Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/03/2025, 03:09
Static task
static1
General
-
Target
04e428b8cc919452e07cae9081618efc.exe
-
Size
25.9MB
-
MD5
04e428b8cc919452e07cae9081618efc
-
SHA1
4c9d1a66a524c1e8a9dcea02bcaa8c75698c0f09
-
SHA256
a6b4d63cfb361f2bbc15e1bb8861b183227f817d3a67fe5ab2b001a1e6011380
-
SHA512
88a3ab0a23ace92ac768ff09e796d226da89c22398dc790d25b257615bf71ce8692cd796bb057487fbc0b3a783148192cbd26e25af901b328ef3e4858fed1238
-
SSDEEP
393216:lR6gS5im4Pu9cuxaIp/ePQ92c4SbeRna5UgMXD/3PAZWiTGxtC4F7RNfa/1:lrS57Kuxdt92bSKRsgJiTG24Zi/1
Malware Config
Extracted
asyncrat
Default
127.0.0.1:3232
103.17.38.43:3232
-
delay
1
-
install
true
-
install_file
chrome.exe
-
install_folder
%AppData%
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
103.17.38.43:4449
192.168.4.182:4449
chrome
-
delay
1
-
install
true
-
install_file
svh.exe
-
install_folder
%AppData%
Extracted
xworm
127.0.0.1:7000
192.168.4.185:7000
192.168.4.182:7000
192.168.4.181:7000
103.17.38.43:7000
103.17.38.40/29:7000
-
Install_directory
%ProgramData%
-
install_file
chrome.exe
Extracted
asyncrat
| Edit by Vinom Rat
Default
127.0.0.1:7707
192.168.4.182:7707
103.17.38.43:7707
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Defender.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/2812-351-0x0000000000CB0000-0x0000000000CBE000-memory.dmp disable_win_def -
Detect Xworm Payload 6 IoCs
resource yara_rule behavioral1/files/0x0007000000015d48-29.dat family_xworm behavioral1/memory/2812-26-0x0000000000CD0000-0x0000000000D06000-memory.dmp family_xworm behavioral1/memory/2556-30-0x0000000000FB0000-0x0000000000FE2000-memory.dmp family_xworm behavioral1/files/0x0008000000015d19-24.dat family_xworm behavioral1/memory/2988-508-0x0000000000100000-0x0000000000136000-memory.dmp family_xworm behavioral1/memory/1192-512-0x00000000010D0000-0x0000000001106000-memory.dmp family_xworm -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" chrome.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection chrome.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" chrome.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" chrome.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" chrome.exe -
resource yara_rule behavioral1/files/0x0008000000015d07-16.dat VenomRAT behavioral1/memory/2736-27-0x0000000001310000-0x0000000001344000-memory.dmp VenomRAT behavioral1/memory/1000-199-0x00000000012C0000-0x00000000012F4000-memory.dmp VenomRAT -
Venomrat family
-
Xworm family
-
Async RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0008000000015cfd-12.dat family_asyncrat behavioral1/files/0x0008000000015d07-16.dat family_asyncrat behavioral1/files/0x00070000000191fd-329.dat family_asyncrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 308 powershell.exe 2028 powershell.exe 1628 powershell.exe 2000 powershell.exe 1960 powershell.exe 956 powershell.exe 2528 powershell.exe 1944 powershell.exe 3004 powershell.exe 2792 powershell.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chrome.lnk chrome1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chrome.lnk chrome1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chrome.lnk chrome2.exe -
Executes dropped EXE 13 IoCs
pid Process 2552 G160.exe 2704 chrome.exe 2736 chrome vecom.exe 2812 chrome2.exe 2556 chrome1.exe 1000 svh.exe 2780 dcbqbe.exe 2148 lvastx.exe 1704 Defender.exe 2280 vnjist.exe 2988 razxwz.exe 1192 chrome.exe 2376 chrome.exe -
Loads dropped DLL 4 IoCs
