Analysis
-
max time kernel
14s -
max time network
17s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/03/2025, 21:33
Behavioral task
behavioral1
Sample
Update.exe
Resource
win11-20250313-en
General
-
Target
Update.exe
-
Size
9.5MB
-
MD5
78bf7bc31ad99983c225a0f8a28ae27f
-
SHA1
e5cb021b61bf9feace51de74c6afeaa32bd2db52
-
SHA256
b8a4ce5511e2c005767a77bc1d472fbb324a186d75b6a3a4a53bd53467d965fb
-
SHA512
d7fef696bc2ad679e394b8d3eeeaead5101f9039e2cc75860b021d53f210285da34f97b7e618d63542dd5761268c17e34687cd8dc6480643a176029010a9a55a
-
SSDEEP
196608:u0nM28FouG0bBrmRXwXXnbRHvUWvoghxRno/w3iFCxwQbRtXpDpvMNgmp:1YWgXXbRHdlxNo/w3uCxwQb5JMNlp
Malware Config
Signatures
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4768 netsh.exe 2288 netsh.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 5008 cmd.exe 1872 powershell.exe -
Loads dropped DLL 32 IoCs
pid Process 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe 1040 Update.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 1 discord.com 8 discord.com 9 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
pid Process 6104 cmd.exe 3016 ARP.EXE -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 2312 tasklist.exe 4176 tasklist.exe 4672 tasklist.exe 2284 tasklist.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 2232 cmd.exe -
resource yara_rule behavioral1/files/0x001900000002b276-46.dat upx behavioral1/memory/1040-50-0x00007FFAFB7A0000-0x00007FFAFBC05000-memory.dmp upx behavioral1/files/0x001900000002b231-52.dat upx behavioral1/memory/1040-58-0x00007FFB095E0000-0x00007FFB09604000-memory.dmp upx behavioral1/files/0x001900000002b26e-59.dat upx behavioral1/memory/1040-60-0x00007FFB05D60000-0x00007FFB05D6F000-memory.dmp upx behavioral1/files/0x001900000002b237-73.dat upx behavioral1/files/0x001900000002b241-79.dat upx behavioral1/files/0x001900000002b23e-78.dat upx behavioral1/files/0x001900000002b23d-77.dat upx behavioral1/files/0x001900000002b22f-80.dat upx behavioral1/files/0x001d00000002b236-82.dat upx behavioral1/memory/1040-81-0x00007FFB05C90000-0x00007FFB05CA9000-memory.dmp upx behavioral1/memory/1040-83-0x00007FFB04750000-0x00007FFB0477C000-memory.dmp upx behavioral1/memory/1040-85-0x00007FFB04850000-0x00007FFB04869000-memory.dmp upx behavioral1/files/0x001900000002b27c-86.dat upx behavioral1/memory/1040-87-0x00007FFB05D50000-0x00007FFB05D5D000-memory.dmp upx behavioral1/files/0x004900000002b23c-84.dat upx behavioral1/files/0x001900000002b23b-75.dat upx behavioral1/files/0x001900000002b238-74.dat upx behavioral1/files/0x001900000002b235-71.dat upx behavioral1/files/0x001900000002b232-70.dat upx behavioral1/files/0x001c00000002b230-69.dat upx behavioral1/files/0x001a00000002b22c-67.dat upx behavioral1/files/0x001a00000002b27e-66.dat upx behavioral1/files/0x001900000002b27d-65.dat upx behavioral1/files/0x001900000002b274-63.dat upx behavioral1/files/0x001900000002b26f-62.dat upx behavioral1/files/0x001900000002b26d-61.dat upx behavioral1/memory/1040-89-0x00007FFB03A90000-0x00007FFB03AAE000-memory.dmp upx behavioral1/memory/1040-91-0x00007FFAFFA30000-0x00007FFAFFB9D000-memory.dmp upx behavioral1/memory/1040-93-0x00007FFB03A60000-0x00007FFB03A8E000-memory.dmp upx behavioral1/memory/1040-101-0x00007FFB095E0000-0x00007FFB09604000-memory.dmp upx