Overview
overview
10Static
static
5My-Skidded...in.zip
windows11-21h2-x64
1My-Skidded...f2.exe
windows11-21h2-x64
8My-Skidded...Us.vbs
windows11-21h2-x64
1My-Skidded...AT.exe
windows11-21h2-x64
10My-Skidded...UN.exe
windows11-21h2-x64
10My-Skidded...no.exe
windows11-21h2-x64
6My-Skidded...!!.zip
windows11-21h2-x64
1My-Skidded...MK.exe
windows11-21h2-x64
My-Skidded...ck.vbs
windows11-21h2-x64
1My-Skidded...it.exe
windows11-21h2-x64
7My-Skidded... 2.bat
windows11-21h2-x64
3My-Skidded...OR.vbs
windows11-21h2-x64
1My-Skidded...ge.exe
windows11-21h2-x64
My-Skidded...ck.exe
windows11-21h2-x64
10My-Skidded...BR.exe
windows11-21h2-x64
My-Skidded...ba.vbs
windows11-21h2-x64
1My-Skidded...ad.exe
windows11-21h2-x64
My-Skidded...BR.exe
windows11-21h2-x64
6My-Skidded...AL.exe
windows11-21h2-x64
6My-Skidded...en.exe
windows11-21h2-x64
6My-Skidded...in.exe
windows11-21h2-x64
6My-Skidded...BR.exe
windows11-21h2-x64
My-Skidded...64.exe
windows11-21h2-x64
My-Skidded...64.exe
windows11-21h2-x64
10My-Skidded...24.exe
windows11-21h2-x64
10My-Skidded...DME.md
windows11-21h2-x64
3My-Skidded....0.bat
windows11-21h2-x64
3My-Skidded...as.exe
windows11-21h2-x64
My-Skidded...ll.bat
windows11-21h2-x64
My-Skidded...ks.exe
windows11-21h2-x64
My-Skidded...ua.exe
windows11-21h2-x64
My-Skidded...kz.bat
windows11-21h2-x64
8Resubmissions
09/03/2025, 01:58
250309-cdv29swybs 1008/03/2025, 06:55
250308-hp35xatjt9 1008/03/2025, 04:53
250308-fh1ebssky5 10Analysis
-
max time kernel
150s -
max time network
163s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
08/03/2025, 06:55
Behavioral task
behavioral1
Sample
My-Skidded-malwares-main.zip
Resource
win11-20250217-en
Behavioral task
behavioral2
Sample
My-Skidded-malwares-main/6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe
Resource
win11-20250217-en
Behavioral task
behavioral3
Sample
My-Skidded-malwares-main/AmongUs.vbs
Resource
win11-20250217-en
Behavioral task
behavioral4
Sample
My-Skidded-malwares-main/AnaRAT.exe
Resource
win11-20250217-en
Behavioral task
behavioral5
Sample
My-Skidded-malwares-main/CRINGE-DO-NOT-RUN.exe
Resource
win11-20250217-en
Behavioral task
behavioral6
Sample
My-Skidded-malwares-main/Cirno.exe
Resource
win11-20250217-en
Behavioral task
behavioral7
Sample
My-Skidded-malwares-main/Cool Game MAKR 2022!!.zip
Resource
win11-20250217-en
Behavioral task
behavioral8
Sample
My-Skidded-malwares-main/DAMK.exe
Resource
win11-20250218-en
Behavioral task
behavioral9
Sample
My-Skidded-malwares-main/Dell_Fuck.vbs
Resource
win11-20250217-en
Behavioral task
behavioral10
Sample
My-Skidded-malwares-main/Discord Expliot Kit.exe
Resource
win11-20250217-en
Behavioral task
behavioral11
Sample
My-Skidded-malwares-main/ERROR 2.bat
Resource
win11-20250217-en
Behavioral task
behavioral12
Sample
My-Skidded-malwares-main/ERROR.vbs
Resource
win11-20250217-en
Behavioral task
behavioral13
Sample
My-Skidded-malwares-main/Fello_s_Revenge.exe
Resource
win11-20250217-en
Behavioral task
behavioral14
Sample
My-Skidded-malwares-main/Fellos RAT-Pack.exe
Resource
win11-20250217-en
Behavioral task
behavioral15
Sample
My-Skidded-malwares-main/KonataMBR.exe
Resource
win11-20250217-en
Behavioral task
behavioral16
Sample
My-Skidded-malwares-main/KonoSuba.vbs
Resource
win11-20250217-en
Behavioral task
behavioral17
Sample
My-Skidded-malwares-main/MarisaFumoDownload.exe
Resource
win11-20250217-en
Behavioral task
behavioral18
Sample
My-Skidded-malwares-main/MarisaMBR.exe
Resource
win11-20250217-en
Behavioral task
behavioral19
Sample
My-Skidded-malwares-main/Marlon2210FACEREVEAL.exe
Resource
win11-20250217-en
Behavioral task
behavioral20
Sample
My-Skidded-malwares-main/Marlon2210KeyGen.exe
Resource
win11-20250218-en
Behavioral task
behavioral21
Sample
My-Skidded-malwares-main/Megumin.exe
Resource
win11-20250217-en
Behavioral task
behavioral22
Sample
My-Skidded-malwares-main/NazrinMBR.exe
Resource
win11-20250217-en
Behavioral task
behavioral23
Sample
My-Skidded-malwares-main/PCCooker2.0_x64.exe
Resource
win11-20250217-en
Behavioral task
behavioral24
Sample
My-Skidded-malwares-main/PCCooker_x64.exe
Resource
win11-20250217-en
Behavioral task
behavioral25
Sample
My-Skidded-malwares-main/PanKoza2.0 Discord Token Stealer 2024.exe
Resource
win11-20250217-en
Behavioral task
behavioral26
Sample
My-Skidded-malwares-main/README.md
Resource
win11-20250217-en
Behavioral task
behavioral27
Sample
My-Skidded-malwares-main/RaM KilLEr 1.0.bat
Resource
win11-20250217-en
Behavioral task
behavioral28
Sample
My-Skidded-malwares-main/Rias.exe
Resource
win11-20250217-en
Behavioral task
behavioral29
Sample
My-Skidded-malwares-main/Run All.bat
Resource
win11-20250217-en
Behavioral task
behavioral30
Sample
My-Skidded-malwares-main/TouhouHacks.exe
Resource
win11-20250217-en
Behavioral task
behavioral31
Sample
My-Skidded-malwares-main/Trojan.Aqua.exe
Resource
win11-20250218-en
Behavioral task
behavioral32
Sample
My-Skidded-malwares-main/Trojan.Bat.FortniteHackz.bat
Resource
win11-20250217-en
General
-
Target
My-Skidded-malwares-main/AnaRAT.exe
-
Size
6.0MB
-
MD5
b300d99faf11ac3c6d3609c34f39ad5b
-
SHA1
039310584b1e8fb43a08a865f3ab1b64610c8013
-
SHA256
b8af724789e01cb47a661d40a22a5ec93a2f1499d0ace4cd5e1d7d9fffa89246
-
SHA512
2158ca82f753258c4abee3bf425f91bd26a79fcf7c53cbb98fd5980a53d678613258367a5f10117547f3d900456d78a0e4a7c85b0f1806948e8e5b767ccb26d0
-
SSDEEP
49152:xqU/dfDJH/bKaPMNNteROzxRwF0UCLhCkpMn8HmWIos0/Noyos5rQLiMCPSsAm6o:x1dfDy
Malware Config
Extracted
remcos
AUGUST CRYPTER TOOLZ GRACE STUB
teamfavour222.ddns.net :6767
odogwuvisual123.duckdns.org:6767
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
-YFLE4M
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
asyncrat
0.5.8
2 MONEY
twart.myfirewall.org:14143
udn3BZ1Fqt3jtiZx
-
delay
30