pid Process 2760 04e428b8cc919452e07cae9081618efc.exe 1012 cmd.exe 1704 Defender.exe 1704 Defender.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features chrome.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\chrome = "C:\\ProgramData\\chrome.exe" chrome1.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\chrome = "C:\\Users\\Admin\\AppData\\Local\\chrome.exe" chrome2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2552 G160.exe 2552 G160.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN G160.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Defender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvastx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2344 timeout.exe 2988 timeout.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\_auto_file\ rundll32.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2984 schtasks.exe 1772 schtasks.exe 2628 schtasks.exe 2056 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2552 G160.exe 2704 chrome.exe 2736 chrome vecom.exe 2736 chrome vecom.exe 2736 chrome vecom.exe 2736 chrome vecom.exe 2736 chrome vecom.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 1960 powershell.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 956 powershell.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2528 powershell.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 1944 powershell.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1440 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeDebugPrivilege 2812 chrome2.exe Token: SeDebugPrivilege 2556 chrome1.exe Token: SeDebugPrivilege 2736 chrome vecom.exe Token: SeDebugPrivilege 2704 chrome.exe Token: SeDebugPrivilege 2736 chrome vecom.exe Token: SeDebugPrivilege 2704 chrome.exe Token: SeDebugPrivilege 1960 powershell.exe Token: SeDebugPrivilege 956 powershell.exe Token: SeDebugPrivilege 2528 powershell.exe Token: SeDebugPrivilege 1944 powershell.exe Token: SeDebugPrivilege 1000 svh.exe Token: SeDebugPrivilege 2556 chrome1.exe Token: SeDebugPrivilege 1000 svh.exe Token: SeDebugPrivilege 3004 powershell.exe Token: SeDebugPrivilege 308 powershell.exe Token: SeDebugPrivilege 2028 powershell.exe Token: SeDebugPrivilege 1628 powershell.exe Token: SeDebugPrivilege 2000 powershell.exe Token: SeDebugPrivilege 2812 chrome2.exe Token: SeDebugPrivilege 2792 powershell.exe Token: SeDebugPrivilege 2780 dcbqbe.exe Token: SeDebugPrivilege 2148 lvastx.exe Token: SeDebugPrivilege 1704 Defender.exe Token: SeDebugPrivilege 1704 Defender.exe Token: SeDebugPrivilege 1432 powershell.exe Token: SeDebugPrivilege 3028 powershell.exe Token: SeDebugPrivilege 2280 vnjist.exe Token: SeDebugPrivilege 2988 razxwz.exe Token: SeDebugPrivilege 1192 chrome.exe Token: SeDebugPrivilege 2376 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2556 chrome1.exe 1000 svh.exe 2812 chrome2.exe 1440 AcroRd32.exe 1440 AcroRd32.exe 1704 Defender.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2552 2760 04e428b8cc919452e07cae9081618efc.exe 31 PID 2760 wrote to memory of 2552 2760 04e428b8cc919452e07cae9081618efc.exe 31 PID 2760 wrote to memory of 2552 2760 04e428b8cc919452e07cae9081618efc.exe 31 PID 2760 wrote to memory of 2704 2760 04e428b8cc919452e07cae9081618efc.exe 32 PID 2760 wrote to memory of 2704 2760 04e428b8cc919452e07cae9081618efc.exe 32 PID 2760 wrote to memory of 2704 2760 04e428b8cc919452e07cae9081618efc.exe 32 PID 2760 wrote to memory of 2736 2760 04e428b8cc919452e07cae9081618efc.exe 33 PID 2760 wrote to memory of 2736 2760 04e428b8cc919452e07cae9081618efc.exe 