Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2025, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
04e428b8cc919452e07cae9081618efc.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
04e428b8cc919452e07cae9081618efc.exe
Resource
win10v2004-20250217-en
General
-
Target
04e428b8cc919452e07cae9081618efc.exe
-
Size
25.9MB
-
MD5
04e428b8cc919452e07cae9081618efc
-
SHA1
4c9d1a66a524c1e8a9dcea02bcaa8c75698c0f09
-
SHA256
a6b4d63cfb361f2bbc15e1bb8861b183227f817d3a67fe5ab2b001a1e6011380
-
SHA512
88a3ab0a23ace92ac768ff09e796d226da89c22398dc790d25b257615bf71ce8692cd796bb057487fbc0b3a783148192cbd26e25af901b328ef3e4858fed1238
-
SSDEEP
393216:lR6gS5im4Pu9cuxaIp/ePQ92c4SbeRna5UgMXD/3PAZWiTGxtC4F7RNfa/1:lrS57Kuxdt92bSKRsgJiTG24Zi/1
Malware Config
Extracted
asyncrat
Default
127.0.0.1:3232
103.17.38.43:3232
-
delay
1
-
install
true
-
install_file
chrome.exe
-
install_folder
%AppData%
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
103.17.38.43:4449
192.168.4.182:4449
chrome
-
delay
1
-
install
true
-
install_file
svh.exe
-
install_folder
%AppData%
Extracted
xworm
127.0.0.1:7000
192.168.4.185:7000
192.168.4.182:7000
192.168.4.181:7000
103.17.38.43:7000
103.17.38.40/29:7000
-
Install_directory
%ProgramData%
-
install_file
chrome.exe
Extracted
asyncrat
| Edit by Vinom Rat
Default
127.0.0.1:7707
192.168.4.182:7707
103.17.38.43:7707
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Defender.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral2/files/0x000300000001e959-38.dat family_xworm behavioral2/files/0x000300000001e982-49.dat family_xworm behavioral2/memory/1324-62-0x00000000008C0000-0x00000000008F2000-memory.dmp family_xworm behavioral2/memory/1028-61-0x00000000001A0000-0x00000000001D6000-memory.dmp family_xworm -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" chrome.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection chrome.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" chrome.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" chrome.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" chrome.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" chrome.exe -
Xworm family
-
Async RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x000300000001e944-17.dat family_asyncrat behavioral2/files/0x000200000001e957-26.dat family_asyncrat behavioral2/files/0x000d000000023b43-237.dat family_asyncrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1172 powershell.exe 4612 powershell.exe 1296 powershell.exe 4124 powershell.exe 2144 powershell.exe 1624 powershell.exe 1092 powershell.exe 4516 powershell.exe 5020 powershell.exe 4384 powershell.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation chrome vecom.exe Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation chrome1.exe Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation chrome2.exe Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation 04e428b8cc919452e07cae9081618efc.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chrome.lnk chrome1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chrome.lnk chrome1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chrome.lnk chrome2.exe -
Executes dropped EXE 8 IoCs
pid Process 3512 G160.exe 3452 chrome.exe 3752 chrome vecom.exe 1028 chrome2.exe 1324 chrome1.exe 4540 svh.exe 4608 chrome.exe 440 chrome.exe -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" chrome.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\chrome = "C:\\ProgramData\\chrome.exe" chrome1.exe Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\chrome = "C:\\Users\\Admin\\AppData\\Local\\chrome.exe" chrome2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3512 G160.exe 3512 G160.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN G160.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3692 timeout.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000_Classes\Local Settings powershell.exe Key created \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000_Classes\Local Settings powershell.exe Key created \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000_Classes\Local Settings OpenWith.