Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/03/2025, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
04e428b8cc919452e07cae9081618efc.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
04e428b8cc919452e07cae9081618efc.exe
Resource
win10v2004-20250217-en
General
-
Target
04e428b8cc919452e07cae9081618efc.exe
-
Size
25.9MB
-
MD5
04e428b8cc919452e07cae9081618efc
-
SHA1
4c9d1a66a524c1e8a9dcea02bcaa8c75698c0f09
-
SHA256
a6b4d63cfb361f2bbc15e1bb8861b183227f817d3a67fe5ab2b001a1e6011380
-
SHA512
88a3ab0a23ace92ac768ff09e796d226da89c22398dc790d25b257615bf71ce8692cd796bb057487fbc0b3a783148192cbd26e25af901b328ef3e4858fed1238
-
SSDEEP
393216:lR6gS5im4Pu9cuxaIp/ePQ92c4SbeRna5UgMXD/3PAZWiTGxtC4F7RNfa/1:lrS57Kuxdt92bSKRsgJiTG24Zi/1
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
103.17.38.43:4449
192.168.4.182:4449
chrome
-
delay
1
-
install
true
-
install_file
svh.exe
-
install_folder
%AppData%
Extracted
xworm
127.0.0.1:7000
192.168.4.185:7000
192.168.4.182:7000
192.168.4.181:7000
103.17.38.43:7000
103.17.38.40/29:7000
-
Install_directory
%ProgramData%
-
install_file
chrome.exe
Extracted
asyncrat
Default
127.0.0.1:3232
103.17.38.43:3232
-
delay
1
-
install
true
-
install_file
chrome.exe
-
install_folder
%AppData%
Extracted
asyncrat
| Edit by Vinom Rat
Default
127.0.0.1:7707
192.168.4.182:7707
103.17.38.43:7707
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Defender.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/files/0x0007000000016d55-26.dat family_xworm behavioral1/files/0x0007000000016d4e-25.dat family_xworm behavioral1/memory/2068-27-0x0000000000D40000-0x0000000000D76000-memory.dmp family_xworm behavioral1/memory/2380-32-0x0000000000E50000-0x0000000000E82000-memory.dmp family_xworm behavioral1/memory/348-377-0x0000000001390000-0x00000000013C6000-memory.dmp family_xworm -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" chrome.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection chrome.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" chrome.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" chrome.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" chrome.exe -
Xworm family
-
Async RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0008000000016d4a-17.dat family_asyncrat behavioral1/files/0x0009000000016d21-22.dat family_asyncrat behavioral1/files/0x000900000001958e-354.dat family_asyncrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1652 powershell.exe 660 powershell.exe 1640 powershell.exe 448 powershell.exe 2672 powershell.exe 2696 powershell.exe 1720 powershell.exe 2616 powershell.exe 1404 powershell.exe 2384 powershell.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chrome.lnk chrome1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chrome.lnk chrome1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chrome.lnk chrome2.exe -
Executes dropped EXE 8 IoCs
pid Process 2560 G160.exe 1724 chrome vecom.exe 2428 chrome.exe 2068 chrome2.exe 2380 chrome1.exe 2272 svh.exe 348 chrome.exe 2964 chrome.exe -
Loads dropped DLL 1 IoCs
pid Process 3016 04e428b8cc919452e07cae9081618efc.exe -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features chrome.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\chrome = "C:\\Users\\Admin\\AppData\\Local\\chrome.exe" chrome2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\chrome = "C:\\ProgramData\\chrome.exe" chrome1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2560 G160.exe 2560 G160.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN G160.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2636 timeout.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\_auto_file rundll32.