behavioral1/memory/1040-100-0x00007FFAEEAD0000-0x00007FFAEEE44000-memory.dmp upx behavioral1/memory/1040-98-0x00007FFB03910000-0x00007FFB039C6000-memory.dmp upx behavioral1/memory/1040-97-0x00007FFAFB7A0000-0x00007FFAFBC05000-memory.dmp upx behavioral1/memory/1040-106-0x00007FFB03A30000-0x00007FFB03A40000-memory.dmp upx behavioral1/files/0x001900000002b271-107.dat upx behavioral1/memory/1040-111-0x00007FFB037A0000-0x00007FFB037B5000-memory.dmp upx behavioral1/files/0x001900000002b281-114.dat upx behavioral1/files/0x001900000002b273-116.dat upx behavioral1/memory/1040-119-0x00007FFB03A90000-0x00007FFB03AAE000-memory.dmp upx behavioral1/memory/1040-120-0x00007FFB00A90000-0x00007FFB00AB2000-memory.dmp upx behavioral1/memory/1040-118-0x00007FFB009E0000-0x00007FFB009FB000-memory.dmp upx behavioral1/memory/1040-117-0x00007FFAFB1F0000-0x00007FFAFB308000-memory.dmp upx behavioral1/memory/1040-110-0x00007FFB04850000-0x00007FFB04869000-memory.dmp upx behavioral1/files/0x001900000002b244-122.dat upx behavioral1/files/0x001900000002b243-124.dat upx behavioral1/files/0x001900000002b249-133.dat upx behavioral1/memory/1040-132-0x00007FFB03A60000-0x00007FFB03A8E000-memory.dmp upx behavioral1/memory/1040-134-0x00007FFB03910000-0x00007FFB039C6000-memory.dmp upx behavioral1/files/0x001900000002b26c-141.dat upx behavioral1/memory/1040-144-0x00007FFB007B0000-0x00007FFB007CE000-memory.dmp upx behavioral1/memory/1040-143-0x00007FFB03A40000-0x00007FFB03A54000-memory.dmp upx behavioral1/files/0x001900000002b26a-145.dat upx behavioral1/memory/1040-146-0x00007FFAEE2D0000-0x00007FFAEEACE000-memory.dmp upx behavioral1/memory/1040-140-0x00007FFB03840000-0x00007FFB0384A000-memory.dmp upx behavioral1/memory/1040-139-0x00007FFAEEAD0000-0x00007FFAEEE44000-memory.dmp upx behavioral1/memory/1040-137-0x00007FFB007D0000-0x00007FFB00802000-memory.dmp upx behavioral1/memory/1040-131-0x00007FFB00970000-0x00007FFB009BD000-memory.dmp upx behavioral1/memory/1040-130-0x00007FFB00950000-0x00007FFB00961000-memory.dmp upx behavioral1/memory/1040-129-0x00007FFB009C0000-0x00007FFB009D8000-memory.dmp upx behavioral1/memory/1040-128-0x00007FFAFFA30000-0x00007FFAFFB9D000-memory.dmp upx behavioral1/files/0x001c00000002b248-126.dat upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5352 sc.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 5508 cmd.exe 3128 netsh.exe -
System Network Connections Discovery 1 TTPs 1 IoCs
Attempt to get a listing of network connections.
pid Process 3928 NETSTAT.EXE -
Collects information from the system 1 TTPs 1 IoCs
Uses WMIC.exe to find detailed system information.
pid Process 5852 WMIC.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 3648 ipconfig.exe 3928 NETSTAT.EXE -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 5036 systeminfo.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1872 powershell.exe 1872 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4552 WMIC.exe Token: SeSecurityPrivilege 4552 WMIC.exe Token: SeTakeOwnershipPrivilege 4552 WMIC.exe Token: SeLoadDriverPrivilege 4552 WMIC.exe Token: SeSystemProfilePrivilege 4552 WMIC.exe Token: SeSystemtimePrivilege 4552 WMIC.exe Token: SeProfSingleProcessPrivilege 4552 WMIC.exe Token: SeIncBasePriorityPrivilege 4552 WMIC.exe Token: SeCreatePagefilePrivilege 4552 WMIC.exe Token: SeBackupPrivilege 4552 