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Extracted
njrat
Hallaj PRO Rat [Fixed]
FFF
tibiaserver.ddns.net:2323
64805e9b9efcd75e104b05fad0cb2a4c
-
reg_key
64805e9b9efcd75e104b05fad0cb2a4c
-
splitter
boolLove
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Extracted
remcos
GOLAZO
agosto14.con-ip.com:7772
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-KKPQTN
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Asyncrat family
-
resource yara_rule behavioral4/memory/1640-124-0x0000000010000000-0x00000000101A5000-memory.dmp purplefox_rootkit behavioral4/memory/1640-123-0x0000000010000000-0x00000000101A5000-memory.dmp purplefox_rootkit behavioral4/memory/1640-125-0x0000000010000000-0x00000000101A5000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral4/memory/1640-124-0x0000000010000000-0x00000000101A5000-memory.dmp family_gh0strat behavioral4/memory/1640-123-0x0000000010000000-0x00000000101A5000-memory.dmp family_gh0strat behavioral4/memory/1640-125-0x0000000010000000-0x00000000101A5000-memory.dmp family_gh0strat -
Gh0strat family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Sub\\Client.exe" Client.exe -
Njrat family
-
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4644 568 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 444 568 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2588 568 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2100 568 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2148 568 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4988 568 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1036 568 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3728 568 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4360 568 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3688 568 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1028 568 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3444 568 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2000 568 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5044 568 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3732 568 schtasks.exe 90 -
Purplefox family
-
Remcos family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral4/files/0x001d00000002aec8-254.dat family_stormkitty behavioral4/memory/4932-262-0x00000000004B0000-0x0000000000506000-memory.dmp family_stormkitty -
Stormkitty family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4552 powershell.exe 248 powershell.exe 2964 powershell.exe 1868 powershell.exe 3964 powershell.exe 1524 powershell.exe 4420 powershell.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3548 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\64805e9b9efcd75e104b05fad0cb2a4c.exe svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\64805e9b9efcd75e104b05fad0cb2a4c.exe svchost.exe -
Executes dropped EXE 27 IoCs
pid Process 1640 0430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5.exe 2992 690c1b65a6267d6d0b201ba46089aabc.exe 2968 62264.exe 1412 73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe 4304 1231234.exe 2332 SCRIPT~1.EXE 4776 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 664 172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe 752 651654794161616171771852588547475885414152526396369965885471452525258.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 784 Client.exe 4736 Launcher.exe 4932 zzzz.exe 1748 chargeable.exe 3852 690c1b65a6267d6d0b201ba46089aabc.exe 4648 svchost.exe 1700 chargeable.exe 4604 651654794161616171771852588547475885414152526396369965885471452525258.exe 1020 sysmon.exe 2772 svchost.exe 4676 $77Microsoft To Do.exe 3716 svchost.exe 2524 sysmon.exe 4916 svchost.exe 1984 sysmon.exe 2100 sysmon.exe 1904 sysmon.exe -
Loads dropped DLL 14 IoCs
pid Process 2208 Process not Found 3924 Process not Found 2388 timeout.exe 4676 $77Microsoft To Do.exe 1136 Process not Found 2768 Process not Found 3512 Process not Found 2524 sysmon.exe 2256 Process not Found 1984 sysmon.exe 1500 Process not Found 2100 sysmon.exe 3332 Process not Found 1904 sysmon.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 zzzz.exe Key opened \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 zzzz.exe Key opened \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 zzzz.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 62264.exe Set value (str) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Client.exe" 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe Set value (str) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000\Software\Microsoft\Windows\CurrentVersion\Run\confuse = "C:\\Users\\Admin\\AppData\\Roaming\\confuse\\chargeable.exe" 73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe Set value (str) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysMain = "C:\\Users\\Admin\\AppData\\Local\\73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe" 73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe Set value (str) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzzz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zzzz.exe" 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe Set value (str) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cisco = "C:\\Users\\Admin\\Pictures\\Cisco\\VPNManager.exe" 651654794161616171771852588547475885414152526396369965885471452525258.exe Set value (str) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Sub\\WatchDog.exe" Client.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\WFQQFFOZ\FileGrabber\Desktop\desktop.ini zzzz.exe File created C:\Users\Admin\AppData\Local\WFQQFFOZ\FileGrabber\Downloads\desktop.ini zzzz.exe File created C:\Users\Admin\AppData\Local\WFQQFFOZ\FileGrabber\Pictures\desktop.ini zzzz.exe File created C:\Users\Admin\AppData\Local\WFQQFFOZ\FileGrabber\Pictures\Saved Pictures\desktop.ini zzzz.exe File created C:\Users\Admin\AppData\Local\WFQQFFOZ\FileGrabber\Pictures\Camera Roll\desktop.ini zzzz.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 discord.com 28 discord.com -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com 6 freegeoip.app 21 api.ipify.org 1 freegeoip.app 1 api.ipify.org -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2992 set thread context of 3852 2992 690c1b65a6267d6d0b201ba46089aabc.exe 128 PID 1748 set thread context of 1700 1748 chargeable.exe 130 PID 3716 set thread context of 4916 3716 svchost.exe 155 -