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2644 schtasks.exe 2176 schtasks.exe 1812 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1724 chrome vecom.exe 2428 chrome.exe 1724 chrome vecom.exe 2428 chrome.exe 1724 chrome vecom.exe 2428 chrome.exe 1724 chrome vecom.exe 1724 chrome vecom.exe 2428 chrome.exe 1724 chrome vecom.exe 1724 chrome vecom.exe 1724 chrome vecom.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2696 powershell.exe 2428 chrome.exe 2428 chrome.exe 2560 G160.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 1720 powershell.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2616 powershell.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 1652 powershell.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2940 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2068 chrome2.exe Token: SeDebugPrivilege 2380 chrome1.exe Token: SeDebugPrivilege 1724 chrome vecom.exe Token: SeDebugPrivilege 2428 chrome.exe Token: SeDebugPrivilege 1724 chrome vecom.exe Token: SeDebugPrivilege 2428 chrome.exe Token: SeDebugPrivilege 2696 powershell.exe Token: SeDebugPrivilege 1720 powershell.exe Token: SeDebugPrivilege 2616 powershell.exe Token: SeDebugPrivilege 1652 powershell.exe Token: SeDebugPrivilege 2272 svh.exe Token: SeDebugPrivilege 2380 chrome1.exe Token: SeDebugPrivilege 2272 svh.exe Token: SeDebugPrivilege 660 powershell.exe Token: SeDebugPrivilege 1404 powershell.exe Token: SeDebugPrivilege 1640 powershell.exe Token: SeDebugPrivilege 448 powershell.exe Token: SeDebugPrivilege 2672 powershell.exe Token: SeDebugPrivilege 2068 chrome2.exe Token: SeDebugPrivilege 2384 powershell.exe Token: SeDebugPrivilege 348 chrome.exe Token: SeDebugPrivilege 1532 powershell.exe Token: SeDebugPrivilege 2356 powershell.exe Token: SeDebugPrivilege 2964 chrome.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2380 chrome1.exe 2272 svh.exe 2940 AcroRd32.exe 2940 AcroRd32.exe 2068 chrome2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2560 3016 04e428b8cc919452e07cae9081618efc.exe 30 PID 3016 wrote to memory of 2560 3016 04e428b8cc919452e07cae9081618efc.exe 30 PID 3016 wrote to memory of 2560 3016 04e428b8cc919452e07cae9081618efc.exe 30 PID 3016 wrote to memory of 2428 3016 04e428b8cc919452e07cae9081618efc.exe 31 PID 3016 wrote to memory of 2428 3016 04e428b8cc919452e07cae9081618efc.exe 31 PID 3016 wrote to memory of 2428 3016 04e428b8cc919452e07cae9081618efc.exe 31 PID 3016 wrote to memory of 1724 3016 04e428b8cc919452e07cae9081618efc.exe 32 PID 3016 wrote to memory of 1724 3016 04e428b8cc919452e07cae9081618efc.exe 32 PID 3016 wrote to memory of 1724 3016 04e428b8cc919452e07cae9081618efc.exe 32 PID 3016 wrote to memory of 2068 3016 04e428b8cc919452e07cae9081618efc.exe 33 PID 3016 wrote to memory of 2068 3016 04e428b8cc919452e07cae9081618efc.exe 33 PID 3016 wrote to memory of 2068 3016 04e428b8cc919452e07cae9081618efc.exe 33 PID 3016 wrote to memory of 2380 3016 04e428b8cc919452e07cae9081618efc.exe 34 PID 3016 wrote to memory of 2380 3016 04e428b8cc919452e07cae9081618efc.exe 34 PID 3016 wrote to memory of 2380 3016 04e428b8cc919452e07cae9081618efc.exe 34 PID 1724 wrote to memory of 2748 1724 chrome vecom.exe 35 PID 1724 wrote to memory of 2748 1724 chrome vecom.exe 35 PID 1724 wrote to memory of 2748 1724 chrome vecom.exe 35 PID 1724 wrote to memory of 2840 1724 chrome vecom.exe 36 PID 1724 wrote to memory of 2840 1724 chrome vecom.exe 36 PID 1724 wrote to memory of 2840 1724 chrome vecom.exe 36 PID 2840 wrote to memory of 2636 2840 cmd.exe 39 PID 2840 wrote to memory of 2636 2840 cmd.exe 39 PID 2840 wrote to memory of 2636 2840 cmd.exe 39 PID 2748 wrote to memory of 2644 2748 cmd.exe 40 PID 2748 wrote to memory of 2644 2748 cmd.exe 40 PID 2748 wrote to memory of 2644 2748 cmd.exe 40 PID 2380 wrote to memory of 2696 2380 chrome1.exe 41 PID 2380 wrote