Analysis
-
max time kernel
120s -
max time network
115s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
08/03/2025, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
injector.msi
Resource
win10ltsc2021-20250217-en
General
-
Target
injector.msi
-
Size
1.2MB
-
MD5
f2ab259a57ce31c7a61cdb4266f28a58
-
SHA1
91569473b6fea4dc90541e25d2239cf7b1ade8ae
-
SHA256
2d6e6b6590d2541da93aaf4690fec839fc56fbabcbd110d18f3d53ae4105c012
-
SHA512
bec918973d2aa44411b5ff1c003a50180dc50b9c19f3fa23776337e99d94757c4c0ec39b39cb4d1bc5fb5c68675b45a2c26eb5e45aaea67479c88161e3be8353
-
SSDEEP
24576:gt9cpVDhtnJlL52UoehMFc+8CrgyZRcO/WrtrDFJIGL5UGWq:/pRhtJB5RbKF7nzZ0ZJb
Malware Config
Extracted
xworm
-
Install_directory
%Userprofile%
-
install_file
injector.exe
-
pastebin_url
https://pastebin.com/raw/DSFaHH8B
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000027f2b-89.dat family_xworm behavioral1/memory/1832-100-0x0000000000C70000-0x0000000000C84000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4544 powershell.exe 2388 powershell.exe 1148 powershell.exe 380 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\injector.lnk clienthook.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\injector.lnk clienthook.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1476 ICACLS.EXE 4928 ICACLS.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\injector = "C:\\Users\\Admin\\injector.exe" clienthook.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\D: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\D: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 29 pastebin.com 30 pastebin.com -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000\Control Panel\International\Geo\Nation injector.exe Key value queried \REGISTRY\USER\S-1-5-21-1252571373-3012572919-3982031544-1000\Control Panel\International\Geo\Nation clienthook.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\LOGS\DPX\setupact.log EXPAND.EXE File opened for modification C:\Windows\LOGS\DPX\setuperr.log EXPAND.EXE File opened for modification C:\Windows\Installer\MSIFC24.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFC34.tmp msiexec.exe File created C:\Windows\Installer\e57f405.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\SourceHash{E215C676-3483-4D54-958D-A4ADB281BAE8} msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIF53D.tmp msiexec.exe File opened for modification C:\Windows\Installer\e57f405.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe -
Executes dropped EXE 5 IoCs
pid Process 1956 injector.exe 984 WindowsServiceHost.exe 1832 clienthook.exe 2492 injector.exe 2068 injector.exe -
Loads dropped DLL 2 IoCs
pid Process 1284 MsiExec.exe 1284 MsiExec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 4364 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ICACLS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPAND.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ICACLS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 448 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2924 msiexec.exe 2924 msiexec.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 4544 powershell.exe 4544 powershell.exe 4544 powershell.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 2388 powershell.exe 2388 powershell.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 2388 powershell.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 1148 powershell.exe 1148 powershell.exe 1148 powershell.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 380 powershell.exe 380 powershell.exe 380 powershell.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 1832 clienthook.exe 1832 clienthook.