resource yara_rule behavioral4/files/0x001900000002ae9d-88.dat upx behavioral4/memory/664-107-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral4/memory/1640-124-0x0000000010000000-0x00000000101A5000-memory.dmp upx behavioral4/memory/1640-121-0x0000000010000000-0x00000000101A5000-memory.dmp upx behavioral4/memory/1640-123-0x0000000010000000-0x00000000101A5000-memory.dmp upx behavioral4/memory/1640-125-0x0000000010000000-0x00000000101A5000-memory.dmp upx behavioral4/memory/664-376-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral4/memory/664-375-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral4/memory/664-581-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral4/memory/664-708-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral4/memory/664-789-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral4/memory/664-913-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral4/memory/664-1005-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral4/memory/664-1087-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral4/memory/664-1172-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral4/memory/664-1261-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral4/memory/664-1342-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral4/memory/664-1427-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral4/memory/664-1516-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral4/memory/664-1597-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral4/memory/664-1682-0x0000000000400000-0x000000000048A000-memory.dmp upx -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Mail\sysmon.exe a6a1abaf12a28ea8f6553356c3bdcf57.exe File created C:\Program Files (x86)\Windows Mail\121e5b5079f7c0 a6a1abaf12a28ea8f6553356c3bdcf57.exe File created C:\Program Files\Google\Chrome\Application\RuntimeBroker.exe a6a1abaf12a28ea8f6553356c3bdcf57.exe File created C:\Program Files\Google\Chrome\Application\9e8d7a4ca61bd9 a6a1abaf12a28ea8f6553356c3bdcf57.exe File created C:\Program Files\Windows Media Player\it-IT\StartMenuExperienceHost.exe a6a1abaf12a28ea8f6553356c3bdcf57.exe File created C:\Program Files\Windows Media Player\it-IT\55b276f4edf653 a6a1abaf12a28ea8f6553356c3bdcf57.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Offline Web Pages\conhost.exe a6a1abaf12a28ea8f6553356c3bdcf57.exe File opened for modification C:\Windows\Offline Web Pages\conhost.exe a6a1abaf12a28ea8f6553356c3bdcf57.exe File created C:\Windows\Offline Web Pages\088424020bedd6 a6a1abaf12a28ea8f6553356c3bdcf57.exe File created C:\Windows\xdwd.dll Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnaRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 690c1b65a6267d6d0b201ba46089aabc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SCRIPT~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chargeable.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zzzz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 651654794161616171771852588547475885414152526396369965885471452525258.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 651654794161616171771852588547475885414152526396369965885471452525258.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 690c1b65a6267d6d0b201ba46089aabc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chargeable.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4968 PING.EXE 2208 PING.EXE 3444 PING.EXE 3444 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 zzzz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier zzzz.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2388 timeout.exe 4776 timeout.exe -
Modifies registry class 27 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Launcher.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings sysmon.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Launcher.exe Set value (data) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Launcher.exe Set value (data) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Launcher.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Launcher.exe Set value (str) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" Launcher.exe Key created \Registry\User\S-1-5-21-501547156-4130638328-323075719-1000_Classes\NotificationData Launcher.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings sysmon.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings sysmon.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Launcher.exe Set value (data) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Launcher.exe Set value (data) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Launcher.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings a6a1abaf12a28ea8f6553356c3bdcf57.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings SCRIPT~1.EXE Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings Launcher.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Launcher.exe Set value (data) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Launcher.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Launcher.exe Set value (int) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Launcher.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Launcher.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Launcher.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings sysmon.exe Set value (data) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Launcher.exe Set value (data) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Launcher.exe Set value (data) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 Launcher.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Launcher.exe -