to memory of 2696 2380 chrome1.exe 41 PID 2380 wrote to memory of 2696 2380 chrome1.exe 41 PID 2380 wrote to memory of 1720 2380 chrome1.exe 43 PID 2380 wrote to memory of 1720 2380 chrome1.exe 43 PID 2380 wrote to memory of 1720 2380 chrome1.exe 43 PID 2380 wrote to memory of 2616 2380 chrome1.exe 47 PID 2380 wrote to memory of 2616 2380 chrome1.exe 47 PID 2380 wrote to memory of 2616 2380 chrome1.exe 47 PID 2380 wrote to memory of 1652 2380 chrome1.exe 49 PID 2380 wrote to memory of 1652 2380 chrome1.exe 49 PID 2380 wrote to memory of 1652 2380 chrome1.exe 49 PID 2840 wrote to memory of 2272 2840 cmd.exe 51 PID 2840 wrote to memory of 2272 2840 cmd.exe 51 PID 2840 wrote to memory of 2272 2840 cmd.exe 51 PID 2380 wrote to memory of 2176 2380 chrome1.exe 52 PID 2380 wrote to memory of 2176 2380 chrome1.exe 52 PID 2380 wrote to memory of 2176 2380 chrome1.exe 52 PID 2068 wrote to memory of 660 2068 chrome2.exe 54 PID 2068 wrote to memory of 660 2068 chrome2.exe 54 PID 2068 wrote to memory of 660 2068 chrome2.exe 54 PID 2428 wrote to memory of 1340 2428 chrome.exe 56 PID 2428 wrote to memory of 1340 2428 chrome.exe 56 PID 2428 wrote to memory of 1340 2428 chrome.exe 56 PID 1340 wrote to memory of 1404 1340 cmd.exe 58 PID 1340 wrote to memory of 1404 1340 cmd.exe 58 PID 1340 wrote to memory of 1404 1340 cmd.exe 58 PID 2068 wrote to memory of 1640 2068 chrome2.exe 59 PID 2068 wrote to memory of 1640 2068 chrome2.exe 59 PID 2068 wrote to memory of 1640 2068 chrome2.exe 59 PID 1404 wrote to memory of 2140 1404 powershell.exe 61 PID 1404 wrote to memory of 2140 1404 powershell.exe 61 PID 1404 wrote to memory of 2140 1404 powershell.exe 61 PID 2068 wrote to memory of 448 2068 chrome2.exe 62 PID 2068 wrote to memory of 448 2068 chrome2.exe 62 PID 2068 wrote to memory of 448 2068 chrome2.exe 62 PID 2140 wrote to memory of 2940 2140 rundll32.exe 64 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\04e428b8cc919452e07cae9081618efc.exe"C:\Users\Admin\AppData\Local\Temp\04e428b8cc919452e07cae9081618efc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Roaming\G160.exe"C:\Users\Admin\AppData\Roaming\G160.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
-
C:\Users\Admin\AppData\Roaming\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome.exe"2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\sumngr"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\sumngr"'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\sumngr5⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\sumngr"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2940
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\jqppge"' & exit3⤵PID:1880
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\jqppge"'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2384 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\jqppge5⤵
- Modifies registry class
PID:2700 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\jqppge"6⤵
- System Location Discovery: System Language Discovery
PID:1060
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add - MpPreference - ExclusionExtension ".exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
-
C:\Users\Admin\AppData\Roaming\chrome vecom.exe"C:\Users\Admin\AppData\Roaming\chrome vecom.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svh" /tr '"C:\Users\Admin\AppData\Roaming\svh.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svh" /tr '"C:\Users\Admin\AppData\Roaming\svh.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:2644
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpD6B0.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:2636
-
-
C:\Users\Admin\AppData\Roaming\svh.exe"C:\Users\Admin\AppData\Roaming\svh.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2272