33 PID 2760 wrote to memory of 2736 2760 04e428b8cc919452e07cae9081618efc.exe 33 PID 2760 wrote to memory of 2812 2760 04e428b8cc919452e07cae9081618efc.exe 34 PID 2760 wrote to memory of 2812 2760 04e428b8cc919452e07cae9081618efc.exe 34 PID 2760 wrote to memory of 2812 2760 04e428b8cc919452e07cae9081618efc.exe 34 PID 2760 wrote to memory of 2556 2760 04e428b8cc919452e07cae9081618efc.exe 35 PID 2760 wrote to memory of 2556 2760 04e428b8cc919452e07cae9081618efc.exe 35 PID 2760 wrote to memory of 2556 2760 04e428b8cc919452e07cae9081618efc.exe 35 PID 2736 wrote to memory of 472 2736 chrome vecom.exe 36 PID 2736 wrote to memory of 472 2736 chrome vecom.exe 36 PID 2736 wrote to memory of 472 2736 chrome vecom.exe 36 PID 2736 wrote to memory of 2868 2736 chrome vecom.exe 38 PID 2736 wrote to memory of 2868 2736 chrome vecom.exe 38 PID 2736 wrote to memory of 2868 2736 chrome vecom.exe 38 PID 472 wrote to memory of 2984 472 cmd.exe 40 PID 472 wrote to memory of 2984 472 cmd.exe 40 PID 472 wrote to memory of 2984 472 cmd.exe 40 PID 2868 wrote to memory of 2988 2868 cmd.exe 41 PID 2868 wrote to memory of 2988 2868 cmd.exe 41 PID 2868 wrote to memory of 2988 2868 cmd.exe 41 PID 2556 wrote to memory of 1960 2556 chrome1.exe 42 PID 2556 wrote to memory of 1960 2556 chrome1.exe 42 PID 2556 wrote to memory of 1960 2556 chrome1.exe 42 PID 2556 wrote to memory of 956 2556 chrome1.exe 44 PID 2556 wrote to memory of 956 2556 chrome1.exe 44 PID 2556 wrote to memory of 956 2556 chrome1.exe 44 PID 2556 wrote to memory of 2528 2556 chrome1.exe 46 PID 2556 wrote to memory of 2528 2556 chrome1.exe 46 PID 2556 wrote to memory of 2528 2556 chrome1.exe 46 PID 2556 wrote to memory of 1944 2556 chrome1.exe 48 PID 2556 wrote to memory of 1944 2556 chrome1.exe 48 PID 2556 wrote to memory of 1944 2556 chrome1.exe 48 PID 2868 wrote to memory of 1000 2868 cmd.exe 50 PID 2868 wrote to memory of 1000 2868 cmd.exe 50 PID 2868 wrote to memory of 1000 2868 cmd.exe 50 PID 2556 wrote to memory of 1772 2556 chrome1.exe 51 PID 2556 wrote to memory of 1772 2556 chrome1.exe 51 PID 2556 wrote to memory of 1772 2556 chrome1.exe 51 PID 2704 wrote to memory of 1444 2704 chrome.exe 54 PID 2704 wrote to memory of 1444 2704 chrome.exe 54 PID 2704 wrote to memory of 1444 2704 chrome.exe 54 PID 1444 wrote to memory of 3004 1444 cmd.exe 56 PID 1444 wrote to memory of 3004 1444 cmd.exe 56 PID 1444 wrote to memory of 3004 1444 cmd.exe 56 PID 3004 wrote to memory of 352 3004 powershell.exe 57 PID 3004 wrote to memory of 352 3004 powershell.exe 57 PID 3004 wrote to memory of 352 3004 powershell.exe 57 PID 2812 wrote to memory of 308 2812 chrome2.exe 58 PID 2812 wrote to memory of 308 2812 chrome2.exe 58 PID 2812 wrote to memory of 308 2812 chrome2.exe 58 PID 2812 wrote to memory of 2028 2812 chrome2.exe 60 PID 2812 wrote to memory of 2028 2812 chrome2.exe 60 PID 2812 wrote to memory of 2028 2812 chrome2.exe 60 PID 2812 wrote to memory of 1628 2812 chrome2.exe 62 PID 2812 wrote to memory of 1628 2812 chrome2.exe 62 PID 2812 wrote to memory of 1628 2812 chrome2.exe 62 PID 2812 wrote to memory of 2000 2812 chrome2.exe 64 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\04e428b8cc919452e07cae9081618efc.exe"C:\Users\Admin\AppData\Local\Temp\04e428b8cc919452e07cae9081618efc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Roaming\G160.exe"C:\Users\Admin\AppData\Roaming\G160.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
PID:2552
-
-
