakeOwnershipPrivilege 1268 msiexec.exe Token: SeBackupPrivilege 3516 srtasks.exe Token: SeRestorePrivilege 3516 srtasks.exe Token: SeSecurityPrivilege 3516 srtasks.exe Token: SeTakeOwnershipPrivilege 3516 srtasks.exe Token: SeDebugPrivilege 5448 clienthook.exe Token: SeRestorePrivilege 1268 msiexec.exe Token: SeTakeOwnershipPrivilege 1268 msiexec.exe Token: SeRestorePrivilege 1268 msiexec.exe Token: SeTakeOwnershipPrivilege 1268 msiexec.exe Token: SeBackupPrivilege 3516 srtasks.exe Token: SeRestorePrivilege 3516 srtasks.exe Token: SeSecurityPrivilege 3516 srtasks.exe Token: SeTakeOwnershipPrivilege 3516 srtasks.exe Token: SeDebugPrivilege 724 powershell.exe Token: SeDebugPrivilege 4244 powershell.exe Token: SeDebugPrivilege 4652 powershell.exe Token: SeDebugPrivilege 6128 powershell.exe Token: SeDebugPrivilege 5448 clienthook.exe Token: SeDebugPrivilege 4508 injector.exe Token: SeDebugPrivilege 3188 injector.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2544 msiexec.exe 2544 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5448 clienthook.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1268 wrote to memory of 3516 1268 msiexec.exe 98 PID 1268 wrote to memory of 3516 1268 msiexec.exe 98 PID 1268 wrote to memory of 5636 1268 msiexec.exe 100 PID 1268 wrote to memory of 5636 1268 msiexec.exe 100 PID 1268 wrote to memory of 5636 1268 msiexec.exe 100 PID 5636 wrote to memory of 4928 5636 MsiExec.exe 101 PID 5636 wrote to memory of 4928 5636 MsiExec.exe 101 PID 5636 wrote to memory of 4928 5636 MsiExec.exe 101 PID 5636 wrote to memory of 2988 5636 MsiExec.exe 103 PID 5636 wrote to memory of 2988 5636 MsiExec.exe 103 PID 5636 wrote to memory of 2988 5636 MsiExec.exe 103 PID 5636 wrote to memory of 3116 5636 MsiExec.exe 105 PID 5636 wrote to memory of 3116 5636 MsiExec.exe 105 PID 3116 wrote to memory of 5228 3116 injector.exe 106 PID 3116 wrote to memory of 5228 3116 injector.exe 106 PID 3116 wrote to memory of 5448 3116 injector.exe 108 PID 3116 wrote to memory of 5448 3116 injector.exe 108 PID 5636 wrote to memory of 5680 5636 MsiExec.exe 109 PID 5636 wrote to memory of 5680 5636 MsiExec.exe 109 PID 5636 wrote to memory of 5680 5636 MsiExec.exe 109 PID 5448 wrote to memory of 724 5448 clienthook.exe 111 PID 5448 wrote to memory of 724 5448 clienthook.exe 111 PID 5448 wrote to memory of 4244 5448 clienthook.exe 113 PID 5448 wrote to memory of 4244 5448 clienthook.exe 113 PID 5448 wrote to memory of 4652 5448 clienthook.exe 115 PID 5448 wrote to memory of 4652 5448 clienthook.exe 115 PID 5448 wrote to memory of 6128 5448 clienthook.exe 117 PID 5448 wrote to memory of 6128 5448 clienthook.exe 117 PID 5448 wrote to memory of 2044 5448 clienthook.exe 119 PID 5448 wrote to memory of 2044 5448 clienthook.exe 119 PID 5448 wrote to memory of 2044 5448 clienthook.exe 119 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\injector.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2544
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding EFA142A3EBF8AA3D0239A689F3FA6A862⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5636 -
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-881766ba-66ba-4db2-9212-7f0eac072e43\." /SETINTEGRITYLEVEL (CI)(OI)HIGH3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4928
-
-
C:\Windows\SysWOW64\EXPAND.EXE"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\MW-881766ba-66ba-4db2-9212-7f0eac072e43\files\injector.exe"C:\Users\Admin\AppData\Local\Temp\MW-881766ba-66ba-4db2-9212-7f0eac072e43\files\injector.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Roaming\WindowsServiceHost.exe"C:\Users\Admin\AppData\Roaming\WindowsServiceHost.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5228
-
-
C:\Users\Admin\AppData\Roaming\clienthook.exe"C:\Users\Admin\AppData\Roaming\clienthook.exe"4⤵
- Drops startup file
- Adds Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5448 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\clienthook.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:724
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'clienthook.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4244
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\injector.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'injector.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6128
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "injector" /tr "C:\Users\Admin\injector.exe"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2044