WMIC.exe Token: SeRestorePrivilege 4552 WMIC.exe Token: SeShutdownPrivilege 4552 WMIC.exe Token: SeDebugPrivilege 4552 WMIC.exe Token: SeSystemEnvironmentPrivilege 4552 WMIC.exe Token: SeRemoteShutdownPrivilege 4552 WMIC.exe Token: SeUndockPrivilege 4552 WMIC.exe Token: SeManageVolumePrivilege 4552 WMIC.exe Token: 33 4552 WMIC.exe Token: 34 4552 WMIC.exe Token: 35 4552 WMIC.exe Token: 36 4552 WMIC.exe Token: SeDebugPrivilege 4672 tasklist.exe Token: SeIncreaseQuotaPrivilege 4552 WMIC.exe Token: SeSecurityPrivilege 4552 WMIC.exe Token: SeTakeOwnershipPrivilege 4552 WMIC.exe Token: SeLoadDriverPrivilege 4552 WMIC.exe Token: SeSystemProfilePrivilege 4552 WMIC.exe Token: SeSystemtimePrivilege 4552 WMIC.exe Token: SeProfSingleProcessPrivilege 4552 WMIC.exe Token: SeIncBasePriorityPrivilege 4552 WMIC.exe Token: SeCreatePagefilePrivilege 4552 WMIC.exe Token: SeBackupPrivilege 4552 WMIC.exe Token: SeRestorePrivilege 4552 WMIC.exe Token: SeShutdownPrivilege 4552 WMIC.exe Token: SeDebugPrivilege 4552 WMIC.exe Token: SeSystemEnvironmentPrivilege 4552 WMIC.exe Token: SeRemoteShutdownPrivilege 4552 WMIC.exe Token: SeUndockPrivilege 4552 WMIC.exe Token: SeManageVolumePrivilege 4552 WMIC.exe Token: 33 4552 WMIC.exe Token: 34 4552 WMIC.exe Token: 35 4552 WMIC.exe Token: 36 4552 WMIC.exe Token: SeDebugPrivilege 2284 tasklist.exe Token: SeDebugPrivilege 2312 tasklist.exe Token: SeDebugPrivilege 1872 powershell.exe Token: SeIncreaseQuotaPrivilege 5852 WMIC.exe Token: SeSecurityPrivilege 5852 WMIC.exe Token: SeTakeOwnershipPrivilege 5852 WMIC.exe Token: SeLoadDriverPrivilege 5852 WMIC.exe Token: SeSystemProfilePrivilege 5852 WMIC.exe Token: SeSystemtimePrivilege 5852 WMIC.exe Token: SeProfSingleProcessPrivilege 5852 WMIC.exe Token: SeIncBasePriorityPrivilege 5852 WMIC.exe Token: SeCreatePagefilePrivilege 5852 WMIC.exe Token: SeBackupPrivilege 5852 WMIC.exe Token: SeRestorePrivilege 5852 WMIC.exe Token: SeShutdownPrivilege 5852 WMIC.exe Token: SeDebugPrivilege 5852 WMIC.exe Token: SeSystemEnvironmentPrivilege 5852 WMIC.exe Token: SeRemoteShutdownPrivilege 5852 WMIC.exe Token: SeUndockPrivilege 5852 WMIC.exe Token: SeManageVolumePrivilege 5852 WMIC.exe Token: 33 5852 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5904 wrote to memory of 1040 5904 Update.exe 81 PID 5904 wrote to memory of 1040 5904 Update.exe 81 PID 1040 wrote to memory of 1420 1040 Update.exe 83 PID 1040 wrote to memory of 1420 1040 Update.exe 83 PID 1040 wrote to memory of 4832 1040 Update.exe 85 PID 1040 wrote to memory of 4832 1040 Update.exe 85 PID 1040 wrote to memory of 5220 1040 Update.exe 86 PID 1040 wrote to memory of 5220 1040 Update.exe 86 PID 4832 wrote to memory of 4552 4832 cmd.exe 90 PID 4832 wrote to memory of 4552 4832 cmd.exe 90 PID 5220 wrote to memory of 4672 5220 cmd.exe 91 PID 5220 wrote to memory of 4672 5220 cmd.exe 91 PID 1040 wrote to memory of 2232 1040 Update.exe 93 PID 1040 wrote to memory of 2232 1040 Update.exe 93 PID 2232 wrote to memory of 2300 2232 cmd.exe 95 PID 2232 wrote to memory of 2300 2232 cmd.exe 95 PID 1040 wrote to memory of 2552 1040 Update.exe 96 PID 1040 wrote to memory of 2552 1040 Update.exe 96 PID 2552 wrote to memory of 2284 2552 cmd.exe 98 PID 2552 wrote to memory of 2284 2552 cmd.exe 98 PID 1040 wrote to memory of 6128 1040 