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3528 schtasks.exe 448 schtasks.exe 4812 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3452 chrome.exe 3452 chrome.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3452 chrome.exe 3452 chrome.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3452 chrome.exe 3452 chrome.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3752 chrome vecom.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3512 G160.exe 3512 G160.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3752 chrome vecom.exe Token: SeDebugPrivilege 1028 chrome2.exe Token: SeDebugPrivilege 1324 chrome1.exe Token: SeDebugPrivilege 3452 chrome.exe Token: SeDebugPrivilege 3752 chrome vecom.exe Token: SeDebugPrivilege 3452 chrome.exe Token: SeDebugPrivilege 4124 powershell.exe Token: SeDebugPrivilege 2144 powershell.exe Token: SeDebugPrivilege 1624 powershell.exe Token: SeDebugPrivilege 1092 powershell.exe Token: SeDebugPrivilege 4540 svh.exe Token: SeDebugPrivilege 1324 chrome1.exe Token: SeDebugPrivilege 4540 svh.exe Token: SeDebugPrivilege 4516 powershell.exe Token: SeDebugPrivilege 1172 powershell.exe Token: SeDebugPrivilege 4612 powershell.exe Token: SeDebugPrivilege 1296 powershell.exe Token: SeDebugPrivilege 1028 chrome2.exe Token: SeDebugPrivilege 5020 powershell.exe Token: SeDebugPrivilege 4384 powershell.exe Token: SeDebugPrivilege 4608 chrome.exe Token: SeDebugPrivilege 4336 powershell.exe Token: SeDebugPrivilege 5072 powershell.exe Token: SeDebugPrivilege 440 chrome.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1324 chrome1.exe 4540 svh.exe 1028 chrome2.exe 3124 OpenWith.exe 1752 OpenWith.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 4460 wrote to memory of 3512 4460 04e428b8cc919452e07cae9081618efc.exe 90 PID 4460 wrote to memory of 3512 4460 04e428b8cc919452e07cae9081618efc.exe 90 PID 4460 wrote to memory of 3452 4460 04e428b8cc919452e07cae9081618efc.exe 91 PID 4460 wrote to memory of 3452 4460 04e428b8cc919452e07cae9081618efc.exe 91 PID 4460 wrote to memory of 3752 4460 04e428b8cc919452e07cae9081618efc.exe 92 PID 4460 wrote to memory of 3752 4460 04e428b8cc919452e07cae9081618efc.exe 92 PID 4460 wrote to memory of 1028 4460 04e428b8cc919452e07cae9081618efc.exe 93 PID 4460 wrote to memory of 1028 4460 04e428b8cc919452e07cae9081618efc.exe 93 PID 4460 wrote to memory of 1324 4460 04e428b8cc919452e07cae9081618efc.exe 94 PID 4460 wrote to memory of 1324 4460 04e428b8cc919452e07cae9081618efc.exe 94 PID 3752 wrote to memory of 1252 3752 chrome vecom.exe 95 PID 3752 wrote to memory of 1252 3752 chrome vecom.exe 95 PID 3752 wrote to memory of 2964 3752 chrome vecom.exe 96 PID 3752 wrote to memory of 2964 3752 chrome vecom.exe 96 PID 1252 wrote to memory of 3528 1252 cmd.exe 115 PID 1252 wrote to memory of 3528 1252 cmd.exe 115 PID 2964 wrote to memory of 3692 2964 cmd.exe 100 PID 2964 wrote to memory of 3692 2964 cmd.exe 100 PID 1324 wrote to memory of 4124 1324 chrome1.exe 104 PID 1324 wrote to memory of 4124 1324 chrome1.exe 104 PID 1324 wrote to memory of 2144 1324 chrome1.exe 108 PID 1324 wrote to memory of 2144 1324 chrome1.exe 108 PID 1324 wrote to memory of 1624 1324 chrome1.exe 111 PID 1324 wrote to memory of 1624 1324 chrome1.exe 111 PID 1324 wrote to memory of 1092 1324 chrome1.exe 114 PID 1324 wrote to memory of 1092 1324 chrome1.exe 114 PID 2964 wrote to memory of 4540 2964 cmd.exe 116 PID 2964 wrote to memory of 4540 2964 cmd.exe 116 PID 1324 wrote to memory of 448 1324 chrome1.exe 120 PID 1324 wrote to memory of 448 1324 chrome1.exe 120 PID 1028 wrote to memory of 4516 1028 chrome2.exe 125 PID 1028 wrote to memory of 4516 1028 chrome2.exe 125 PID 1028 wrote to memory of 1172 1028 chrome2.exe 127 PID 1028 wrote to memory of 1172 1028 chrome2.exe 127 PID 1028 wrote to memory of 4612 1028 chrome2.exe 129 PID 1028 wrote to memory of 4612 1028 chrome2.exe 129 PID 1028 wrote to memory of 1296 1028 chrome2.exe 131 PID 1028 wrote to memory of 1296 1028 chrome2.exe 131 PID 1028 wrote to memory of 4812 1028 chrome2.exe 133 PID 1028 wrote to memory of 4812 1028 chrome2.exe 133 PID 3452 wrote to memory of 796 3452 chrome.exe 