Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2025, 03:09
Static task
static1
General
-
Target
04e428b8cc919452e07cae9081618efc.exe
-
Size
25.9MB
-
MD5
04e428b8cc919452e07cae9081618efc
-
SHA1
4c9d1a66a524c1e8a9dcea02bcaa8c75698c0f09
-
SHA256
a6b4d63cfb361f2bbc15e1bb8861b183227f817d3a67fe5ab2b001a1e6011380
-
SHA512
88a3ab0a23ace92ac768ff09e796d226da89c22398dc790d25b257615bf71ce8692cd796bb057487fbc0b3a783148192cbd26e25af901b328ef3e4858fed1238
-
SSDEEP
393216:lR6gS5im4Pu9cuxaIp/ePQ92c4SbeRna5UgMXD/3PAZWiTGxtC4F7RNfa/1:lrS57Kuxdt92bSKRsgJiTG24Zi/1
Malware Config
Extracted
xworm
127.0.0.1:7000
192.168.4.185:7000
192.168.4.182:7000
192.168.4.181:7000
103.17.38.43:7000
103.17.38.40/29:7000
-
Install_directory
%ProgramData%
-
install_file
chrome.exe
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
103.17.38.43:4449
192.168.4.182:4449
chrome
-
delay
1
-
install
true
-
install_file
svh.exe
-
install_folder
%AppData%
Extracted
asyncrat
Default
127.0.0.1:3232
103.17.38.43:3232
-
delay
1
-
install
true
-
install_file
chrome.exe
-
install_folder
%AppData%
Extracted
asyncrat
| Edit by Vinom Rat
Default
127.0.0.1:7707
192.168.4.182:7707
103.17.38.43:7707
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Defender.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/3312-237-0x000000001CB10000-0x000000001CB1E000-memory.dmp disable_win_def -
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral2/files/0x0007000000023d60-38.dat family_xworm behavioral2/files/0x0007000000023d61-49.dat family_xworm behavioral2/memory/3312-62-0x0000000000A80000-0x0000000000AB2000-memory.dmp family_xworm behavioral2/memory/4800-61-0x0000000000AE0000-0x0000000000B16000-memory.dmp family_xworm -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" chrome.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection chrome.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" chrome.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" chrome.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" chrome.exe -
resource yara_rule behavioral2/files/0x0007000000023d5f-26.dat VenomRAT behavioral2/memory/2428-56-0x0000000000320000-0x0000000000354000-memory.dmp VenomRAT -
Venomrat family
-
Xworm family
-
Async RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023d5b-17.dat family_asyncrat behavioral2/files/0x0007000000023d5f-26.dat family_asyncrat behavioral2/files/0x0008000000023d7d-250.dat family_asyncrat -
pid Process 1760 powershell.exe 4592 powershell.exe 3900 powershell.exe 3096 powershell.exe 4448 powershell.exe 2280 powershell.exe 2624 powershell.exe 3552 powershell.exe 1372 powershell.exe 2668 powershell.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation Defender.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation 04e428b8cc919452e07cae9081618efc.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation chrome vecom.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation chrome1.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation chrome2.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation ipujpf.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chrome.lnk chrome1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chrome.lnk chrome1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chrome.lnk chrome2.exe -
Executes dropped EXE 13 IoCs