Update.exe 99 PID 1040 wrote to memory of 6128 1040 Update.exe 99 PID 1040 wrote to memory of 2140 1040 Update.exe 100 PID 1040 wrote to memory of 2140 1040 Update.exe 100 PID 1040 wrote to memory of 104 1040 Update.exe 101 PID 1040 wrote to memory of 104 1040 Update.exe 101 PID 1040 wrote to memory of 5008 1040 Update.exe 103 PID 1040 wrote to memory of 5008 1040 Update.exe 103 PID 104 wrote to memory of 2312 104 cmd.exe 107 PID 104 wrote to memory of 2312 104 cmd.exe 107 PID 2140 wrote to memory of 5312 2140 cmd.exe 108 PID 2140 wrote to memory of 5312 2140 cmd.exe 108 PID 6128 wrote to memory of 1616 6128 cmd.exe 109 PID 6128 wrote to memory of 1616 6128 cmd.exe 109 PID 5312 wrote to memory of 3352 5312 cmd.exe 110 PID 5312 wrote to memory of 3352 5312 cmd.exe 110 PID 5008 wrote to memory of 1872 5008 cmd.exe 111 PID 5008 wrote to memory of 1872 5008 cmd.exe 111 PID 1616 wrote to memory of 704 1616 cmd.exe 112 PID 1616 wrote to memory of 704 1616 cmd.exe 112 PID 1040 wrote to memory of 5508 1040 Update.exe 113 PID 1040 wrote to memory of 5508 1040 Update.exe 113 PID 1040 wrote to memory of 6104 1040 Update.exe 115 PID 1040 wrote to memory of 6104 1040 Update.exe 115 PID 5508 wrote to memory of 3128 5508 cmd.exe 117 PID 5508 wrote to memory of 3128 5508 cmd.exe 117 PID 6104 wrote to memory of 5036 6104 cmd.exe 118 PID 6104 wrote to memory of 5036 6104 cmd.exe 118 PID 6104 wrote to memory of 4868 6104 cmd.exe 121 PID 6104 wrote to memory of 4868 6104 cmd.exe 121 PID 6104 wrote to memory of 5852 6104 cmd.exe 122 PID 6104 wrote to memory of 5852 6104 cmd.exe 122 PID 6104 wrote to memory of 5796 6104 cmd.exe 123 PID 6104 wrote to memory of 5796 6104 cmd.exe 123 PID 5796 wrote to memory of 1400 5796 net.exe 124 PID 5796 wrote to memory of 1400 5796 net.exe 124 PID 6104 wrote to memory of 2064 6104 cmd.exe 125 PID 6104 wrote to memory of 2064 6104 cmd.exe 125 PID 2064 wrote to memory of 1956 2064 query.exe 126 PID 2064 wrote to memory of 1956 2064 query.exe 126 PID 6104 wrote to memory of 4548 6104 cmd.exe 127 PID 6104 wrote to memory of 4548 6104 cmd.exe 127 PID 4548 wrote to memory of 388 4548 net.exe 128 PID 4548 wrote to memory of 388 4548 net.exe 128 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2300 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5904 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵PID:1420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵
- Suspicious use of WriteProcessMemory
PID:5220 -
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4672
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\WinService\Update.exe""3⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\WinService\Update.exe"4⤵
- Views/modifies file attributes
PID:2300
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"3⤵
- Suspicious use of WriteProcessMemory
PID:6128 -
C:\Windows\system32\cmd.execmd.exe /c chcp4⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\system32\chcp.comchcp5⤵PID:704
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"3⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\system32\cmd.execmd.exe /c chcp4⤵
- Suspicious use of WriteProcessMemory
PID:5312 -
C:\Windows\system32\chcp.comchcp5⤵PID:3352
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:104 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"3⤵