Runs ping.exe 1 TTPs 4 IoCs
pid Process 4968 PING.EXE 2208 PING.EXE 3444 PING.EXE 3444 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 17 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2100 schtasks.exe 3732 schtasks.exe 4644 schtasks.exe 2588 schtasks.exe 2148 schtasks.exe 3728 schtasks.exe 3688 schtasks.exe 1028 schtasks.exe 5044 schtasks.exe 444 schtasks.exe 4988 schtasks.exe 1036 schtasks.exe 4360 schtasks.exe 2000 schtasks.exe 3312 schtasks.exe 3444 schtasks.exe 4372 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 4552 powershell.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe Token: SeDebugPrivilege 4552 powershell.exe Token: SeDebugPrivilege 4304 1231234.exe Token: SeDebugPrivilege 784 Client.exe Token: SeDebugPrivilege 248 powershell.exe Token: SeDebugPrivilege 4420 powershell.exe Token: SeDebugPrivilege 1868 powershell.exe Token: SeDebugPrivilege 2964 powershell.exe Token: SeDebugPrivilege 3964 powershell.exe Token: SeDebugPrivilege 1524 powershell.exe Token: SeDebugPrivilege 4932 zzzz.exe Token: SeDebugPrivilege 1020 sysmon.exe Token: SeDebugPrivilege 4676 $77Microsoft To Do.exe Token: SeDebugPrivilege 1700 chargeable.exe Token: 33 1700 chargeable.exe Token: SeIncBasePriorityPrivilege 1700 chargeable.exe Token: SeDebugPrivilege 2772 svchost.exe Token: 33 2772 svchost.exe Token: SeIncBasePriorityPrivilege 2772 svchost.exe Token: 33 1700 chargeable.exe Token: SeIncBasePriorityPrivilege 1700 chargeable.exe Token: 33 2772 svchost.exe Token: SeIncBasePriorityPrivilege 2772 svchost.exe Token: SeDebugPrivilege 3852 690c1b65a6267d6d0b201ba46089aabc.exe Token: 33 1700 chargeable.exe Token: SeIncBasePriorityPrivilege 1700 chargeable.exe Token: 33 2772 svchost.exe Token: SeIncBasePriorityPrivilege 2772 svchost.exe Token: SeDebugPrivilege 2524 sysmon.exe Token: 33 1700 chargeable.exe Token: SeIncBasePriorityPrivilege 1700 chargeable.exe Token: 33 2772 svchost.exe Token: SeIncBasePriorityPrivilege 2772 svchost.exe Token: 33 1700 chargeable.exe Token: SeIncBasePriorityPrivilege 1700 chargeable.exe Token: 33 1640 0430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5.exe Token: SeIncBasePriorityPrivilege 1640 0430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5.exe Token: 33 2772 svchost.exe Token: SeIncBasePriorityPrivilege 2772 svchost.exe Token: 33 1700 chargeable.exe Token: SeIncBasePriorityPrivilege 1700 chargeable.exe Token: 33 2772 svchost.exe Token: SeIncBasePriorityPrivilege 2772 svchost.exe Token: 33 1700 chargeable.exe Token: SeIncBasePriorityPrivilege 1700 chargeable.exe Token: 33 2772 svchost.exe Token: SeIncBasePriorityPrivilege 2772 svchost.exe Token: SeDebugPrivilege 1984 sysmon.exe Token: 33 1700 chargeable.exe Token: SeIncBasePriorityPrivilege 1700 chargeable.exe Token: SeDebugPrivilege 4916 svchost.exe Token: 33 2772 svchost.exe Token: SeIncBasePriorityPrivilege 2772 svchost.exe Token: 33 1700 chargeable.exe Token: SeIncBasePriorityPrivilege 1700 chargeable.exe Token: 33 2772 svchost.exe Token: SeIncBasePriorityPrivilege 2772 svchost.exe Token: 33 1700 chargeable.exe Token: SeIncBasePriorityPrivilege 1700 chargeable.exe Token: 33 2772 svchost.exe Token: SeIncBasePriorityPrivilege 2772 svchost.exe Token: 33 1700 chargeable.exe Token: SeIncBasePriorityPrivilege 1700 chargeable.exe Token: 33 2772 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4736 Launcher.exe 4604 651654794161616171771852588547475885414152526396369965885471452525258.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3392 wrote to memory of 1640 3392 AnaRAT.exe 78 PID 3392 wrote to memory of 1640 3392 AnaRAT.exe 78 PID 3392 wrote to memory of 1640 3392 AnaRAT.exe 78 PID 3392 wrote to memory of 2992 3392 AnaRAT.exe 79 PID 3392 wrote to memory of 2992 3392 AnaRAT.exe 79 PID 3392 wrote to memory of 2992 3392 AnaRAT.exe 79 PID 3392 wrote to memory of 2968 3392 AnaRAT.exe 80 PID 3392 wrote to memory of 2968 3392 AnaRAT.exe 80 PID 3392 wrote to memory of 1412 3392 AnaRAT.exe 81 PID 3392 wrote to memory of 1412 3392 AnaRAT.exe 81 PID 3392 wrote to memory of 1412 3392 AnaRAT.exe 81 PID 3392 wrote to memory of 4304 3392 AnaRAT.exe 82 PID 3392 wrote to memory of 4304 3392 AnaRAT.exe 82 PID 2968 wrote to memory of 2332 2968 62264.exe 83 PID 2968 wrote to memory of 2332 2968 62264.exe 83 PID 2968 wrote to memory of 2332 2968 62264.exe 83 PID 3392 wrote to memory of 4776 3392 AnaRAT.exe 84 PID 3392 wrote to memory of 4776 3392 AnaRAT.exe 84 PID 3392 wrote to memory of 664 3392 AnaRAT.exe 85 PID 3392 wrote to memory of 664 3392 AnaRAT.exe 85 PID 3392 wrote to memory of 664 3392 AnaRAT.exe 85 PID 3392 wrote to memory of 752 3392 AnaRAT.exe 86 PID 3392 wrote to memory of 752 3392 AnaRAT.exe 86 PID 3392 wrote to memory of 752 3392 AnaRAT.exe 86 PID 3392 wrote to memory of 3488 3392 AnaRAT.exe 87 PID 3392 wrote to memory of 3488 3392 AnaRAT.exe 87 PID 4776 wrote to memory of 4552 4776 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 88 PID 4776 wrote to memory of 4552 4776 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 88 PID 4776 wrote to memory of 784 4776 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 102 PID 4776 wrote to memory of 784 4776 