C:\Users\Admin\AppData\Roaming\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome.exe"2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\stydin"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\stydin"'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\stydin5⤵
- Modifies registry class
PID:352 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\stydin"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1440
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\ecmwck"' & exit3⤵PID:1960
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\ecmwck"'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2792 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ecmwck5⤵
- Modifies registry class
PID:2920 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ecmwck"6⤵
- System Location Discovery: System Language Discovery
PID:996
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add - MpPreference - ExclusionExtension ".exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
-
C:\Users\Admin\AppData\Roaming\chrome vecom.exe"C:\Users\Admin\AppData\Roaming\chrome vecom.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svh" /tr '"C:\Users\Admin\AppData\Roaming\svh.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svh" /tr '"C:\Users\Admin\AppData\Roaming\svh.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:2984
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpF882.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:2988
-
-
C:\Users\Admin\AppData\Roaming\svh.exe"C:\Users\Admin\AppData\Roaming\svh.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1000
-
-
-
-
C:\Users\Admin\AppData\Roaming\chrome2.exe"C:\Users\Admin\AppData\Roaming\chrome2.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\chrome2.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:308
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome2.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\chrome.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "chrome" /tr "C:\Users\Admin\AppData\Local\chrome.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\dcbqbe.exe"C:\Users\Admin\AppData\Local\Temp\dcbqbe.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Users\Admin\AppData\Local\Temp\lvastx.exe"C:\Users\Admin\AppData\Local\Temp\lvastx.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2148 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Defender" /tr '"C:\Users\Admin\AppData\Roaming\Defender.exe"' & exit4⤵
- System Location Discovery: System Language Discovery
PID:2836 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Defender" /tr '"C:\Users\Admin\AppData\Roaming\Defender.exe"'5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2056
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp671C.tmp.bat""4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1012 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2344
-
-
C:\Users\Admin\AppData\Roaming\Defender.exe"C:\Users\Admin\AppData\Roaming\Defender.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\vnjist.exe"C:\Users\Admin\AppData\Local\Temp\vnjist.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\razxwz.exe"C:\Users\Admin\AppData\Local\Temp\razxwz.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\chrome1.exe"C:\Users\Admin\AppData\Roaming\chrome1.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\chrome1.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome1.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\chrome.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "chrome" /tr "C:\ProgramData\chrome.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1772