- Clipboard Data
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Get-Clipboard4⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"3⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:5508 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3128
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"3⤵
- Network Service Discovery
- Suspicious use of WriteProcessMemory
PID:6104 -
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:5036
-
-
C:\Windows\system32\HOSTNAME.EXEhostname4⤵PID:4868
-
-
C:\Windows\System32\Wbem\WMIC.exewmic logicaldisk get caption,description,providername4⤵
- Collects information from the system
- Suspicious use of AdjustPrivilegeToken
PID:5852
-
-
C:\Windows\system32\net.exenet user4⤵
- Suspicious use of WriteProcessMemory
PID:5796 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user5⤵PID:1400
-
-
-
C:\Windows\system32\query.exequery user4⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\system32\quser.exe"C:\Windows\system32\quser.exe"5⤵PID:1956
-
-
-
C:\Windows\system32\net.exenet localgroup4⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup5⤵PID:388
-
-
-
C:\Windows\system32\net.exenet localgroup administrators4⤵PID:4332
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators5⤵PID:2800
-
-
-
C:\Windows\system32\net.exenet user guest4⤵PID:5000
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user guest5⤵PID:2904
-
-
-
C:\Windows\system32\net.exenet user administrator4⤵PID:3532
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user administrator5⤵PID:3308
-
-
-
C:\Windows\System32\Wbem\WMIC.exewmic startup get caption,command4⤵PID:3304
-
-
C:\Windows\system32\tasklist.exetasklist /svc4⤵
- Enumerates processes with tasklist
PID:4176
-
-
C:\Windows\system32\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:3648
-
-
C:\Windows\system32\ROUTE.EXEroute print4⤵PID:5960
-
-
C:\Windows\system32\ARP.EXEarp -a4⤵
- Network Service Discovery
PID:3016
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -ano4⤵
- System Network Connections Discovery
- Gathers network information
PID:3928
-
-
C:\Windows\system32\sc.exesc query type= service state= all4⤵
- Launches sc.exe
PID:5352
-
-
C:\Windows\system32\netsh.exenetsh firewall show state4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4768
-
-
C:\Windows\system32\netsh.exenetsh firewall show config4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2288
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:4476
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:4576
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:5372
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:3332
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1System Information Discovery
2System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD511d9ac94e8cb17bd23dea89f8e757f18
SHA1d4fb80a512486821ad320c4fd67abcae63005158
SHA256e1d6f78a72836ea120bd27a33ae89cbdc3f3ca7d9d0231aaa3aac91996d2fa4e
SHA512aa6afd6bea27f554e3646152d8c4f96f7bcaaa4933f8b7c04346e410f93f23cfa6d29362fd5d51ccbb8b6223e094cd89e351f072ad0517553703f5bf9de28778
-
Filesize
31KB
MD55ac42f262cc09090c6a48d5fc62df35d
SHA13212f51e0aef967f8ea25915a2300ea3ab5ebc06
SHA2563d0722237a631e7bef6b17ce774ffd31bf5afa5692713d66d3437866cc0539bf