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 102 PID 4776 wrote to memory of 4736 4776 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 104 PID 4776 wrote to memory of 4736 4776 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 104 PID 4776 wrote to memory of 248 4776 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 106 PID 4776 wrote to memory of 248 4776 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 106 PID 3488 wrote to memory of 4420 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 111 PID 3488 wrote to memory of 4420 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 111 PID 3488 wrote to memory of 1524 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 112 PID 3488 wrote to memory of 1524 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 112 PID 3488 wrote to memory of 3964 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 113 PID 3488 wrote to memory of 3964 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 113 PID 3488 wrote to memory of 1868 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 114 PID 3488 wrote to memory of 1868 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 114 PID 3488 wrote to memory of 2964 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 115 PID 3488 wrote to memory of 2964 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 115 PID 3488 wrote to memory of 2324 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 121 PID 3488 wrote to memory of 2324 3488 a6a1abaf12a28ea8f6553356c3bdcf57.exe 121 PID 2324 wrote to memory of 3860 2324 cmd.exe 123 PID 2324 wrote to memory of 3860 2324 cmd.exe 123 PID 2324 wrote to memory of 4968 2324 cmd.exe 124 PID 2324 wrote to memory of 4968 2324 cmd.exe 124 PID 4776 wrote to memory of 4932 4776 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 125 PID 4776 wrote to memory of 4932 4776 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 125 PID 4776 wrote to memory of 4932 4776 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 125 PID 1412 wrote to memory of 1748 1412 73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe 126 PID 1412 wrote to memory of 1748 1412 73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe 126 PID 1412 wrote to memory of 1748 1412 73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe 126 PID 2992 wrote to memory of 3852 2992 690c1b65a6267d6d0b201ba46089aabc.exe 128 PID 2992 wrote to memory of 3852 2992 690c1b65a6267d6d0b201ba46089aabc.exe 128 PID 2992 wrote to memory of 3852 2992 690c1b65a6267d6d0b201ba46089aabc.exe 128 PID 2992 wrote to memory of 3852 2992 690c1b65a6267d6d0b201ba46089aabc.exe 128 PID 2992 wrote to memory of 3852 2992 690c1b65a6267d6d0b201ba46089aabc.exe 128 PID 2992 wrote to memory of 3852 2992 690c1b65a6267d6d0b201ba46089aabc.exe 128 PID 2992 wrote to memory of 3852 2992 690c1b65a6267d6d0b201ba46089aabc.exe 128 PID 2992 wrote to memory of 3852 2992 690c1b65a6267d6d0b201ba46089aabc.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 zzzz.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 zzzz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\AnaRAT.exe"C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\AnaRAT.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\0430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5.exe"C:\Users\Admin\AppData\Local\0430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
C:\Users\Admin\AppData\Local\690c1b65a6267d6d0b201ba46089aabc.exe"C:\Users\Admin\AppData\Local\690c1b65a6267d6d0b201ba46089aabc.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\690c1b65a6267d6d0b201ba46089aabc.exe"C:\Users\Admin\AppData\Local\690c1b65a6267d6d0b201ba46089aabc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3852 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"' & exit4⤵
- System Location Discovery: System Language Discovery
PID:4192 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"'5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp76B2.tmp.bat""4⤵
- System Location Discovery: System Language Discovery
PID:444 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4776
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\62264.exe"C:\Users\Admin\AppData\Local\62264.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRIPT~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRIPT~1.EXE3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4648 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
-
-
C:\Users\Admin\AppData\Local\73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe"C:\Users\Admin\AppData\Local\73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exeC:\Users\Admin\AppData\Roaming\confuse\chargeable.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1700 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3548
-
-
-
-
-
C:\Users\Admin\AppData\Local\1231234.exe"C:\Users\Admin\AppData\Local\1231234.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4304 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp28FF.tmp.bat""3⤵PID:2092
-
C:\Windows\system32\timeout.exetimeout 34⤵
- Loads dropped DLL
- Delays execution with timeout.exe
PID:2388
-
-
C:\Users\Admin\AppData\Roaming\DriverrHub\$77Microsoft To Do.exe"C:\Users\Admin\AppData\Roaming\DriverrHub\$77Microsoft To Do.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
-
-
C:\Users\Admin\AppData\Local\150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe"C:\Users\Admin\AppData\Local\150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Client.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:784 -
C:\Windows\SYSTEM32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Sub\Client.exe" & exit4⤵PID:1572
-
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Sub\Client.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:3312