-
-
-
-
C:\Users\Admin\AppData\Roaming\chrome2.exe"C:\Users\Admin\AppData\Roaming\chrome2.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\chrome2.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:660
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome2.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\chrome.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "chrome" /tr "C:\Users\Admin\AppData\Local\chrome.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1812
-
-
-
C:\Users\Admin\AppData\Roaming\chrome1.exe"C:\Users\Admin\AppData\Roaming\chrome1.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\chrome1.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome1.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\chrome.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "chrome" /tr "C:\ProgramData\chrome.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2176
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A46A7488-C6E3-4F8E-AFFB-8F888FA38FA7} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵PID:1072
-
C:\Users\Admin\AppData\Local\chrome.exeC:\Users\Admin\AppData\Local\chrome.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:348
-
-
C:\Users\Admin\AppData\Local\chrome.exeC:\Users\Admin\AppData\Local\chrome.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55231683e58275130d46c3e4b001603e8
SHA1b4eaf217ab30a733fbe412724f5d8179144f8a62
SHA256701e8b383611be6b3c2ce029518b493a38673dba08ed73579bfc8e77423bcad6
SHA512e1c8f257670d4a00422edb57c3b1156d0b54531998bc86354ac912d1f624f76d09f7d6bb03a2f50a4586a9da7e42bd6d4be778356235bd63538691a86ed27b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509e11f924352e9bef3c2688165b2350c
SHA12051a7096ddada9fe14d9ae6a73fdeff623a2e28
SHA256ec494514d575bc5a2a033126f5cb45fb0d1e9f2add4e14c10eb686e1f5d93b3b
SHA512136e8380839e63b42651239b1b620de327d3ab07ea43a7282d038f99eaa04be63f7fc6243e82d68e9e045c45dd001f3b9b1bb25d6b863461d34b59fd836b15e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5876ad372429c028fe60f7cfedaf1f4c9
SHA159986340aded6feee32b2459949183f9575dc452
SHA256e9d8456c4a05bb668649119a9a18a16582f7e950d4253b8ca20231f5a6e7031a
SHA512d870e2ccc8dc46aa0754576160e84ed0ff3b3ec68cc86de84397a05a8ad4fb7a5dc44fbf093890464fa489c795f3ab4b75fca89d2053f9e4167c22a28fd74e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbce4c31fa3bd1b5094d7d0de1bd565a
SHA140352c8edc744d70ce7de382dc7fb61890e0e1ad
SHA256dc2a1c932f632e98be95d064cd70d54e2205c2c736e783d953e02e5c89421a14
SHA51208d1a8246ca1afbe46920232c5270cbd5d533fc9799151024a81d2a020a3678cce626abb4f909bb759c3c78c12c9433d5e657303935a111112d465e4e9668fda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559e936ef5d04ecc29abec9b7448868c1
SHA12370d8ac2ac9f68fe4d9987c4dcb505cc7e8f7ab
SHA256dc8c3cb5bc7e4787697544d4683d75bb0a42af0f52f8ac172592e546118bb9e0
SHA5125c592bc890220331874c9eef3217adf1088f076102e6b5a0cd96b80452444e4095128284dd816bef7633e5b2016f31c3692580f76ef80aca683b5ea512474ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51eac0dea5da06f491c2e27b322264727
SHA17bffc95c03b89f9d642a3e3d48443af53c527aae
SHA2565353406dadcccbd43d527df219e43d931d16c9ce9bc39683fc9f93633831820b
SHA51253bdc75fd15cf0827f4bce8364283cfd3df3ecd5e8494f3534f8eb5ae0f05fba5e357e08dd9e59e703681b891f979c40166d8161a3d15aa41cf55da38f99b30d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c351c39ea9d4903d293a0c26901243cd
SHA18b129ce6f4c02adf7866d5f42ffd5f5634ec7653
SHA256443dc3ddff3c5aadbfa72a986df754e6b98c78a5ee215f0590f8fe67a4f4b9c9
SHA5127132172191991afa8997a97d3d657013526ed446ce0c397c4ff2eb3e25af1a4550bfbe590f9a66b8bde1ee9a126ab104c8b5e61873c98b3658573558cddf71f8
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
167KB
MD54bb693dfbe9bf0d0f116cff62b927a2e