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D478002C-D25A-4C95-8400-190AA06F23C0} S-1-5-21-312935884-697965778-3955649944-1000:MXQFNXLT\Admin:Interactive:[1]1⤵PID:1656
-
C:\Users\Admin\AppData\Local\chrome.exeC:\Users\Admin\AppData\Local\chrome.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
C:\Users\Admin\AppData\Local\chrome.exeC:\Users\Admin\AppData\Local\chrome.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5263d4d157d993e0cac5b1d2b30bc8a1c
SHA1754795a7b4e2819e627b32ff946f05f31aea77be
SHA256f803b865b04d4c1d6929e325cc963ccc990bfafbb735e455841e711c9060089a
SHA51290b31568f68ed19a3614b7db52a3fe92755d05248195d85feb4e3f8e6cb54602ed97f14fce3f6b7d4b0c20bf8420b4f8152c776aceac523b27f26e4c30688f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554127a4d7fe1912657f0e75bc0160964
SHA1139ea9f9c5a87304df4a17397193cc60e6bc46f9
SHA256232e27f9317567e9888aa22942c7ebd0fcd2410da6e25d58c7b16e2d0a0ffb30
SHA51259218a8d2b5c40f1f3afa25dbbbf2fa38bb2380a1742efd14a60c1cedd50c62578cef7d0fc089477dc1156eb0a9cffc5818545169a864f49d5c6a5298b7af41d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527714d41d7de48821a09436508554c0a
SHA1c8804c72fd951a7cd761d9d89f9975072d7e43c7
SHA2566fdebb623f6b70efa84e0a9f75ac4e0658779601d09ab410443d269715df21ca
SHA512ca836472a84037d10a0e285f65d72312fc6f860df289a577dd91190fd22100493b8dad44d53606d804e33d86187dfc492fed69f0192d7b62d0b0cd7d14a8c4ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5515b27bdc6a09f19d234dfed97a6f2c1
SHA152cd148e2fc2b267465158ac3682ededcc917cb8
SHA256902eddcbde9aeeb2c056292162b3a98dc48adc3540d47af88117cb9aebe2e485
SHA5125b8e3b2716cc321d85b733e24114fcf863b36d4447120dcfe41244d2ed2730d2fd01cf21b8b60066a1963c9b3e3c57f47ef9e83cf941a541c69494cbe3b0e706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a54de0d27dfac16803083460cce08a6
SHA1988bfedca941833e993e1dacc3e7771d69ae52ef
SHA25648d47a21dceb13b9d5cb40f6db77d402df9196ebb2de5993dd9793e260b781ed
SHA51226bdce5bc842502143b36cd3e4675260c6a3c6e2590aca63bd97bd0656387e1ff584d9544bb4122f046cf80fbf58b4949cef70dd1bc51c775dde35e0d8a3dd06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b788328773f891a2d4571b8c3218168e
SHA13d3bf93f93c35a16003ec9d5496c85914d98d230
SHA2561585e9cc3159084403e9386ff717ef06955c03fd75355fb0763cb11211697292
SHA512080a07439cd4a7af0a517169040aad94784cf6334708d166bbc50b438c3315e09e20bb7145f71e31843b08c36229473985b0452eb59aa2e9b84fb9e6465ccccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5462b0d6807af19a79021be2edde56bc6
SHA16d30a0b474e986da0ba94c481fc1368967460d30
SHA256d8adf68c3015a741554610d063a92ef18d337e4bd939566197332564fcdd348c
SHA5123c39c9111be64037720eeb0bb9896df007ee5682fd87d4fa93ad3d3a39c51a6c2a0c3db15ac7bb9f503fa92901fde7124b95491dc1ce6bdba366007a361f9c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540085aa95a59a01d1854517e868faa2b
SHA18ebc84794e42ff3267140399883b240fa9ee092e
SHA256dc771b417a7d4310e8cb43f7b4095adc58ea6cb501b34748a551048965bb4bd8
SHA51204ad80c51c8c9fea778d6ec3a755fa87b99c4539db670b15dc7df0a3d060ffef57fb09e3a114f6c45b80e0ec42cd3f912dd695bc4ce8d18dcf36c965aa95713c
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
167KB
MD54bb693dfbe9bf0d0f116cff62b927a2e
SHA1ed81c78373598d93f5cfdfead9ce617aeab01cf8
SHA25607f8a2b36fb269213914b1b4e1c5d65afabefec3b8d92492d23f0ba1254bac26
SHA512788321002f57a035cef511f9c1e667e59a3c32a93c3777f5fed23f8fda1d278127d979e7dc9be81f8bf5b942aa14cc9a5daa2148cf2e5f6a4649be5638580ae5