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\zzzz.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:248
-
-
C:\Users\Admin\AppData\Local\Temp\zzzz.exe"C:\Users\Admin\AppData\Local\Temp\zzzz.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4932
-
-
-
C:\Users\Admin\AppData\Local\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe"C:\Users\Admin\AppData\Local\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:664
-
-
C:\Users\Admin\AppData\Local\651654794161616171771852588547475885414152526396369965885471452525258.exe"C:\Users\Admin\AppData\Local\651654794161616171771852588547475885414152526396369965885471452525258.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:752 -
C:\Users\Admin\AppData\Local\651654794161616171771852588547475885414152526396369965885471452525258.exe"C:\Users\Admin\AppData\Local\651654794161616171771852588547475885414152526396369965885471452525258.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4604
-
-
-
C:\Users\Admin\AppData\Local\a6a1abaf12a28ea8f6553356c3bdcf57.exe"C:\Users\Admin\AppData\Local\a6a1abaf12a28ea8f6553356c3bdcf57.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Offline Web Pages\conhost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\sysmon.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Links\RuntimeBroker.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Google\Chrome\Application\RuntimeBroker.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Media Player\it-IT\StartMenuExperienceHost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2rLTM5r244.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:3860
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4968
-
-
C:\Program Files (x86)\Windows Mail\sysmon.exe"C:\Program Files (x86)\Windows Mail\sysmon.exe"4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1020 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iDn8Em9rir.bat"5⤵PID:2084
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:4496
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2208
-
-
C:\Program Files (x86)\Windows Mail\sysmon.exe"C:\Program Files (x86)\Windows Mail\sysmon.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2524 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\raUEgr1vJI.bat"7⤵PID:3080
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:1948
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:1372
-
-
C:\Program Files (x86)\Windows Mail\sysmon.exe"C:\Program Files (x86)\Windows Mail\sysmon.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1984 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iDn8Em9rir.bat"9⤵PID:5056
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:4540
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3444
-
-
C:\Program Files (x86)\Windows Mail\sysmon.exe"C:\Program Files (x86)\Windows Mail\sysmon.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2100 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LZJId2lFRi.bat"11⤵PID:2316
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:4052
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3444
-
-
C:\Program Files (x86)\Windows Mail\sysmon.exe"C:\Program Files (x86)\Windows Mail\sysmon.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1904
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Windows\Offline Web Pages\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\Offline Web Pages\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Windows\Offline Web Pages\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Mail\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Mail\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Links\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default\Links\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Links\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Program Files\Google\Chrome\Application\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Program Files\Google\Chrome\Application\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Media Player\it-IT\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\it-IT\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Media Player\it-IT\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3732
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4808
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2AppInit DLLs
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2AppInit DLLs
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122B
MD5881016d254c6268368a09476214c40ac
SHA15025a4ae9006415fd878404a801a8576fed4cec2
SHA256b83d50edf921bfee28644522beca0e6dbdb209297481432a19e30581f729eb47
SHA5123b02ce9f7a77a4b48ecf39db69473f70e77979ce452de18b642660fc4e1e293a6d69b2fb608ea8927e96c58e8d6a8d94909998a3996648ca6d68a2abd8bcffa7
-
Filesize
446KB
MD5385585748cd6feff767a913bd76c2457
SHA11bedac2bc0da78c4dbaaf3914816d84f5c08f005
SHA2560430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5
SHA51280619ee207d6c5a352d811405c40bcb9043fb2b2759ad40575e03e9e7b89f4ad55f6bc01dfe62a64b42dcd9b3b5bfef10503ce72f4efa0d2e39546f92047a880
-
Filesize
37KB
MD58f00376c7ee9fb1653dc2ae09afa5589
SHA10005d278c062b496628e9c2a27043e87fc05689e
SHA2566d2223ee967236cbc2c35809fce753553cfdb0aac7ba34e7087e19d61eecaa18
SHA5122512a5b67867c7c1cfbc19f7adc7ad56c3a2bf821f0c74341d0e69ee89dc20bbdc9118714d67ada6a846edced58afc6d01b0fe7560f2166e02c9044f85bc00f9
-
Filesize
227KB
MD51a83a244d9e90a4865aac14bc0e27052
SHA1d2b65e7aed7657c9915f90f03d46902087479753
SHA256150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712
SHA512f4b9d26d8a0841f9425abf038f85563ddee65e2404bc508fd23c8023bb565fd7f0ceaeaadde49c4951d3bbbb93f6b64b3cf610464855a2bf2d418477dd4fe03f
-
C:\Users\Admin\AppData\Local\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe
Filesize233KB
MD54ef3177a2e94ce3d15ae9490a73a2212
SHA1a34f47568ce7fcea97a002eebeae385efa98790c
SHA25687353d18dfdebf4d0747bbf21d58adaed2b04060d61cba3fa052d522640520f0
SHA512635ce5c0d1b9f7dd5d7b4c00f216af06dc7d818132ba87a57d3d54f6b30ee01f64430d2aa265f60027cc58dc2e738d5b674ee36ffdca34ff540ce44b7da7c502
-
Filesize
198KB
MD5f30e9ff8706f3ec72c82a74ee6328db9
SHA1b526d52d22600b28892f898a717eb25779ef3044
SHA256d22bf8ad4fc9b769ea2944bbdee78277ab29bac7199407baf7c3b489568a9489
SHA512a21220d5f1818c9c5aa55cf8560365888046a090b8892a9d87919b48ac921bd2fdfd6016ace77fa8205fde067c7d45cb01032a47f4325fcac560361d66cc58f6
-
C:\Users\Admin\AppData\Local\651654794161616171771852588547475885414152526396369965885471452525258.exe
Filesize1.6MB
MD5e2100d88aca7c0a44ba9bb988ccd3916
SHA1ddaf17adbc769556037bb4fbf4bce7065bf57ef3
SHA25675f846b15fa1b548a0143f35584b25875a03c03a783e9310c8573f3b76957688
SHA5125b7fb077ea9d7d1310db3eb26b6624e3d12fe9f3d55d0a37d57c28197dab7e05449c6611d5b9a02f054d8ad790e12050228c8d7b913bb55e3f2b0da694c67ec5
-
Filesize
608KB
MD5690c1b65a6267d6d0b201ba46089aabc
SHA19eb6859bae82bcf8b9df7cf4fc061cd9155fdc39
SHA256244f3a2fad1afa232909355901f33cca18ea95444c5d142c7aa308170db5294f
SHA512cc540851386a3b98227822b2c952a57caf15db4563f9c246b8be5bca0989aaff70e64191d010738db86598d76dd8ad4e59a50965224db9f623edb64f2f8b3e2a
-
Filesize
110KB
MD50dcc21bdebe05957ca2922be486abe22
SHA18bcbd8a839a58e0050c17221e6a1cc775f07586b
SHA25673304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3
SHA5120752ba22340fd3383132243580cb28a147e67b42bb920af8c0fde491d550556fdfa296e70d94f2ce9798faddd0dad4664e2c2edda8f6604b9ba9e63e8f875e0f
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\690c1b65a6267d6d0b201ba46089aabc.exe.log
Filesize1KB
MD5bc39854661a6b32a76bb89194cb4f97d
SHA1aaa2fe4865ad144fc246a5109df804068c0e6aae
SHA2568c743434094ed0f13f342c8c34d31d35067abc2c143668aea6fbf2f9793d4104
SHA51244f9c3f41c39ac1f187b129bc91d8ef35a69b14643f5a520267cee84d9f7d837d0dc5361433ea519c33bc1237123e59c83009a4f0a2fbc1658c89c5d61600101
-
Filesize
1KB
MD57e1ed0055c3eaa0bbc4a29ec1ef15a6a
SHA1765b954c1adbb6a6ecc4fe912fdaa6d0fba0ae7d
SHA2564c17576f64dea465c45a50573ee41771f7be9962ab2d07f961af4df5589bdcce
SHA512de7c784c37d18c43820908add88f08ab4864c0ef3f9d158cc2c9d1bab120613cb093dd4bfc5d7ed0c289414956cfe0b213c386f8e6b5753847dec915566297c8
-
Filesize
944B
MD5aa4f31835d07347297d35862c9045f4a
SHA183e728008935d30f98e5480fba4fbccf10cefb05
SHA25699c83bc5c531e49d4240700142f3425aba74e18ebcc23556be32238ffde9cce0
SHA512ec3a4bee8335007b8753ae8ac42287f2b3bcbb258f7fc3fb15c9f8d3e611cb9bf6ae2d3034953286a34f753e9ec33f7495e064bab0e8c7fcedd75d6e5eb66629
-
Filesize
944B
MD5e02fc0b3bdb8f40184e3bd173e7ec2fe
SHA15798c44c7bb33eaa89cce50178180fc8b5411a17
SHA256f80d602c298fb72e5c5f68ace593fa2785b97bacbc4277e5a187862b4b09272d
SHA5126aab23f3512cc5238262b6188d0556006461a0f61e0a7a5ca0405c251d9a339226c27c46c4358e17e286b1e2b15fc094773ae5e685974570b4bbbfcb8b4daaac
-
Filesize
944B
MD58ae23ac244d2498bebbef940ab1901c8
SHA14e327b29f95aaf976293263271ba4742558fab86
SHA2568e88db3690d6941d1d99a34d8614fae26962fca46b12ce3bccd23ce8c2738f5a
SHA512d9136a3e4aed92ec582edaf7f3997f271709e41532bad2b662cfa848701c2f0aa935af1606c8b4f81f371f4489f132d42f5a271cfc45a253c9560dc197cf5b28
-
Filesize
944B
MD51804c6740eb5556056039a98ab1ec835
SHA101c386307cc450d8c639e3d38573e75a8ba607ef
SHA256b1bac3764aeaf0bd5fd88966ce55b3299160a9b5acb3aa4727af7d0b94036253
SHA51219f6ca87f2899874418c07352de4a245049b080f6b472c43bd321b204265591c71519615da0d092b0d73990ad4425026e0e60da5f51052cabcf8b4c5f842f482
-
Filesize
944B
MD58b285a1184b0e0badb8427f4da3fa919
SHA1b6f66499ca6abf4845fbcb2993b0f8a15b105b1e
SHA25664f8090e06fa6bf0a56f03295fb7eb06f1db53fac5b68409bab621228e403c33
SHA5127be507b2f6a57bbd2d85ea9272e988f6feea21fb50ffdc548fccbc64417421b330ec1c8d30342fbcec2f28fd17135464e0701853aa8a5fe86f9a5aa89537c1c5
-
Filesize
944B
MD5c83bd0c63443de261daf55bc77936e51
SHA18e89d2aa16255f401916cbb08dc240493a75d279
SHA256c0ab48a5749309200838e6cb204cf5ff57a4b99b9a74a4226cfef16b68f13cd5
SHA512feda166c7db52a5b91e4f84b77414eceb91292c1837fc3cf8d894d282a9c3d023edbd776380ec803a0e7723202dbb84c4bef05ac8e27d9e77908f164d699294b
-
Filesize
174B
MD573403c011b41c02e3547d322714bdb68
SHA111f4d222a6387c73f051126efdd190a161ff1d1f
SHA256e1b9877fa738f745b5db4f70c4835f181712803b9a3466f885b50b7d580f52bd
SHA51252d093294517b9223995766668a30907fc3fd0cdd10a62e3e4199d93398bb6abd6978adde4829d4ddd16e132d95424053e9c39c0deeb580d09fcaef0b818059b
-
Filesize
100KB
MD521560cb75b809cf46626556cd5fbe3ab
SHA1f2eec01d42a301c3caacd41cddb0ef2284dbb5a6
SHA256d2525bab5cb322933c8978880975e0c189feece68ae3f1951bf46297c7f640fa
SHA51221eac0037b16f968ee8743b52dc73efdd34d24c2502d090b399a552dc6cb75f7d3090c10d448c66b868b1c4a7c46a5068b084b88b487e40b1e755356cb7557db
-
Filesize
210KB
MD54ca15a71a92f90c56b53d9d03da17657
SHA13d610aee0423eea84ad9dc0df7865e1bed982327
SHA256ab532f166e08886166c0ed6426bb6a8998de8273d37ccac5823528a1ba3d8ca1
SHA512e0d9e11b9a0fb84bab21cbe4638ead80319a9b38ed810a59a612ab844331adec32f2499425b0d9269f2eb3714e497ad31c9bdfded1f829533cc77bf2dea6464f
-
Filesize
19B
MD5fdb26e74f4d6ca3a02af55b15fcca7f2
SHA17d990a1a4062fc3f0ae117dc72f47bcb3ef66425
SHA25649704e6fd30fc98988f40be963296c81b95662d7f3af605c372cd0344ab78e1b
SHA51236a82624ee8173bacffdf978e00f9c5ffe96bd6b27ba1230f2891a11bc301908ed6ea790c75669219c7445489806f00ba67eda2ea7346396ca3304e02c6fec7d
-
Filesize
308B
MD5b3609673caf3522ae50fe7b2f69b46f2
SHA1c14f39aa78398030b84ab6b3d36014483b97a520
SHA256c2423419d653bf31077eb40ad665590445b5baac4f82948822c8ed55fc009c4d
SHA512be15ca57e7b80049c35a37f216fb1387b89d68440494c81e7e8b21644dbab8ab161119a37475ad873d144ceae105ec2c61097f0c115f078cde961bc38e6f28b5
-
Filesize
152KB
MD54b6d4727ca3c277e5af47092ec9e3ef1