SHA512e0a518766b44f361209c583f1d47ecedfa611ae6886e7a9dde96f1a4db8dde3d303279730d77c9b2979a079b29bb1ae200d9bb66f1b5a583cd77f0850f5e5d67
-
Filesize
43KB
MD5913ea71b48187b2b4d3f314fbd5c22c9
SHA14eac25efcbe9fe15bb166e7e23055f4efb3f452e
SHA2569945efd6afccb4a77c8224263849857df5879d5e1b25eeae744ea89b5ddc83d9
SHA512023cf3a6dfe4c4b82afca087e5d080760853ddd236290fedb03dae6f7d366b700168c8c58d3425a76c3c852ec02ede1608b0115a1679edf4a7813125fce118ee
-
Filesize
71KB
MD50f3bb6ed00d27ff36e3ac71ff0521b18
SHA1554e61187daffd0261418b77761ae3c35867b0b8
SHA256c0fe78e4f69114c35bbc3c3f06eb61fe04d9934c95864256cadc2cb6cbfecec3
SHA512fff7dee11cc82e3209ddabce225a36ca2cd19276a3450f484a20e88c93ab539839628e9614839363cd44478911a5ada14543cb63a33d2739d86b1e2d498979c0
-
Filesize
53KB
MD581f852d618a1487cd9bc8749b5fac6d7
SHA10800d143305337e2afaa4e05046de3e454799f12
SHA256fa2c997f3aadd928978e61b813d9f93ebfcacade0ba12402b3aa355751bb4313
SHA5122f13712722d4418ca7645b328edd4a4b6f3fa151b4d342e5c2ec98b8b090d135a358ab655673f1f6e4da0c1de2b747937faec948e5e26e4e74e3f8708b5c47fd
-
Filesize
101KB
MD5e3781f47cef521624b1c6ee552940137
SHA1732ccfa507aefaeb2fb88047a54af2004e7f60ea
SHA256f85661cb975e69ed3530fc028e393df40284ac791e583d255b519a2b8d6aab9d
SHA512ad0d404794028f915974f359ed01217bc0d5bac13e04ce77e76413ee1fe9f26441eb7ff40a46724aa62d3546f4ae708629da0bd682029d6b716957ac1b8143c3
-
Filesize
30KB
MD559e6d6adf923b2fc2424e4835a6ad760
SHA1d4393cfdc6386f6a506757af85eb28d4a5884f26
SHA2569c550bfad363a57ff47b6b755226bfb9d585d589ff394bbf833803f31c1af523
SHA512ee0138aad756049fb9d6a3a803519f6dec031486ea873c224bb037cb9d01cf541e99c17afb7526f7bf8d4a1dfdedc1825aa939fa0cbf30cd68258ea15aca8ea9
-
Filesize
81KB
MD5ea192b70bc5b7ae97739b6c1cc46e7a0
SHA136b0fd8e87790d5aee7ab9f45b6eee4e7b9f3519
SHA256a3dcb291e91e63093f7d16a5b886025ea76bfecc0075b0742781c5a8dfa93e4c
SHA5129adfecc700700c84dc6ac43ad6b428861fcdf277b80a839531199f5cb47424ea484943b0e92ed1045c7d65437e610f7435a1be7547bccb7245a61968ee85b25a
-
Filesize
22KB
MD578f6607712a7fdf5e2063091cac8c2a6
SHA17900dd2b01e57a2f605b1663df7058d5bc230b41
SHA256e9b67a45418080f7cd8b34fdf5fc58a2c61298eb94bb6d42f7ba026b58822924
SHA512b4ceb7816cb55938aeb87d820e403f3dd78035ca851a5b66803cda474f6b33383f3b1a0d48a33ceac0f30313b439c3762f78038c2e5393eface19649dd96dbca
-
Filesize
27KB
MD51ac70d595989db44c804e93995896b33
SHA13ec397d4f5064e3a98121f42ff60c58fc55f10a8
SHA25635b3dab6800c46df81c0444d31f08f1afb29dfccf37c06464a78ce4759dcf09a
SHA512221fc17669a7849411222a9a80b4357bc6db6a942a94ae0bd16e3066950120be5ca3225dbf6d5d132271e7ca8d12f66f6e0ed0641b2e0f4a00786d0ec4227eaf
-
Filesize
21KB
MD505b71255ecb808e4fa0e07139d502c96
SHA150c66f3b63a521af07bedd660112843472ec7755
SHA25611cfd58b09671006d3cd12d18cb9b156322d0dddf39ae8b9e860b0552f1bc012
SHA512b330427445d5c2d33ea22a8adced5e99573944da1e0802492969256663939250bfc86bd7c4b417204f6873358cbd7971ce5d06e45c951947bc6731386342b1c7
-
Filesize
38KB
MD5ef936b33671ee98f78758c156bf9ff59
SHA1c494a67040937eb0d0b0c617925c3d294174a818
SHA25671d9242bbc5912cc12e30bd386732e6409551962b32a93a7c1676a8bea9f12c6
SHA512d9d844d60e243331e8ccb089d4e51d6d2860158f780b6337f543f66a84b90f30b63576caba7b3b504654bd71d38c51ad3c6df5075040c586483c9ae69fb7de40
-
Filesize
45KB
MD52663e0dc8858f0ac70f340cdd4af5cc3
SHA1831940913e38c8aecc5dc50cdc77b6e9bb89de18
SHA25638f338a1d6683bf1d362b66fa663a100113cb310efa9c7dd10c0ce6fe239b8c2