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe 984 WindowsServiceHost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4364 msiexec.exe Token: SeIncreaseQuotaPrivilege 4364 msiexec.exe Token: SeSecurityPrivilege 2924 msiexec.exe Token: SeCreateTokenPrivilege 4364 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4364 msiexec.exe Token: SeLockMemoryPrivilege 4364 msiexec.exe Token: SeIncreaseQuotaPrivilege 4364 msiexec.exe Token: SeMachineAccountPrivilege 4364 msiexec.exe Token: SeTcbPrivilege 4364 msiexec.exe Token: SeSecurityPrivilege 4364 msiexec.exe Token: SeTakeOwnershipPrivilege 4364 msiexec.exe Token: SeLoadDriverPrivilege 4364 msiexec.exe Token: SeSystemProfilePrivilege 4364 msiexec.exe Token: SeSystemtimePrivilege 4364 msiexec.exe Token: SeProfSingleProcessPrivilege 4364 msiexec.exe Token: SeIncBasePriorityPrivilege 4364 msiexec.exe Token: SeCreatePagefilePrivilege 4364 msiexec.exe Token: SeCreatePermanentPrivilege 4364 msiexec.exe Token: SeBackupPrivilege 4364 msiexec.exe Token: SeRestorePrivilege 4364 msiexec.exe Token: SeShutdownPrivilege 4364 msiexec.exe Token: SeDebugPrivilege 4364 msiexec.exe Token: SeAuditPrivilege 4364 msiexec.exe Token: SeSystemEnvironmentPrivilege 4364 msiexec.exe Token: SeChangeNotifyPrivilege 4364 msiexec.exe Token: SeRemoteShutdownPrivilege 4364 msiexec.exe Token: SeUndockPrivilege 4364 msiexec.exe Token: SeSyncAgentPrivilege 4364 msiexec.exe Token: SeEnableDelegationPrivilege 4364 msiexec.exe Token: SeManageVolumePrivilege 4364 msiexec.exe Token: SeImpersonatePrivilege 4364 msiexec.exe Token: SeCreateGlobalPrivilege 4364 msiexec.exe Token: SeBackupPrivilege 4844 vssvc.exe Token: SeRestorePrivilege 4844 vssvc.exe Token: SeAuditPrivilege 4844 vssvc.exe Token: SeBackupPrivilege 2924 msiexec.exe Token: SeRestorePrivilege 2924 msiexec.exe Token: SeRestorePrivilege 2924 msiexec.exe Token: SeTakeOwnershipPrivilege 2924 msiexec.exe Token: SeRestorePrivilege 2924 msiexec.exe Token: SeTakeOwnershipPrivilege 2924 msiexec.exe Token: SeDebugPrivilege 1832 clienthook.exe Token: SeRestorePrivilege 2924 msiexec.exe Token: SeTakeOwnershipPrivilege 2924 msiexec.exe Token: SeRestorePrivilege 2924 msiexec.exe Token: SeTakeOwnershipPrivilege 2924 msiexec.exe Token: SeDebugPrivilege 4544 powershell.exe Token: SeIncreaseQuotaPrivilege 4544 powershell.exe Token: SeSecurityPrivilege 4544 powershell.exe Token: SeTakeOwnershipPrivilege 4544 powershell.exe Token: SeLoadDriverPrivilege 4544 powershell.exe Token: SeSystemProfilePrivilege 4544 powershell.exe Token: SeSystemtimePrivilege 4544 powershell.exe Token: SeProfSingleProcessPrivilege 4544 powershell.exe Token: SeIncBasePriorityPrivilege 4544 powershell.exe Token: SeCreatePagefilePrivilege 4544 powershell.exe Token: SeBackupPrivilege 4544 powershell.exe Token: SeRestorePrivilege 4544 powershell.exe Token: SeShutdownPrivilege 4544 powershell.exe Token: SeDebugPrivilege 4544 powershell.exe Token: SeSystemEnvironmentPrivilege 4544 powershell.exe Token: SeRemoteShutdownPrivilege 4544 powershell.exe Token: SeUndockPrivilege 4544 powershell.exe Token: SeManageVolumePrivilege 4544 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4364 msiexec.exe 4364 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1832 clienthook.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2924 wrote to memory of 748 2924 msiexec.exe 95 PID 2924 wrote to memory of 748 2924 msiexec.exe 95 PID 2924 wrote to memory of 1284 2924 msiexec.exe 97 PID 2924 wrote to memory of 1284 2924 msiexec.exe 97 PID 2924 wrote to memory of 1284 2924 msiexec.exe 97 PID 1284 wrote to memory of 1476 1284 MsiExec.exe 98 PID 1284 wrote to memory of 1476 1284 MsiExec.exe 98 PID 1284 wrote to memory of 1476 1284 MsiExec.exe 98 PID 1284 wrote to memory of 2096 1284 MsiExec.exe 100 PID 1284 wrote to memory of 2096 1284 MsiExec.exe 100 PID 1284 wrote to memory of 2096 1284 MsiExec.exe 100 PID 1284 wrote to memory of 1956 1284 MsiExec.exe 102 PID 1284 wrote to memory of 1956 1284 MsiExec.exe 102 PID 1956 wrote to memory of 984 1956 injector.exe 103 PID 1956 wrote to memory of 984 1956 injector.exe 103 PID 1956 wrote to memory of 1832 1956 injector.exe 105 PID 1956 wrote to memory of 1832 1956 injector.exe 