SHA18faea131181960c1f43ccee6a2b7bcdaa23fcd81
SHA2565fb62cc6421cf636023381cc6fd5a06e3b326a58ea3d3ce9c879f1cc408519f4
SHA5128a1814ec549a42771cbe83fe7612d7e269af27d092a5c0ae685e92772dc7effd2b14829090f0b12edfbabeb9804f80558f2b316efb4f48a6a3b500b1172c2bbc
-
Filesize
22KB
MD54c8f3a1e15f370ca8afe2992902a6e98
SHA1dc6324d924ac31bea4ad7e4dd6720ecdad3877dd
SHA256dcdc72549f7ad41cc860738adbeee5e44f02222415fd84ed5c92538ac9049b92
SHA512b63c4e48f3024edcf1e1391b5df6ff65fc5111849eb093b429fa0f21c03339dbaeff835f18e250758498f3432874b85348530e47b2ada93f6f68615a5ccf66c0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
174B
MD5d5dc875408c637c3b62a770e4343f3a4
SHA1b723c0fed43daf4b53662bc7cd79733b5daf5f2c
SHA256a2a72f110e7ae84c73a088538e1ed2c5ccec89037039fe4de47168b44605c487
SHA512fa814460c0e9e93e6f4f66232fe6a6bbd698d16dea79ea791ae78d869ab3ddd452eec812e0d5a0345bb4031586ca9ee4d3e9bbfd478a380b967d9b9e35d1ed2e
-
Filesize
173B
MD5114625cc6f591515ec2e6cfcc82afc5c
SHA14fed9a42739a35e1bf8e5dea9dd22c9c113f84c8
SHA256aea813045fd04eccc9354e4913e7cacb5e7020a0a7cf122af632893f3f6595ef
SHA512f70e3332b0ecce80e6dfc5151cfc5a0c97c0f95bccac858f10ac14cdfaa2db0a6003396e6c62587f08373b5e3c99d40238ea6edea56cfecba720a14ca019c676
-
Filesize
154B
MD5039db3c8d4c468477bdf53b11db02d6b
SHA189071c34c37f5958a799eb484479331c884d9c77
SHA2565ce0f8406c86ee39904bad482ed351b15baa3252c908d69f72fef76dc29746f0
SHA5127548a45dcad82dec30de3de62a2add2003cdc83cf11877d59063612bf78d8b795a2b7e6e21090899ac9f99d8f28502168779aaee63648370709974be1aff9765
-
Filesize
320KB
MD5de4824c195cf1b2bb498511ef461e49b
SHA1f15ca6d0e02c785cce091dbd716cd43e3f5a80bd
SHA25651813dfedbe02f03d08b4728187eadb4948d8be40c9d8fe6e4e1cb61fa7ae209
SHA512b211a636f2799d90ce38348dbbc7dbc69ac5374129c7896a137f03a57fe78139a030c1edb90cfc4203799d77a8720df431da75986aa1d8b16274030ad1db770a
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
739KB
MD5a1bbf39bf580865f421379345f119767
SHA175b622267881303f4d692d27342e09e2ccbe2b09
SHA256706f828cf43588247b192f43714823f8ea5dba1e0d81eb84ed2c3edd1fe090f2
SHA51237a625a5120a06273ee6ec5382f7d0577ae951a993c2bfb852f5ab401c61597bb3335add6dd89f29877080f2fc9b154cf2462fea2cf7c4abbfb7bb2de5c228d5
-
Filesize
609KB
MD5f79055a2a43e912ced541b0e0a6e1303
SHA1b13dd5b660a51b0894aa68a41ccb008c2384ed9b
SHA25672f4a2d5c3e029f8f060a46af9f039131efc9f55714ff4094a27eaeacf3b226b
SHA512aac675331ae98208313592393fff487788846d3b501fac9fb95a517b8cda7622c640355cef966f64e6434d4b8ab55934bcd27972f876ca87475fca9fe491ffd6
-
Filesize
1.5MB
MD57df703b64a7e1c921707bf6ec3f20618
SHA106f43c8a3183615992ba82be9c8a94fa9bcba556
SHA256280ae9d55d0859ed44decaa91f4cfcff7ae05554183fd3896a43a4d0995af880
SHA512c558afc2165328efa8d6db3334c9144a3662558e8f4a0ac4fe629620cecddf504709dc3a4b653ecae3765dd08bb4e007d9f255760aadbc49587ab0a400afd2c3
-
Filesize
570KB
MD5d0be8f6708d22224eb457a6523bc367f
SHA187fdc762defc28f832885fee0dcfaceced437d19
SHA2567710d4669379145d547328ffe6077a5edf3dff9f139e081f947ba61df480c52d
SHA5123fd71a3463d22dc5af28a499e0a205c8f6303da36e77d8f2b0443bd9f3adc3f592e0694f0da8dc822b390153dd178d3484cfe2e206f8a5d2e12e4031c0d9e482
-
Filesize
329KB
MD53dd86567d37bbcb8ae7bad20d7e6f79c
SHA1476f113c104b43e79505c42e0e4cb778c3c6f186
SHA256844063de57471613023d0af2360705ffa495985e640e2c7ec88a629d8c676894
SHA51228d41b0ccd02c238a32ae8c3918ee567fb40defe884c9ec705aaf6466955324a5450cd858ed21d5f0096ac570dc65bb884bde0b02b9efa14f4d59efb1b09f146
-
Filesize
181KB
MD5d5ee5c0ad3289f0c4b84b499acd36705
SHA1c10e1700ca665eabce036a5e19217727ca02afd0
SHA2562c82d3d6a2082da7289209ac607d30ad53d8ebfce23cf967a411fcbbe45e3e90
SHA51206e728c6e9b46ff6f565147a4bf79f9d7189d581b32086b80543251b4c0f2ca60fab22f3c7ac1df880675b34d78aa2b2ad3ea00a337461e8da481f34c9562c52
-
Filesize
351KB
MD56b693a3ae2d4e0a5350cb033832a44b6
SHA1d7a0945adfe5acfa2f2d409a9c28d865fa3cf7ba
SHA25642383da5050d38c8b8b24e09bb8836479209342d76786bf31d8a6818e3107550
SHA51263a0e0d8b73174739a309d1a4906a1b3f0ec4c586b23253a9b289a567443027c2ea44f59596f5e39e73f2f9ec1de4d43c0cfd8c6cb12592eb2e0b6a8706c3241
-
Filesize
522KB
MD54893901755475f0d5180da1c67ed1970
SHA1b9b2bb48871d1c7c933719dfe69117aca58fde95
SHA256c289e39aa1d52577467df4159474c6f1b73b6b3ebdfd9e47667e994a6c38d813
SHA512ae5a96bba2472f22ff7a899b42b8240271366ad963a4098ac789c662b64d1e6bffc2050980ed42414385130ef68b77a7b307e3024de2c8d1b041acc52958b725
-
Filesize
452KB
MD5edf35ff01062140fed83d7bd27fe3be7
SHA1519ca3b630d9599644c561cf660a556e2cc1f65e
SHA25614e1625d5e4d01e21615ca7e88ed4d56d83e498f8b3f16e626baa2e6ae9cc0f7
SHA5128fcadb6edeae64216426c160622417d11e1bf66c006bf0215482b8a7e4376d99f876128b0de80ae630fd57f60552af03d2eef51fed7fce0424cee352a623feb4
-
Filesize
4KB
MD5eb79485755880bd80d8c0ffed8370c92
SHA1da8c559f0e86cbfdc49c41a8f5ff54d0904318c0
SHA25602f1d66584ebd9d3de8bdde6af73a1aff8ddd2dceeb253769c1a96f002ecff56
SHA5125b84fe051f96920be55c728f675fc4f859ed15797d9cbc46e8669ea06c398fddeb4becffb8990b8de9bf2cc13cd6975dfa7abb130fd9bba18a3710686473701a
-
Filesize
874KB
MD5a6a1abaf12a28ea8f6553356c3bdcf57
SHA1b7613fb9944bc3d8e11b5eb6f7ff706f04e8ad53
SHA256f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76
SHA512e525d119128c1ca1c05d379b9ebba9791b7b15390c8999773bff6517fde674178e17ee2c7c126b249c8c54b4dd1c07326ba24d52c8c192f067bc7e8545113a65
-
Filesize
110KB
MD5ba63814f60e82f42afdc9c9958db93ae
SHA1f322b087d62362047a260df614fc9ae3ad506d0a
SHA25678084f8e2204f2d970a5659555755e02168a1180ec97667c9afd8da4b97f179b
SHA51259f56f59c2171189680369fe61f86d01158b4af9e8b56e25b9231e24d3b7c6f40445a72402d775e94111f54ab9d6ed7ff96c29ae2167d76e151bace8c82cbad3
-
Filesize
136KB
MD516e5a492c9c6ae34c59683be9c51fa31
SHA197031b41f5c56f371c28ae0d62a2df7d585adaba
SHA25635c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66
SHA51220fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6