SHA5125b8a187f3351fc033d3cf183ac65692ccbed0a6bda2d92c92b9daedf35dbd11e2ecf247a9cc27ab95b638947776ad731711c35e021779453a674e3b01dd8909f
-
Filesize
57KB
MD50f6491331f85b0963ca83d6d86c193bb
SHA17ccd882f1f7561f281c92555404579a8a19848d5
SHA2560ab48704abda2ff6a6ade9ef232d42d6d5dbe104edf3b7665c94b78da382c34f
SHA512400e34321edd5a1cfba50b427d7dcfc11fb1cbd4382520bd75302e9fc47238e5a83ee5e3de0fa715c92a008b22c111f75b2098ce34d0f0782fe1584804bb00b0
-
Filesize
18KB
MD5775e1ab72b9d8ba933c9f9428788faa1
SHA17151f6e3b7517bdec6a1f0cfc3ed5df790449e9e
SHA25682045717705b45f8dff3137b20161d1c2b09abe990efe14075a731be5a5f844d
SHA5120e05925f9a09dc7d90a3a49a2ace4686c26f63e955e0d63f11fdc94787e73cacab44373a155bc3cb7c55fd7b4a80a9e7447829f96162d7577ae8b859f995f52f
-
Filesize
81KB
MD596f7319233375ebccaa37083a1f8aead
SHA11a8adffe7a73b72f4661f9996226d82c9243266b
SHA2568e71e5fa01201ee699d4c39e8eaf6159ac3faa27d9b22955c7f05012b43894d3
SHA51265ce7e349291dd7fe6600dc0167f1178ee59ffb7ab2c2bf61e8f604574803de5ac2467b90947607553c4b6991498d134fb3a272c35ece7ad24b41cd33a2cea07
-
Filesize
24KB
MD5c2f690a595eae3e243b3e900901c83da
SHA1f740c572c79e084e25dc289776fadfb32e2a380b
SHA25656deb03068778399b5f99d65de9b45e1059bd8bda2e1380c2b38e6584c7830b7
SHA51240983399b64a1e7bef375e941da60c931fada8bd9595f565cefada84b90205a7e74f6cf6a10604dcb024c35f660dd84e3be13a748f7c5b67790328d02a712011
-
Filesize
19KB
MD5712553a7a0bb519cc959a8776a301d36
SHA1ee01efad7a7007d2adb235bc64855c98877650d8
SHA256d285d23acf5c7825329e7c9398cd9427161c8394fcd5fa3157c1eaa2134b33ff
SHA512abf0e21a84b9776b2304d8f9d31374ef8dd44ba9fcb31e1ed6bd54372fd8cc97ef602f47210836bc1150fb4c10a3ec30854ae5bea0e9fada7476513f3618c684
-
Filesize
61KB
MD5a9a69d644f5543fbb9f0a2c835880173
SHA12ef73d10e656f6bdc9fb5a2b5718f2ad5982ec48
SHA25623c43109c3e65d1fffc1caf3e9eb8ef6b281ec9ca7b49099072e50a3a1273c51
SHA512bf21ea75654a67671982595fcdc476867d5c80c8572988072b455834a0f6224bc9144f68092fc43f560379fe87df6e918e3cdee7324a5c9fedc7f7f8ae94dce5
-
Filesize
858KB
MD5bf3a7379760fa2f569c2511f45eb1939
SHA16d7dff383ddd562d435d20dd70de30a051bfa524
SHA256b931c0b00f7a3b3cb2fa2dae5966522eed25c2ef459c46bdb6b15007d7249135
SHA51243b13c8f3a82112fc7d4dad5c4a166b37b093b50d58ed974b5f774d2172acac147c5a0c74354dcccba20c728e7434b1e01acd79ad82efc45982f05b95dff95f4
-
Filesize
2.2MB
MD59a1a43297ad484882d74e5ba607d9b02
SHA186f12866abb600f1f6c09848a08925cf01824663
SHA25607d9aa4c758566d7da3d4d443156492ff59bfdc0162b4e586541679941842e49
SHA512dfe41b128a8988a39791c7562edc8b558d90b1b6cd94b647c0d710ed6c23d9754b5a66b114015a28a4f1410ccc3acbf9668c7add1bba8481b9ed29bee95641c6
-
Filesize
36KB
MD57500c54a29e82a9d9cf0a4acfe5b05f3
SHA16220d38bdf714a384ca841d706a83d1fbcdf62aa
SHA2563b7a314523e531aa5c37f47e1599fc27682ffd94b861efcb97db0f735169b9de
SHA51269d63f72b6381d98acb0a9c4865dd16971b8d31891b9cbcbd2b3d7f5189746d0488b164878c41c627953efe60859e27f1e5846efd6f2be72a1d4a33cea2e8f96
-
Filesize
1.1MB
MD5387cc635519cbbade063209595fab750
SHA1ca3148cf9a50076299c7a0e93c431d614cf74fd9
SHA256e36ffa0441d8a470a25c0180880a46b7afd7e335f405ee683cd8a1c767b22aed
SHA5122b5dacdf4c5df8bb5f866997fcf54263629a314bf587db89bc59428442f451d2d1eac7e3769955b5811a2f45e271d6a16bc34f083c07ed73ef4291e66c182477
-
Filesize
23KB
MD54d210a9aeda06aeadf87a9704c6c67a2
SHA1bb7d8f9dcd5267a16435725ddf36d3de8cc14cff