105 PID 1284 wrote to memory of 4928 1284 MsiExec.exe 106 PID 1284 wrote to memory of 4928 1284 MsiExec.exe 106 PID 1284 wrote to memory of 4928 1284 MsiExec.exe 106 PID 1832 wrote to memory of 4544 1832 clienthook.exe 109 PID 1832 wrote to memory of 4544 1832 clienthook.exe 109 PID 1832 wrote to memory of 2388 1832 clienthook.exe 112 PID 1832 wrote to memory of 2388 1832 clienthook.exe 112 PID 1832 wrote to memory of 1148 1832 clienthook.exe 114 PID 1832 wrote to memory of 1148 1832 clienthook.exe 114 PID 1832 wrote to memory of 380 1832 clienthook.exe 116 PID 1832 wrote to memory of 380 1832 clienthook.exe 116 PID 1832 wrote to memory of 448 1832 clienthook.exe 118 PID 1832 wrote to memory of 448 1832 clienthook.exe 118 PID 1832 wrote to memory of 448 1832 clienthook.exe 118 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\injector.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4364
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:748
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 0DFDE90676101C3C49B320FBDE29DA2B2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-0f6b8fb5-7ae2-489f-b6a8-e03b4100d9c4\." /SETINTEGRITYLEVEL (CI)(OI)HIGH3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1476
-
-
C:\Windows\SysWOW64\EXPAND.EXE"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\MW-0f6b8fb5-7ae2-489f-b6a8-e03b4100d9c4\files\injector.exe"C:\Users\Admin\AppData\Local\Temp\MW-0f6b8fb5-7ae2-489f-b6a8-e03b4100d9c4\files\injector.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Roaming\WindowsServiceHost.exe"C:\Users\Admin\AppData\Roaming\WindowsServiceHost.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:984
-
-
C:\Users\Admin\AppData\Roaming\clienthook.exe"C:\Users\Admin\AppData\Roaming\clienthook.exe"4⤵
- Drops startup file
- Adds Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\clienthook.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'clienthook.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2388
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\injector.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'injector.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:380
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "injector" /tr "C:\Users\Admin\injector.exe"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:448
-
-
-
-
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-0f6b8fb5-7ae2-489f-b6a8-e03b4100d9c4\." /SETINTEGRITYLEVEL (CI)(OI)LOW3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4928
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
C:\Users\Admin\injector.exe"C:\Users\Admin\injector.exe"1⤵
- Executes dropped EXE
PID:2492
-
C:\Users\Admin\injector.exe"C:\Users\Admin\injector.exe"1⤵
- Executes dropped EXE
PID:2068
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
1System Binary Proxy Execution
1Msiexec
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD511c6e74f0561678d2cf7fc075a6cc00c
SHA1535ee79ba978554abcb98c566235805e7ea18490
SHA256d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63
SHA51232c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0
-
Filesize
3KB
MD5020d1cbef5aeb22088c0faff8d76af4e
SHA193e7f27b8fb57cfea4ae330bedcace1a8ce7c014
SHA256cb283829df7f7ca2f7f8072ed014bebb7d424581e8672a9fa5683f3674726bb0
SHA5121046228ed9d08e5296c02409b5aa460e8280a633f7f2022ec7dc7c1e750522260006844bd5114ec713593bce1d10b8932963a8630e6707e76b45a0cb8c8ff53d
-
Filesize
1KB
MD5714c05aecb94594ffcbd61b1eea79d83
SHA1966442eb5cbf00d3d94dff78b67df228e49e1b9f
SHA25607c4ee5409cd3d2f979809ec3eb3b7f245dd5c32d733fa8c683984ba5dfe4c4c
SHA5129777034067dc146ec21c91f357a62fb6841744b1b258b1c642173285636a5e13e6ef6e536fb99331caa1de155071f5e7dd3f3d619992e5e78e319db2862c4b9c
-
Filesize
1KB
MD5808f797fa79f7f9b5c6849d529734680
SHA14bc234dd22f06b07d6e661d813bfc5bdf65e8b03
SHA256e4f003683b47e933315e6d54e81f51fe2c4082f847982a7af338f40c3d0becb2