pid Process 2604 G160.exe 5000 chrome.exe 2428 chrome vecom.exe 4800 chrome2.exe 3312 chrome1.exe 2004 svh.exe 2276 hvtdxo.exe 680 ipujpf.exe 2256 Defender.exe 1784 chrome.exe 3160 syywrt.exe 440 wjjcpt.exe 3092 chrome.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" chrome.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\chrome = "C:\\ProgramData\\chrome.exe" chrome1.exe Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\chrome = "C:\\Users\\Admin\\AppData\\Local\\chrome.exe" chrome2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2604 G160.exe 2604 G160.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN G160.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipujpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Defender.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3120 timeout.exe 3224 timeout.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000_Classes\Local Settings powershell.exe Key created \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000_Classes\Local Settings powershell.exe Key created \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000_Classes\Local Settings OpenWith.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2216 schtasks.exe 1924 schtasks.exe 2680 schtasks.exe 1384 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 5000 chrome.exe 2428 chrome vecom.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 5000 chrome.exe 5000 chrome.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 5000 chrome.exe 5000 chrome.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 5000 chrome.exe 5000 chrome.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 5000 chrome.exe 5000 chrome.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 2428 chrome vecom.exe 5000 chrome.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeDebugPrivilege 2428 chrome vecom.exe Token: SeDebugPrivilege 4800 chrome2.exe Token: SeDebugPrivilege 3312 chrome1.exe Token: SeDebugPrivilege 5000 chrome.exe Token: SeDebugPrivilege 5000 chrome.exe Token: SeDebugPrivilege 2428 chrome vecom.exe Token: SeDebugPrivilege 1372 powershell.exe Token: SeDebugPrivilege 2668 powershell.exe Token: SeDebugPrivilege 3900 powershell.exe Token: SeDebugPrivilege 2004 svh.exe Token: SeDebugPrivilege 3096 powershell.exe Token: SeDebugPrivilege 2004 svh.exe Token: SeDebugPrivilege 3312 chrome1.exe Token: SeDebugPrivilege 4448 powershell.exe Token: SeDebugPrivilege 2280 powershell.exe Token: SeDebugPrivilege 2624 powershell.exe Token: SeDebugPrivilege 3552 powershell.exe Token: SeDebugPrivilege 4800 chrome2.exe Token: SeDebugPrivilege 1760 powershell.exe Token: SeDebugPrivilege 2276 hvtdxo.exe Token: SeDebugPrivilege 4592 powershell.exe Token: SeDebugPrivilege 680 ipujpf.exe Token: SeDebugPrivilege 2256 Defender.exe Token: SeDebugPrivilege 2256 Defender.exe Token: SeDebugPrivilege 4592 powershell.exe Token: SeDebugPrivilege 4100 powershell.exe Token: SeDebugPrivilege 1784 chrome.exe Token: SeDebugPrivilege 3160 syywrt.exe Token: SeDebugPrivilege 440 wjjcpt.exe Token: SeDebugPrivilege 3092 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2004 svh.exe 3312 chrome1.exe 4800 chrome2.exe 2024 OpenWith.exe 2680 OpenWith.exe 2256 Defender.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4332 wrote to memory of 2604 4332 04e428b8cc919452e07cae9081618efc.exe 88 PID 4332 wrote to memory of 2604 4332 04e428b8cc919452e07cae9081618efc.exe 88 PID 4332 wrote to memory of 5000 4332 04e428b8cc919452e07cae9081618efc.exe 89 PID 4332 wrote to memory of 5000 4332 04e428b8cc919452e07cae9081618efc.exe 89 PID 4332 wrote to memory of 2428 4332 04e428b8cc919452e07cae9081618efc.exe 90 PID 4332 wrote to memory of 2428 4332 04e428b8cc919452e07cae9081618efc.exe 90 PID 4332 wrote to memory of 4800 4332 04e428b8cc919452e07cae9081618efc.exe 91 PID 4332 wrote to memory of 4800 4332 04e428b8cc919452e07cae9081618efc.exe 91 PID 4332 wrote to memory of 3312 4332 04e428b8cc919452e07cae9081618efc.exe 92 PID 4332 wrote to memory of 3312 4332 04e428b8cc919452e07cae9081618efc.exe 92 PID 2428 wrote to memory of 2964 2428 chrome vecom.exe 93 PID 2428 wrote to memory of 2964 2428 chrome vecom.exe 93 PID 2428 wrote to memory of 4008 2428 chrome vecom.exe 94 PID 2428 wrote to memory of 4008 2428 chrome vecom.exe 94 PID 2964 wrote to memory of 2680 2964 cmd.exe 97 PID 2964 wrote to memory of 