135 PID 3452 wrote to memory of 796 3452 chrome.exe 135 PID 796 wrote to memory of 5020 796 cmd.exe 137 PID 796 wrote to memory of 5020 796 cmd.exe 137 PID 3452 wrote to memory of 3440 3452 chrome.exe 150 PID 3452 wrote to memory of 3440 3452 chrome.exe 150 PID 3440 wrote to memory of 4384 3440 cmd.exe 152 PID 3440 wrote to memory of 4384 3440 cmd.exe 152 PID 3452 wrote to memory of 4336 3452 chrome.exe 155 PID 3452 wrote to memory of 4336 3452 chrome.exe 155 PID 3452 wrote to memory of 5072 3452 chrome.exe 157 PID 3452 wrote to memory of 5072 3452 chrome.exe 157 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\04e428b8cc919452e07cae9081618efc.exe"C:\Users\Admin\AppData\Local\Temp\04e428b8cc919452e07cae9081618efc.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Roaming\G160.exe"C:\Users\Admin\AppData\Roaming\G160.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
PID:3512
-
-
C:\Users\Admin\AppData\Roaming\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome.exe"2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\lnthie"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\lnthie"'4⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\cecfvw"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\cecfvw"'4⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add - MpPreference - ExclusionExtension ".exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
-
C:\Users\Admin\AppData\Roaming\chrome vecom.exe"C:\Users\Admin\AppData\Roaming\chrome vecom.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svh" /tr '"C:\Users\Admin\AppData\Roaming\svh.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svh" /tr '"C:\Users\Admin\AppData\Roaming\svh.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:3528
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC563.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:3692
-
-
C:\Users\Admin\AppData\Roaming\svh.exe"C:\Users\Admin\AppData\Roaming\svh.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4540
-
-
-
-
C:\Users\Admin\AppData\Roaming\chrome2.exe"C:\Users\Admin\AppData\Roaming\chrome2.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\chrome2.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome2.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\chrome.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "chrome" /tr "C:\Users\Admin\AppData\Local\chrome.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4812
-
-
-
C:\Users\Admin\AppData\Roaming\chrome1.exe"C:\Users\Admin\AppData\Roaming\chrome1.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\chrome1.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome1.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\chrome.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1092 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3528
-
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "chrome" /tr "C:\ProgramData\chrome.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:448
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3124
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1752
-
C:\Users\Admin\AppData\Local\chrome.exeC:\Users\Admin\AppData\Local\chrome.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
C:\Users\Admin\AppData\Local\chrome.exeC:\Users\Admin\AppData\Local\chrome.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:440
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
Filesize
944B
MD534f595487e6bfd1d11c7de88ee50356a
SHA14caad088c15766cc0fa1f42009260e9a02f953bb
SHA2560f9a4b52e01cb051052228a55d0515911b7ef5a8db3cf925528c746df511424d
SHA51210976c5deaf9fac449e703e852c3b08d099f430de2d7c7b8e2525c35d63e28b890e5aab63feff9b20bca0aaf9f35a3ba411aee3fbeee9ea59f90ed25bd617a0b
-
Filesize
944B
MD59c740b7699e2363ac4ecdf496520ca35
SHA1aa8691a8c56500d82c5fc8c35209bc6fe50ab1d9
SHA256be96c91b62ba9ba7072ab89e66543328c9e4395150f9dbe8067332d94a3ecc61
SHA5128885683f96353582eb871209e766e7eba1a72a2837ce27ea298b7b5b169621d1fa3fce25346b6bfd258b52642644234da9559d4e765a2023a5a5fc1f544cc7af
-
Filesize
944B
MD55cfe303e798d1cc6c1dab341e7265c15
SHA1cd2834e05191a24e28a100f3f8114d5a7708dc7c