SHA51270c6d79f484597b07e781c24a7523076f2c647af116d9e0a3e26ad1e595a0fd41ea5c005bfa045a7b3b5e606188584476a4c2318b5a6b7f72dab7d561c151692
-
Filesize
1KB
MD5c9569d209d2c7736dd0bf85e5b391e18
SHA1123597f50a683c6b8b724460aba71b8fbd92d7a7
SHA256e65255c123e55f2972607e6f596be0e8f879a946bdceb235b635f557046bc4b7
SHA51240d491e266869814da5f87410ca2b1de279a1bcd89ef382b13940bdbb9f017d3ad6ece22ab98c8f06fb9d227c4adeafd390be622cb27dd08240f201e96a5ca6a
-
Filesize
919KB
MD53fa959051d9c8679ef470be0ff5be394
SHA1c0c215d74291f222ce815e1ee4f600525840e2a0
SHA256ed7d536917099f13c40749c3a015f8b6b05ad9ab956a5c9ef45544e67b2e919c
SHA5128599420e4f38d57877c8e54026b6124849d3a673c2853e8f30018c2a4b7a87076b5c77a9a40fb05f8d9d8204c0b7c9be23f3ed0ed99d14cbd1de59d71a991267
-
Filesize
1.4MB
MD5f18c325d8e39f3415aa807f6a87a7899
SHA175f84d9beb3ae4b552f8194668acc82710dad7e3
SHA2561db749dd1df020f0854cd103dbf5653efb9583a2f59a3337ca68caa4dc22a975
SHA5126fa2e541b9b137b2c5ed9c3803b208f9925dd3a0ee249340bd501fb0fa79438b3b1c409e15d3b160fc037912be048f285d554770837a8b15f5034e9a90d0b3be
-
Filesize
1KB
MD5de352afd72c629b3d0a33a56fbedf423
SHA12591e1ff94124a03dbbd0aa60bf891e851c27956
SHA2565cdddb7606440f22007acf4e0928d4c72e8b23d71d9ce78d4024dcaf84c857d1
SHA512dfc42fcdb8f881865e6c280e423829bb9687f037df00e9efd20d1dba079242d27e1c2687975976b72648732b701f1fc40f83a4a90341594a867e55a0418d0ba3
-
Filesize
442B
MD5d8ebba77915fad07f38fd76ce2176e7e
SHA1a6c511aea3d756ec1385cb786363db2e96936865
SHA256f05fb193eff2a245d927dc5f92bdaa7936dd3ed3b5cbc1b789d6570997dca77c
SHA512a34e15d1aa20119297c10c8698bfd6fbdc0beac5711b8dea7a203b1420df86fc590ac61494b5cbc45828f070f44f42851101ade3febf8aa697edae2d5d4073d9
-
Filesize
1KB
MD5bc6d57bb52845975fb748b5135e6c808
SHA11b191831cc8d8dadc29c2cbd5bf02922f3c829bc
SHA256069622be14fcb979e5bdfe6a0b9c526fc245be933c1d321febf8adeaeb602d78
SHA5124d154fc12ce55692a8553a18933952a44c232910782207959de1966fcc153066c459849246b21b25edf7ad3051ef967b6117bf47768975488fd9dfe5afd16f23
-
Filesize
1KB
MD549790fb488f1106f7861d9b747bef577
SHA195e12c90c59eb648b32c0ffb80341cc47d81bf9e
SHA256cf20b0eae0fdf894edec4c19d1c600c9f5a4b24c854b89d624b81693cbee54f1
SHA512934da49db2ad9ed1deff89be8d35ac0ff0a3b803b8bb037cc0ee5861690877a7f60d48a59c21e191fbcf906d7f4e4d3c72ea1b2f9d2fae4251d33d37c3576861
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
23KB
MD53b5ba1d090951d3d769836223db57393
SHA19b31771eba4dd8c7bbccdc2a50bb6dad87e42fc4
SHA256898ac3faf4ecaad9b2fee90a2e5545b647e260c7a3f55c40babfa3c002170a19
SHA512959552901b232666b1c4ff75729b18952c39da5672346779d45025daae108eba7a682fc9f41b0edb94c924f0a2c349db57e3ca3dbe5adb0b44c9d1c7d0888d5d
-
Filesize
57KB
MD566fad41f7b041f6b8471678f91d69e5d
SHA1544c90183fa935f37b329d2195f6c9ca8273e5f1
SHA256b52d775f91462e0c7fe1ceed7bd28479706e52bba59196d28151423fb42673a1
SHA5128a12a32e53d210c34705ca887438a469010674a0b38b65d9a35fb08f287e646c76959d9ecb587da0422033d368a4a5e36e8260cd9b3bee45708da2908d1eb5f1
-
Filesize
208KB
MD50c8921bbcc37c6efd34faf44cf3b0cb5
SHA1dcfa71246157edcd09eecaf9d4c5e360b24b3e49
SHA256fd622cf73ea951a6de631063aba856487d77745dd1500adca61902b8dde56fe1
SHA512ed55443e20d40cca90596f0a0542fa5ab83fe0270399adfaafd172987fb813dfd44ec0da0a58c096af3641003f830341fe259ad5bce9823f238ae63b7e11e108
-
Filesize
24.0MB
MD5f0f2ad36907075c84a3b9e5b3185b803
SHA1d896795bfe7260cbb9dbc1542a002d112cdbb31d
SHA2566f1986d6ba1f380ee4eb9188552e073a2b79b4337a33121a6b18dd177c9e368d
SHA512047d89ffc6e87c77b8cdd3e6fb4b90771bc04336f2e47b354953a170e746666fa05ecd4a6a3d236f64057bfa18e50da1fa97cf2d19b670d47db17dfe1b7dc885
-
\??\Volume{1adc0b49-0000-0000-0000-d08302000000}\System Volume Information\SPP\OnlineMetadataCache\{ce0186d7-f8a2-4a0c-b86e-933c4ab6b9ce}_OnDiskSnapshotProp
Filesize6KB
MD5a6f4c13dd22ba9cbe81b30ec71457f52
SHA1dc8175f18aa2f659e54d9bf4c43cc7db5c83f6ea
SHA256e9562ebb7d1f242e6a02d6bf22f38b972bc264a9cea1987064815e77d8ce39d8
SHA5121d06e4cdbc7158459471393ebf371256a6b1726e21bc82039c328f237e23388f60d416e6babeb43b62222fbfa42cbba5def822edd4aa82a50e154fb843ac8a47