2680 2964 cmd.exe 97 PID 3312 wrote to memory of 1372 3312 chrome1.exe 98 PID 3312 wrote to memory of 1372 3312 chrome1.exe 98 PID 4008 wrote to memory of 3120 4008 cmd.exe 99 PID 4008 wrote to memory of 3120 4008 cmd.exe 99 PID 3312 wrote to memory of 2668 3312 chrome1.exe 103 PID 3312 wrote to memory of 2668 3312 chrome1.exe 103 PID 3312 wrote to memory of 3900 3312 chrome1.exe 107 PID 3312 wrote to memory of 3900 3312 chrome1.exe 107 PID 4008 wrote to memory of 2004 4008 cmd.exe 109 PID 4008 wrote to memory of 2004 4008 cmd.exe 109 PID 3312 wrote to memory of 3096 3312 chrome1.exe 110 PID 3312 wrote to memory of 3096 3312 chrome1.exe 110 PID 3312 wrote to memory of 1384 3312 chrome1.exe 112 PID 3312 wrote to memory of 1384 3312 chrome1.exe 112 PID 4800 wrote to memory of 4448 4800 chrome2.exe 117 PID 4800 wrote to memory of 4448 4800 chrome2.exe 117 PID 4800 wrote to memory of 2280 4800 chrome2.exe 119 PID 4800 wrote to memory of 2280 4800 chrome2.exe 119 PID 4800 wrote to memory of 2624 4800 chrome2.exe 121 PID 4800 wrote to memory of 2624 4800 chrome2.exe 121 PID 4800 wrote to memory of 3552 4800 chrome2.exe 123 PID 4800 wrote to memory of 3552 4800 chrome2.exe 123 PID 4800 wrote to memory of 2216 4800 chrome2.exe 125 PID 4800 wrote to memory of 2216 4800 chrome2.exe 125 PID 5000 wrote to memory of 2904 5000 chrome.exe 127 PID 5000 wrote to memory of 2904 5000 chrome.exe 127 PID 2904 wrote to memory of 1760 2904 cmd.exe 129 PID 2904 wrote to memory of 1760 2904 cmd.exe 129 PID 3312 wrote to memory of 2276 3312 chrome1.exe 132 PID 3312 wrote to memory of 2276 3312 chrome1.exe 132 PID 3312 wrote to memory of 680 3312 chrome1.exe 133 PID 3312 wrote to memory of 680 3312 chrome1.exe 133 PID 3312 wrote to memory of 680 3312 chrome1.exe 133 PID 5000 wrote to memory of 4644 5000 chrome.exe 135 PID 5000 wrote to memory of 4644 5000 chrome.exe 135 PID 4644 wrote to memory of 4592 4644 cmd.exe 137 PID 4644 wrote to memory of 4592 4644 cmd.exe 137 PID 680 wrote to memory of 3220 680 ipujpf.exe 139 PID 680 wrote to memory of 3220 680 ipujpf.exe 139 PID 680 wrote to memory of 3220 680 ipujpf.exe 139 PID 680 wrote to memory of 4768 680 ipujpf.exe 141 PID 680 wrote to memory of 4768 680 ipujpf.exe 141 PID 680 wrote to memory of 4768 680 ipujpf.exe 141 PID 4768 wrote to memory of 3224 4768 cmd.exe 143 PID 4768 wrote to memory of 3224 4768 cmd.exe 143 PID 4768 wrote to memory of 3224 4768 cmd.exe 143 PID 3220 wrote to memory of 1924 3220 cmd.exe 144 PID 3220 wrote to memory of 1924 3220 cmd.exe 144 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\04e428b8cc919452e07cae9081618efc.exe"C:\Users\Admin\AppData\Local\Temp\04e428b8cc919452e07cae9081618efc.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Roaming\G160.exe"C:\Users\Admin\AppData\Roaming\G160.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks for VirtualBox DLLs, possible anti-VM trick
PID:2604
-
-
C:\Users\Admin\AppData\Roaming\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome.exe"2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\cvddeo"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\cvddeo"'4⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\grlufx"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\grlufx"'4⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add - MpPreference - ExclusionExtension ".exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4100
-
-
-
C:\Users\Admin\AppData\Roaming\chrome vecom.exe"C:\Users\Admin\AppData\Roaming\chrome vecom.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svh" /tr '"C:\Users\Admin\AppData\Roaming\svh.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svh" /tr '"C:\Users\Admin\AppData\Roaming\svh.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:2680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpD6C8.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:3120