SHA1ed81c78373598d93f5cfdfead9ce617aeab01cf8
SHA25607f8a2b36fb269213914b1b4e1c5d65afabefec3b8d92492d23f0ba1254bac26
SHA512788321002f57a035cef511f9c1e667e59a3c32a93c3777f5fed23f8fda1d278127d979e7dc9be81f8bf5b942aa14cc9a5daa2148cf2e5f6a4649be5638580ae5
-
Filesize
147B
MD5c3eade27f02dc089541306dacdff52a5
SHA19686c1d2623e0b76b2e6d7e4eaf23d446c36b56c
SHA25693226a17b85a3889d6ce6a58931a59538a2247ce55cfb37550cb3329c230c42c
SHA51238ca7de7c89de1c10c50d4a5e18f051c50379d37887247e722970f335e5bf3cabaeed3814127a27ea9e5ed5e427c0583e2754b2e3105f10f6363ece9440fc82a
-
Filesize
3KB
MD59f63d7e3f26fdf35e8f106930833b835
SHA13cd3029de06d65f346b94789b73a830b51b3a8dc
SHA2565871bb5968f024c81972749c3115e3ebe04ced5bc02325bc5597882f6756906a
SHA51275eb9a679c976d2528b0e341e93f5fa36ff25d9740ae8b670250c28eaa9e9783c30fffb347a0e61319ec4b66abb1ea165e560b232f00a0ddb076c5f3ff1edcf7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57a72c33e5642c8bb6cc046619ada88f7
SHA169ca60efaf1177bd9d57093c949df65a80a40558
SHA25685f0184879c7f93a089b6686cfa873c1e6e512832f1746541484da76d3c72fe4
SHA512688249bdd89727d979e34294307e82fd5a0c5e7eabc817720b85382d2473f94a0622b0da0bb1290d3cc2bdcf340b260df95e02cb57efc0cbe60bb2ab417cd03f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57fa00532381768b0b269d24545e8fdad
SHA16288ed2ce5812ba9aba357a2f2406826febf8e35
SHA2564ea4b12b2c344cef44c6a53b1e5bc3073bf839becf9a6bb9513e362978014bdd
SHA5128f845f1950ce236734e011776d66829ca90c1904c7a1cbc6d9f9880dbc97610a1b16f21183f1173ed2c82ce7cc5ca86a0541684e7f1cf882f26f71880d7e19c9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74OXB83RH2I6TA6D12I1.temp
Filesize7KB
MD5f2b653a7ff9bbd58e6831e0822888902
SHA16df39beee4e2ef9b524b4b8ceaf5e571802579c4
SHA2562c48b2d9530d09d1c6488909e0fc27ac8c5561ec5efbe8f20ca082e3d7459278
SHA512bcb6ce073dd74ae875bab6059b93428171eec3a009d4a1d40b2a7b084758461a7a0d3065bb24cd767ce0ae61e775d2c150a17150d8e221d6f8bcdde4005754d1
-
Filesize
628B
MD51dafc197d5711ad9b00e3326129cc210
SHA117b03176fbf6cff6513bb61780fcb36a1f7d2ff4
SHA25622bb9f022422b0c766628d02872ae4dd65760a6f213ec2a250eec93b6fc006f2
SHA51207ab0dc0e4f366cdc5a1e5014f9a1021956caeb293420c1804c5bffe56791d582c9701f4fc9784abcf272ccda21b61dbdf35019b8a57432eb79c2a72d2d124c6
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
187KB
MD5f16744580bc9d4a51f5af484d2c3c65c
SHA1729f833612d72845e4c97b42c90d126928809db4
SHA25656d565760b89b9259743d216b61800067ee6819c2bef561d65984800ec64ca2a
SHA512e047562a698ee280a3638af1551639538cea5ac76def9d755b3ee8612c01c5aeee0bb766539c2323f1fdbabe2f95c2fa72bcb37e661b74d3cd95bdf0ec1a9186
-
Filesize
176KB
MD560cb37e6977e0827cca5f5ccc7067b08
SHA1c1f3b308c757552b20dfbcac77a85a09a372a526
SHA256ae1acfc8b6276996042c230c16ce581d242dd9007ca6fa3044c63104f08be9c2
SHA512ee8528fe4a7ab7c25c0ef329b3fe1baaa33e4f798621a246acb86a6327a187c129be738796efe416e030411421d8bb733326594c356fa3fefc359c79c631f4cc
-
Filesize
174KB
MD5e7be301f2c3a4b88a3fdc12c573fd515
SHA13d0a0195fbe314e3ba3c985b5614dcffb956fed5
SHA25696d2f88dcc0707f655922020a6bffc1f005a18d1d3b7207b8eb44f22435d7541
SHA512c85a9d29414cc6eaf872a031468611a5a383a68c1c39026c60345f8c4e3314e181fcef1d7477ddddf961fce08a150aed21de7b8055de3a7c973b1c6d07641cb1
-
Filesize
194KB
MD5d24ca6b94b01c980715f202aed2afc1a
SHA1e68c8f902483079def7e17ac64530c46c0d3d98e
SHA2565dd2f724c6d7c769139832531f76d42a95aa7eaed9e7c2919dc717974ba0c13a
SHA512aa74c884e4eee53f5299ec3af2503903e4a50c0a51f47f0ac705e3f325d28aecf60baad68475736308d83fdd05a924a5fc027f9868b1262c224037b742ec8f1b
-
Filesize
25.1MB
MD5ed8d8078866b64f59d97276f5725168f
SHA11195dde78e8e64b5aec5466f777a71261652e890
SHA256d6b3b4f34df598fa13c637680d57b68aca1414c16a7480fb45a34fa26e203a8b
SHA512c9ef5bde60109be58c4889b3403169dc78806eb34af5b13932df48b756597a9d6265f676fcc9f7c13f73d0188a3089ea16dce1d3b626dea8c0bf82c4dd5d44d7