SHA256c4d16552769ca1762f6867bce85589c645ac3dc490b650083d74f853f898cfab
SHA512ef151bbe0033a2caf2d40aff74855a3f42c8171e05a11c8ce93c7039d9430482c43fe93d9164ee94839aff253cad774dbf619dde9a8af38773ca66d59ac3400e
-
Filesize
944B
MD522310ad6749d8cc38284aa616efcd100
SHA1440ef4a0a53bfa7c83fe84326a1dff4326dcb515
SHA25655b1d8021c4eb4c3c0d75e3ed7a4eb30cd0123e3d69f32eeb596fe4ffec05abf
SHA5122ef08e2ee15bb86695fe0c10533014ffed76ececc6e579d299d3365fafb7627f53e32e600bb6d872b9f58aca94f8cb7e1e94cdfd14777527f7f0aa019d9c6def
-
Filesize
944B
MD554522d22658e4f8f87ecb947b71b8feb
SHA16a6144bdf9c445099f52211b6122a2ecf72b77e9
SHA256af18fc4864bc2982879aed928c960b6266f372c928f8c9632c5a4eecd64e448a
SHA51255f2c5a455be20dcb4cb93a29e5389e0422237bdd7ac40112fec6f16a36e5e19df50d25d39a6d5acb2d41a96514c7ecd8631ce8e67c4ff04997282f49d947aba
-
Filesize
64B
MD5145b4e645bc65fc53661effd1f8c54cb
SHA18e43ad42ad352d7cde6314255d75ef1cf4e34385
SHA2567cac267645b493f0fb46abb103e48ac4e55f847de790929da6e57cd84ce18847
SHA512bb1e1c64f91f5937ca87f08000e633cef8fcd46bcc901318a111e3b009e6f49c00c06eb79a17085deaaac0e106232cd2b229416e005afb42ef9a3db48c0d1628
-
Filesize
64B
MD5446dd1cf97eaba21cf14d03aebc79f27
SHA136e4cc7367e0c7b40f4a8ace272941ea46373799
SHA256a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf
SHA512a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7
-
Filesize
944B
MD596ff1ee586a153b4e7ce8661cabc0442
SHA1140d4ff1840cb40601489f3826954386af612136
SHA2560673399a2f37c89d455e8658c4d30b9248bff1ea47ba40957588e2bc862976e8
SHA5123404370d0edb4ead4874ce68525dc9bcbc6008003682646e331bf43a06a24a467ace7eff5be701a822d74c7e065d0f6a0ba0e3d6bc505d34d0189373dcacb569
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
167KB
MD54bb693dfbe9bf0d0f116cff62b927a2e
SHA1ed81c78373598d93f5cfdfead9ce617aeab01cf8
SHA25607f8a2b36fb269213914b1b4e1c5d65afabefec3b8d92492d23f0ba1254bac26
SHA512788321002f57a035cef511f9c1e667e59a3c32a93c3777f5fed23f8fda1d278127d979e7dc9be81f8bf5b942aa14cc9a5daa2148cf2e5f6a4649be5638580ae5
-
Filesize
147B
MD57ae63a29217ed3c2eb0a1ec97c456af5
SHA1cfb1b941c1d07cd648521a9b4d991c0412d466d9
SHA25619f85a4618d827dfe7d5ff7c3f55da4bcd4f1bbcecdf7dcade2649bc10bc516f
SHA512bdeb555a24227a74413887c1f24d8de62c649c05b98026542107fcc2d3c463a0e9b75619c902417b797b2ae2ca35b6a56c3ba16215fa94d8e60e3ac99be3d2bb
-
Filesize
25.1MB
MD5ed8d8078866b64f59d97276f5725168f
SHA11195dde78e8e64b5aec5466f777a71261652e890
SHA256d6b3b4f34df598fa13c637680d57b68aca1414c16a7480fb45a34fa26e203a8b
SHA512c9ef5bde60109be58c4889b3403169dc78806eb34af5b13932df48b756597a9d6265f676fcc9f7c13f73d0188a3089ea16dce1d3b626dea8c0bf82c4dd5d44d7
-
Filesize
665B
MD575ede14fdc353228516b4fce09cc0610
SHA1bedf0d0fcaf8e0141ef06141070400eb16c0c932
SHA256545b7d96f2ea09fc05b9f4d81e439ce11cbd72b6b4c83d7a1ab7a8e4f26ccb6e
SHA51248a2eb833d42a469fec30517288d2716dcaaf718132a34cf288c89eaf6760e1996ac659dfeb7724ef15b01240041ecf6190e2f661fc989a84d57a5cb3f21da33
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
187KB
MD5f16744580bc9d4a51f5af484d2c3c65c
SHA1729f833612d72845e4c97b42c90d126928809db4
SHA25656d565760b89b9259743d216b61800067ee6819c2bef561d65984800ec64ca2a
SHA512e047562a698ee280a3638af1551639538cea5ac76def9d755b3ee8612c01c5aeee0bb766539c2323f1fdbabe2f95c2fa72bcb37e661b74d3cd95bdf0ec1a9186
-
Filesize
176KB
MD560cb37e6977e0827cca5f5ccc7067b08
SHA1c1f3b308c757552b20dfbcac77a85a09a372a526
SHA256ae1acfc8b6276996042c230c16ce581d242dd9007ca6fa3044c63104f08be9c2
SHA512ee8528fe4a7ab7c25c0ef329b3fe1baaa33e4f798621a246acb86a6327a187c129be738796efe416e030411421d8bb733326594c356fa3fefc359c79c631f4cc
-
Filesize
174KB
MD5e7be301f2c3a4b88a3fdc12c573fd515
SHA13d0a0195fbe314e3ba3c985b5614dcffb956fed5
SHA25696d2f88dcc0707f655922020a6bffc1f005a18d1d3b7207b8eb44f22435d7541
SHA512c85a9d29414cc6eaf872a031468611a5a383a68c1c39026c60345f8c4e3314e181fcef1d7477ddddf961fce08a150aed21de7b8055de3a7c973b1c6d07641cb1
-
Filesize
194KB
MD5d24ca6b94b01c980715f202aed2afc1a
SHA1e68c8f902483079def7e17ac64530c46c0d3d98e
SHA2565dd2f724c6d7c769139832531f76d42a95aa7eaed9e7c2919dc717974ba0c13a
SHA512aa74c884e4eee53f5299ec3af2503903e4a50c0a51f47f0ac705e3f325d28aecf60baad68475736308d83fdd05a924a5fc027f9868b1262c224037b742ec8f1b