-
-
C:\Users\Admin\AppData\Roaming\svh.exe"C:\Users\Admin\AppData\Roaming\svh.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2004
-
-
-
-
C:\Users\Admin\AppData\Roaming\chrome2.exe"C:\Users\Admin\AppData\Roaming\chrome2.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\chrome2.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome2.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\chrome.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "chrome" /tr "C:\Users\Admin\AppData\Local\chrome.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2216
-
-
-
C:\Users\Admin\AppData\Roaming\chrome1.exe"C:\Users\Admin\AppData\Roaming\chrome1.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\chrome1.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome1.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\chrome.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3900
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "chrome" /tr "C:\ProgramData\chrome.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1384
-
-
C:\Users\Admin\AppData\Local\Temp\hvtdxo.exe"C:\Users\Admin\AppData\Local\Temp\hvtdxo.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\ipujpf.exe"C:\Users\Admin\AppData\Local\Temp\ipujpf.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Defender" /tr '"C:\Users\Admin\AppData\Roaming\Defender.exe"' & exit4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Defender" /tr '"C:\Users\Admin\AppData\Roaming\Defender.exe"'5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp4F54.tmp.bat""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3224
-
-
C:\Users\Admin\AppData\Roaming\Defender.exe"C:\Users\Admin\AppData\Roaming\Defender.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\syywrt.exe"C:\Users\Admin\AppData\Local\Temp\syywrt.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3160
-
-
C:\Users\Admin\AppData\Local\Temp\wjjcpt.exe"C:\Users\Admin\AppData\Local\Temp\wjjcpt.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2024
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2680
-
C:\Users\Admin\AppData\Local\chrome.exeC:\Users\Admin\AppData\Local\chrome.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
C:\Users\Admin\AppData\Local\chrome.exeC:\Users\Admin\AppData\Local\chrome.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3092
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
Filesize
944B
MD5ae3b439d2d295d6e4c5fb2dc141ee97f
SHA192f6f35e58178dad7509daed385663a688234037
SHA256f7b7916a3c816b24aeb55680a9458554909ad3774baee2e979512aeb90d393db
SHA5125372aa4736648884fe32e1ff57990f6c73736c77ff5f14ea064867b542793fcf7c6ac625150e11f21c39a163366c6735dadb9de0f94f1dfe6a25a9cc24f69e58
-
Filesize
944B
MD5b51dc9e5ec3c97f72b4ca9488bbb4462
SHA15c1e8c0b728cd124edcacefb399bbd5e25b21bd3
SHA256976f9534aa2976c85c2455bdde786a3f55d63aefdd40942eba1223c4c93590db
SHA5120e5aa6cf64c535aefb833e5757b68e1094c87424abe2615a7d7d26b1b31eff358d12e36e75ca57fd690a9919b776600bf4c5c0e5a5df55366ba62238bdf3f280
-
Filesize
944B
MD515dde0683cd1ca19785d7262f554ba93
SHA1d039c577e438546d10ac64837b05da480d06bf69
SHA256d6fa39eab7ee36f44dc3f9f2839d098433db95c1eba924e4bcf4e5c0d268d961
SHA51257c0e1b87bc1c136f0d39f3ce64bb8f8274a0491e4ca6e45e5c7f9070aa9d9370c6f590ce37cd600b252df2638d870205249a514c43245ca7ed49017024a4672
-
Filesize
944B
MD534f595487e6bfd1d11c7de88ee50356a
SHA14caad088c15766cc0fa1f42009260e9a02f953bb
SHA2560f9a4b52e01cb051052228a55d0515911b7ef5a8db3cf925528c746df511424d
SHA51210976c5deaf9fac449e703e852c3b08d099f430de2d7c7b8e2525c35d63e28b890e5aab63feff9b20bca0aaf9f35a3ba411aee3fbeee9ea59f90ed25bd617a0b
-
Filesize
944B
MD504f1d68afbed6b13399edfae1e9b1472
SHA18bfdcb687a995e4a63a8c32df2c66dc89f91a8b0
SHA256f358f33a42122e97c489fad7bbc8beab2eb42d42e4ec7fce0dd61fe6d8c0b8de