SHA25633021fa98c3c7350d9eade34f951d62a98893ec743a398b28a13e13ade49db70
SHA5122c1819db2243f9048d664d336b95932e315df30d991d87ecd1933afc8d97d3620755cea076a14ff4e5f41218146a15ee54463b58dcd7abf4203e6ca09c83a22c
-
Filesize
198KB
MD59494ca237447995d0a443cdea0bc4561
SHA1dbee6c763aa3fca3cc59b23afa7c8951fc02ba74
SHA256b94e1842197daf9f243397de9936f0753dc70ea3305b6d695390ee62064e49fe
SHA51230aecdabaa3ae3501ef894a674b585f44e2e840a9f0e65471d86015499b4ddee9d96d4e8f3840c8ef0d26dbaa84cf815e5e95b8a06e69ba47e4b419d7060a522
-
Filesize
20KB
MD55365a6c93e43d78eb765400b24511760
SHA1528e5e6b9899daf44a4cc5293f15dd59d5a6fffe
SHA25670c6dc7a0785fb2740f0caea844b6d0888dba95ed05c3ed5f4a16aa6352efc37
SHA512ed676e239da2b1aa7125bd8e1fa532efb27fb4d42bbe686c9099bdf634a931205006da93ee0796a5d5011c97c4b0c79f3ff169945df3cd26c4196cd9c44a8e2e
-
Filesize
31KB
MD5baa89a4955fdaf473e3d463a0078f5f3
SHA1d8caab25801144c0e5d5c573214f0c5b312d924a
SHA256741e9ebdbe8fe7c265d85d1aafc44ecb09fa13451275793fa131b7be93a8bcbb
SHA51299bb470b969cc6a5e8d82e4bab55ba5fba655c53cf8a38c38d9cda335c82f72e62c4bb4c6b003ebdb8168e412761bb5a15c52e0255814938d5a58f30520bee2b
-
Filesize
81KB
MD59bef8aaeb5fbad613190c22676b0f03f
SHA14599cd3290131277e5b7d5b23006830b18285a6b
SHA256dab6880768f5e0a1bdf11a36ecde72a088aa1bfd9eeb9c60a71a7ac642ee911e
SHA5124138ad38bb22d06c4f001b91e3afb8d85c007356e35bb24b81e214fc2e171d35961f2500866c7aa27f94c23b9d2369b156e1b1e79f189ed91058ffd2f7e7cb4d
-
Filesize
60KB
MD5a5471f05fd616b0f8e582211ea470a15
SHA1cb5f8bf048dc4fc58f80bdfd2e04570dbef4730e
SHA2568d5e09791b8b251676e16bdd66a7118d88b10b66ad80a87d5897fadbefb91790
SHA512e87d06778201615b129dcf4e8b4059399128276eb87102b5c3a64b6e92714f6b0d5bde5df4413cc1b66d33a77d7a3912eaa1035f73565dbfd62280d09d46abff
-
Filesize
1.4MB
MD5643f473fdaba32c50702a284d1c00405
SHA15c9e72173d751f30db73517d86e1a04401550df5
SHA2564673139fd1e626ae740c8ed9c425bc19324c0acbe42a9c878922857995211c17
SHA5122481f8f7bef4c34b04d9f5095cfbbf3fe7d8ca4afc3eb9e3049b23fe5a7c0f1235ad50214c235ad7e35511ca1290a3a821b4e0a988c8d0d9f071aaf379eaf199
-
Filesize
21KB
MD5d2e4412c4defdbafe3653e2f3f48b22b
SHA19818dfed4664d06aec6217eda3cee1286c3aa74d
SHA256c1095bac0953a140b5ad33c9c34c99c32cbeac15f21444abd5eb4729cdd79e68
SHA5129844b7821235dc42d1f8f53a348cb17c9b5b525ab98aa424884868f9aca78181628ed66ea1085882352fd6999555fd5f1f28d2127e9132edf71076248e66f35e
-
Filesize
605KB
MD57cdd55e7452637c91374424f46321595
SHA143fd583a4a972f2abca7956a6ef0541f54dcbf63
SHA256e7341e76e2266c958f43a58bec28b6908e865765faad9b956e3305dd86def837
SHA512ec2839eaa347cd45dffc5f53ec5f852a0c5025631c99447de52d81dfd3f354592afd5d967441142591dcc2532d6ea2d480687b40025d197bef0bf66fab93fe96
-
Filesize
285KB
MD59edd7fd3dce97c9f67552785b385ade9
SHA1c7873a3ec9faeb4ed82e5f17e8a2026cc0d65a36
SHA25656de23dc020ab40194978fb75b8571dae087e1a429a3e9e0a37be650cb237b83
SHA512914729ffd638a72289fb034cd0109ede0d8bb2f8605755e6f5164eafc9c2c4b9225a5f4ef5ac37b542aec325345bc24652a549f8b7582fefa1b9c51eeb830dce
-
Filesize
41KB
MD533276ceadf2b443d5b68374d8204516c
SHA10305b96b99469937a51024636205ba7b8140d980
SHA256f59ee5ba9d6e426c50826e28ff0ce9f6a7afb441126ab305096e85451bdb77dc
SHA512de73b4beb042ade4487a7ea1207f04c35e7087d18537ca8fd6dcad73d30d7fda67289e5515d910646be4f1cfd777f2aaaa0af28a4fa2448af7d6c535b66c5e56
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82