-
Filesize
152B
MD5c233125c222f8cc6bd67377108983102
SHA1c97202151597b3ac1f69023f89eb5354f05b8d06
SHA25614f156452f555d7bebbd450f66aa845b2e496cf83efb9fbf4c74be041241310f
SHA512413172153a19d13249bafce9757ffee9db8036c3f46409a7c694880f0c7da0f349b4c72137627184cdc1d2911df984fcd85cb94547d38c9ec399c0211e2358cc
-
Filesize
147B
MD5b78f43477313b4f9c60a6a94532c602d
SHA10ae6ce56e1e7ff09255bf39cb670f3f15bb54f62
SHA256da27ddc4361fa201816e2e3abc7013f0b1e63595e8b73c8fccc525e35445cccc
SHA512030cce226928a68d0abf31bc055b733d17151cee1c2210424d3504f514b8c401f73a390c4d1c20b6b6ea9b4f3a90ad60e9c7b9c91596007ac8fdd950c5bfbc56
-
Filesize
3KB
MD525c48335bdb9f10a5c4f5a176d562785
SHA107eb3edc3af0da9738faccc7a063ce2794a5d6ff
SHA256f7c02d51c039b88018316db7c9a69dea6d89563c32781da387301935e2704a84
SHA5128cd203513991816157c26d37a34e34ea6b03718c5006cf0907c26ee11d553303829988dfa20f5577fb22e48bc8d3c4b55452d6893fe1aee621d6f9138055ba98
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD51bd0069789be9f578595944f7cd4f9e8
SHA19d24e7ab9aefa729e0002c1f423a74613a4b8ec0
SHA2561af113fe4e4cb6c356c9caff33961c7799d0ec198c85dd2137cb2902b4b4bfdc
SHA51202990545b4d7f63fe311efea177c4a02a4c011b0009df02087ba0d4df214ceb69d3adbfa7e208c09313886e7d4e07a2a0dea5192422885fb2935ed012d9337b9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5b8c17a26d3574afe73ae3f1da6479e11
SHA19ebb747bcfd8953c882c7abeda9881d7328b9f60
SHA25678e7743d27fea940ebe8040e7cbe9e6825064a070bb5b901396e5b2f480df7e6
SHA512a105471982eb122303867d0f780910597ec81aeae93f4b6791c79f97f6310cc6a08d3afbdba4bfaae35dae39dfecd33916e918386cabe2c59cb95c9fee970f1e
-
Filesize
628B
MD5730f6a38137e195b1f255cf66ed53b51
SHA1279b2a6d0d7d9e692993edab65f199d5aacc604f
SHA25616a87f3d53b9676565f27822ec276ac271e8023af60594079e31a9a63f1aaa52
SHA512ec758805d427b5855010e9469e171711934adb8dfc71c37fdf6cae43bcd2bcb19baf34d67dc7eb9339588e2383e8b86778456e0c8a45b28463ac21906edaefe9
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
187KB
MD5f16744580bc9d4a51f5af484d2c3c65c
SHA1729f833612d72845e4c97b42c90d126928809db4
SHA25656d565760b89b9259743d216b61800067ee6819c2bef561d65984800ec64ca2a
SHA512e047562a698ee280a3638af1551639538cea5ac76def9d755b3ee8612c01c5aeee0bb766539c2323f1fdbabe2f95c2fa72bcb37e661b74d3cd95bdf0ec1a9186
-
Filesize
176KB
MD560cb37e6977e0827cca5f5ccc7067b08
SHA1c1f3b308c757552b20dfbcac77a85a09a372a526
SHA256ae1acfc8b6276996042c230c16ce581d242dd9007ca6fa3044c63104f08be9c2
SHA512ee8528fe4a7ab7c25c0ef329b3fe1baaa33e4f798621a246acb86a6327a187c129be738796efe416e030411421d8bb733326594c356fa3fefc359c79c631f4cc
-
Filesize
174KB
MD5e7be301f2c3a4b88a3fdc12c573fd515
SHA13d0a0195fbe314e3ba3c985b5614dcffb956fed5
SHA25696d2f88dcc0707f655922020a6bffc1f005a18d1d3b7207b8eb44f22435d7541
SHA512c85a9d29414cc6eaf872a031468611a5a383a68c1c39026c60345f8c4e3314e181fcef1d7477ddddf961fce08a150aed21de7b8055de3a7c973b1c6d07641cb1
-
Filesize
194KB
MD5d24ca6b94b01c980715f202aed2afc1a
SHA1e68c8f902483079def7e17ac64530c46c0d3d98e
SHA2565dd2f724c6d7c769139832531f76d42a95aa7eaed9e7c2919dc717974ba0c13a
SHA512aa74c884e4eee53f5299ec3af2503903e4a50c0a51f47f0ac705e3f325d28aecf60baad68475736308d83fdd05a924a5fc027f9868b1262c224037b742ec8f1b
-
Filesize
25.1MB
MD5ed8d8078866b64f59d97276f5725168f
SHA11195dde78e8e64b5aec5466f777a71261652e890
SHA256d6b3b4f34df598fa13c637680d57b68aca1414c16a7480fb45a34fa26e203a8b
SHA512c9ef5bde60109be58c4889b3403169dc78806eb34af5b13932df48b756597a9d6265f676fcc9f7c13f73d0188a3089ea16dce1d3b626dea8c0bf82c4dd5d44d7