SHA51230c5e72a8134992094d937d2588f7a503b1d6407d11afe0265b7c8b0ce14071925e5caed13fc4f9c28705df4c7aed3601f81b007048b148af274d7784aa5fb75
-
Filesize
944B
MD5e7cebf3b7ef4a6001988e0da1e82cc1d
SHA1c4345e45710589200d39b79d407fc370be963296
SHA2561bcc9d14f60f45002c38384b6765a0d9462ae90abf7c954d24a997f0167e325d
SHA512d3bb57029ac793c37be4f673c1d7d67202235b72d12e5e42f7dc46e82f0e4cf179b9048a930bb9f076a82686c5014b337245928c04873448bfc55e7769cffa31
-
Filesize
64B
MD5db7eee3b86f6530ba7edc8d87581ad85
SHA1e703f6a6f15f68b4046564b1403d8a5093c14897
SHA2564b7d0e3f0a5997d43fee330dfcdc54b7a0faa81af558ddb49d3c50c900ef3496
SHA5127285fa0e2f6e78053f658aaec5db6f09b10e350b43b379ea8231db58c3684c7b864a4e37e8eadf5ea52511650001809a4348620be67d13a7bf5b50e3d2af6a23
-
Filesize
944B
MD596ff1ee586a153b4e7ce8661cabc0442
SHA1140d4ff1840cb40601489f3826954386af612136
SHA2560673399a2f37c89d455e8658c4d30b9248bff1ea47ba40957588e2bc862976e8
SHA5123404370d0edb4ead4874ce68525dc9bcbc6008003682646e331bf43a06a24a467ace7eff5be701a822d74c7e065d0f6a0ba0e3d6bc505d34d0189373dcacb569
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
167KB
MD54bb693dfbe9bf0d0f116cff62b927a2e
SHA1ed81c78373598d93f5cfdfead9ce617aeab01cf8
SHA25607f8a2b36fb269213914b1b4e1c5d65afabefec3b8d92492d23f0ba1254bac26
SHA512788321002f57a035cef511f9c1e667e59a3c32a93c3777f5fed23f8fda1d278127d979e7dc9be81f8bf5b942aa14cc9a5daa2148cf2e5f6a4649be5638580ae5
-
Filesize
152B
MD5443e1720521c5deb458a9f4bc3bd376e
SHA1ae71250d3d9240e9cab63d1481285b79a5d6d667
SHA25678d370ff1ecef135bb1a4b96ae9f50dbfc8036d613f54270e35b819f2e6da5ab
SHA51269f9a7e2e19cdfcb94eb9a069c7f8e6b6d004c927a18adf970101bc505ef5b84077cc88d000b24efa8faf13e34a7456ed64e0d0bb3d4a77cff83f61e9bf9c58c
-
Filesize
147B
MD5a115da9b8cc2ecec01de7713aff99b1e
SHA15db7bb12278af125eee445802b6deea3e90847c8
SHA256146fb5596ddab2ddcef597aa7200d20e961c63db33268354a6b7329a30a03746
SHA5129d211f34fdeb04edffb978fbd52961fccec84d1d4f1dea774d1fd6d91a6bb9bb156bb4472b0a2912440a3350b619840e71860319d303eea329a41a98ccb232b2
-
Filesize
25.1MB
MD5ed8d8078866b64f59d97276f5725168f
SHA11195dde78e8e64b5aec5466f777a71261652e890
SHA256d6b3b4f34df598fa13c637680d57b68aca1414c16a7480fb45a34fa26e203a8b
SHA512c9ef5bde60109be58c4889b3403169dc78806eb34af5b13932df48b756597a9d6265f676fcc9f7c13f73d0188a3089ea16dce1d3b626dea8c0bf82c4dd5d44d7
-
Filesize
665B
MD5819884f44e2518c1d855489c9bb5c268
SHA1299a31fe21619765be9357ce4e1dbb4ff3462010
SHA25605c5455180dab7e2e81f0c4feef40242176dcc75ff67ebc78ae57372479c6833
SHA5127bd93d17dce0f9253f5b8c62b990c6cb78cbdefc8237bc9369b1a757234a7f1c226b206fd664b13fab31ac379aaa4ac5aa04bc7208c6768e124c689db237cefb
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
187KB
MD5f16744580bc9d4a51f5af484d2c3c65c
SHA1729f833612d72845e4c97b42c90d126928809db4
SHA25656d565760b89b9259743d216b61800067ee6819c2bef561d65984800ec64ca2a
SHA512e047562a698ee280a3638af1551639538cea5ac76def9d755b3ee8612c01c5aeee0bb766539c2323f1fdbabe2f95c2fa72bcb37e661b74d3cd95bdf0ec1a9186
-
Filesize
176KB
MD560cb37e6977e0827cca5f5ccc7067b08
SHA1c1f3b308c757552b20dfbcac77a85a09a372a526
SHA256ae1acfc8b6276996042c230c16ce581d242dd9007ca6fa3044c63104f08be9c2
SHA512ee8528fe4a7ab7c25c0ef329b3fe1baaa33e4f798621a246acb86a6327a187c129be738796efe416e030411421d8bb733326594c356fa3fefc359c79c631f4cc
-
Filesize
174KB
MD5e7be301f2c3a4b88a3fdc12c573fd515
SHA13d0a0195fbe314e3ba3c985b5614dcffb956fed5
SHA25696d2f88dcc0707f655922020a6bffc1f005a18d1d3b7207b8eb44f22435d7541
SHA512c85a9d29414cc6eaf872a031468611a5a383a68c1c39026c60345f8c4e3314e181fcef1d7477ddddf961fce08a150aed21de7b8055de3a7c973b1c6d07641cb1
-
Filesize
194KB
MD5d24ca6b94b01c980715f202aed2afc1a
SHA1e68c8f902483079def7e17ac64530c46c0d3d98e
SHA2565dd2f724c6d7c769139832531f76d42a95aa7eaed9e7c2919dc717974ba0c13a
SHA512aa74c884e4eee53f5299ec3af2503903e4a50c0a51f47f0ac705e3f325d28aecf60baad68475736308d83fdd05a924a5fc027f9868b1262c224037b742ec8f1b