-
-
-
-
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-881766ba-66ba-4db2-9212-7f0eac072e43\." /SETINTEGRITYLEVEL (CI)(OI)LOW3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:5680
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:6016
-
C:\Users\Admin\injector.exeC:\Users\Admin\injector.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
C:\Users\Admin\injector.exeC:\Users\Admin\injector.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3188
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
1System Binary Proxy Execution
1Msiexec
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
944B
MD515dde0683cd1ca19785d7262f554ba93
SHA1d039c577e438546d10ac64837b05da480d06bf69
SHA256d6fa39eab7ee36f44dc3f9f2839d098433db95c1eba924e4bcf4e5c0d268d961
SHA51257c0e1b87bc1c136f0d39f3ce64bb8f8274a0491e4ca6e45e5c7f9070aa9d9370c6f590ce37cd600b252df2638d870205249a514c43245ca7ed49017024a4672
-
Filesize
944B
MD538a2262fb16df934106a14acb53aaeb0
SHA144995f3ecfeef1136485135b0818ae7b6a11fee3
SHA2563f1f739bf5742b5962a330560d14b95ebdbdf8c4704e5852a4deddc01fce5dc1
SHA51243dccc1860a4dc260f5aa0fa1fcb3723836a7459e69649ce6482c8f360a8a0b674f0e461d2f82f437104c13e1e96c2d7806d72016162361a440ac59ccd9090d4
-
Filesize
919KB
MD53fa959051d9c8679ef470be0ff5be394
SHA1c0c215d74291f222ce815e1ee4f600525840e2a0
SHA256ed7d536917099f13c40749c3a015f8b6b05ad9ab956a5c9ef45544e67b2e919c
SHA5128599420e4f38d57877c8e54026b6124849d3a673c2853e8f30018c2a4b7a87076b5c77a9a40fb05f8d9d8204c0b7c9be23f3ed0ed99d14cbd1de59d71a991267
-
Filesize
1.4MB
MD5f18c325d8e39f3415aa807f6a87a7899
SHA175f84d9beb3ae4b552f8194668acc82710dad7e3
SHA2561db749dd1df020f0854cd103dbf5653efb9583a2f59a3337ca68caa4dc22a975
SHA5126fa2e541b9b137b2c5ed9c3803b208f9925dd3a0ee249340bd501fb0fa79438b3b1c409e15d3b160fc037912be048f285d554770837a8b15f5034e9a90d0b3be
-
Filesize
442B
MD532489aabb1b3adfc2f69b0ffa5d749b5
SHA148aa3d96a7520ba9f01e791f086839a7f251c1b3
SHA256fd3505c02547d313d285cc8771207f2cf4ced17816c08345aae39781105c9258
SHA512bc35d98cdaa723bcfd7082afdfe812afef88d7fd22f1c94dd927fbac65abd6c3c0f4a0b90c8df0a45e2bf98bcea5ff96428611dba5519e6631faa273ffb4a191
-
Filesize
1KB
MD5cd24ffbb0bcc37c783cab2927035b76b
SHA159a36f1697231e0d0c20b64dfc65c79c8dceba03
SHA256177a1152d694988dc0816ec001d32ab121cdd65f530038a69eb616fb6cb9ec1e
SHA512c2a6cb165526a09b0c6dd3c9295ea7a8f21cf3031291574effca7600dce994c0dc18616e6df7809e4c7cdd0ed04baf776e132bfc1ed4ac9b7d8abb2750f972a7
-
Filesize
1KB
MD512a101e8bb562779604767490cf54a74
SHA18aa5010ce197978dc1a72998a598f7e3df53394f
SHA25638f16b9bca9245b5d2bffd5a90e0bd78bbd7b93641f2456ba30adb96c9896ea3
SHA5122be518be5931af3a0b5d0755c5b15b8849c7dd769558e826df505888d662523a70eaf1deecbf13120fbc6e0f498f3000f38106a6a6bdc3bfb99e95a102b2dfb8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
23KB
MD53b5ba1d090951d3d769836223db57393
SHA19b31771eba4dd8c7bbccdc2a50bb6dad87e42fc4
SHA256898ac3faf4ecaad9b2fee90a2e5545b647e260c7a3f55c40babfa3c002170a19
SHA512959552901b232666b1c4ff75729b18952c39da5672346779d45025daae108eba7a682fc9f41b0edb94c924f0a2c349db57e3ca3dbe5adb0b44c9d1c7d0888d5d
-
Filesize
57KB
MD566fad41f7b041f6b8471678f91d69e5d
SHA1544c90183fa935f37b329d2195f6c9ca8273e5f1
SHA256b52d775f91462e0c7fe1ceed7bd28479706e52bba59196d28151423fb42673a1
SHA5128a12a32e53d210c34705ca887438a469010674a0b38b65d9a35fb08f287e646c76959d9ecb587da0422033d368a4a5e36e8260cd9b3bee45708da2908d1eb5f1
-
Filesize
208KB
MD50c8921bbcc37c6efd34faf44cf3b0cb5
SHA1dcfa71246157edcd09eecaf9d4c5e360b24b3e49
SHA256fd622cf73ea951a6de631063aba856487d77745dd1500adca61902b8dde56fe1
SHA512ed55443e20d40cca90596f0a0542fa5ab83fe0270399adfaafd172987fb813dfd44ec0da0a58c096af3641003f830341fe259ad5bce9823f238ae63b7e11e108
-
Filesize
24.1MB
MD59b527d440c70f7598949115e1ad1c509
SHA1b884ac1ccd4a06230cb7f27f3b10835a448c96a4
SHA256ebe3223e3473f2e704e048a8ee1aeb93c7c1f6f0a1004ca45146860e158fe41b
SHA51282258722a6eb09869506726f514f82cdc75f2f64beeda34f4ce4932afab0aaada8ebded89ee27aed88f9ecd5cbbd51398d55ac4257c28113ee88507519580f47
-
\??\Volume{241e003f-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{4404e97a-3e86-4bfb-b59a-d66bb90f82c0}_OnDiskSnapshotProp
Filesize6KB
MD54af88cf5a639f9e1f30d000ec59289d5
SHA1ca2791aa79f4d75c2de4cad9bef670a2cc9d56c0
SHA256bd903b8fb4c36585c55cbe074610d30a826e37ec4e8ffe67539d3a1e418cd292
SHA51211df0c82a4ad3d5ee91507c819ce80c961c9fa6de115c3b156915692342ce9f64faad11a1fbbad8623754f9c192ebbe569a1e9892c6e31e85abc25d4b6882ac2