Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 20:15
Behavioral task
behavioral1
Sample
0x00090000000186d2-13.exe
Resource
win7-20240729-en
General
-
Target
0x00090000000186d2-13.exe
-
Size
13KB
-
MD5
181921fd5d4f7e043b446392233698ee
-
SHA1
0f710714ea4c01446dcb2ea4f29256fd53633f5c
-
SHA256
aed4ab578ba8613117a2132bee215cdc3b360a1d9f993ad937ed3eecd7e9f3e6
-
SHA512
a04699fa408ceb79f89cf61f2bea6ab85b6d93b52989f7d5ba6bdb22964fe8bc2a19aa3e1a02b063b11f8a63f3d3582ba0a621b97d911c27e2010fe9df5c6172
-
SSDEEP
96:Rn5yFlc1etNBv+B+d4DMwDLxZO7i+/f3FXT/fKFJxGE9b+z2FFhVC7tCEfd:XyketNBm3zZO2+HFHKFJxTZ+zmFhGf
Malware Config
Extracted
phorphiex
185.215.113.66
-
mutex
69759977
Signatures
-
Phorphiex family
-
Xmrig family
-
XMRig Miner payload 20 IoCs
resource yara_rule behavioral2/memory/1868-32-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1868-31-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1868-34-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1868-36-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1868-38-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1868-37-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1868-35-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1868-39-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/720-56-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/720-59-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/720-60-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/720-58-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/720-57-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/720-61-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/2232-79-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/2232-82-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/2232-81-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/2232-80-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/2232-78-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/2232-83-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 2 IoCs
flow pid Process 12 5304 0x00090000000186d2-13.exe 12 5304 0x00090000000186d2-13.exe -
Stops running service(s) 4 TTPs
-
Executes dropped EXE 27 IoCs
pid Process 3940 1727619307.exe 4784 745111286.exe 4868 220721988.exe 4572 sysdoruhgsf.exe 2620 sysdoruhgsf.exe 5104 sysdoruhgsf.exe 3476 sysdoruhgsf.exe 3304 sysdoruhgsf.exe 4060 sysdoruhgsf.exe 3724 sysdoruhgsf.exe 732 sysdoruhgsf.exe 1176 sysdoruhgsf.exe 3192 sysdoruhgsf.exe 1740 sysdoruhgsf.exe 2544 sysdoruhgsf.exe 4860 sysdoruhgsf.exe 2408 sysdoruhgsf.exe 5452 sysdoruhgsf.exe 4460 sysdoruhgsf.exe 5652 sysdoruhgsf.exe 2944 sysdoruhgsf.exe 2668 sysdoruhgsf.exe 732 sysdoruhgsf.exe 5032 sysdoruhgsf.exe 3296 sysdoruhgsf.exe 2480 sysdoruhgsf.exe 5388 sysdoruhgsf.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 25 IoCs
description pid Process procid_target PID 4572 set thread context of 5224 4572 sysdoruhgsf.exe 109 PID 4572 set thread context of 1868 4572 sysdoruhgsf.exe 110 PID 2620 set thread context of 720 2620 sysdoruhgsf.exe 114 PID 5104 set thread context of 2232 5104 sysdoruhgsf.exe 119 PID 3476 set thread context of 2008 3476 sysdoruhgsf.exe 121 PID 3304 set thread context of 2120 3304 sysdoruhgsf.exe 123 PID 4060 set thread context of 5652 4060 sysdoruhgsf.exe 125 PID 3724 set thread context of 516 3724 sysdoruhgsf.exe 127 PID 732 set thread context of 4568 732 sysdoruhgsf.exe 132 PID 1176 set thread context of 5508 1176 sysdoruhgsf.exe 134 PID 3192 set thread context of 5368 3192 sysdoruhgsf.exe 136 PID 1740 set thread context of 5920 1740 sysdoruhgsf.exe 139 PID 2544 set thread context of 2964 2544 sysdoruhgsf.exe 141 PID 4860 set thread context of 4480 4860 sysdoruhgsf.exe 143 PID 2408 set thread context of 4464 2408 sysdoruhgsf.exe 145 PID 5452 set thread context of 5600 5452 sysdoruhgsf.exe 147 PID 4460 set thread context of 2072 4460 sysdoruhgsf.exe 149 PID 5652 set thread context of 5692 5652 sysdoruhgsf.exe 151 PID 2944 set thread context of 5532 2944 sysdoruhgsf.exe 153 PID 2668 set thread context of 2444 2668 sysdoruhgsf.exe 155 PID 732 set thread context of 5196 732 sysdoruhgsf.exe 157 PID 5032 set thread context of 2820 5032 sysdoruhgsf.exe 159 PID 3296 set thread context of 4048 3296 sysdoruhgsf.exe 161 PID 2480 set thread context of 4572 2480 sysdoruhgsf.exe 163 PID 5388 set thread context of 5800 5388 sysdoruhgsf.exe 165 -
resource yara_rule behavioral2/memory/1868-26-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1868-27-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1868-30-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1868-32-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1868-31-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1868-34-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1868-36-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1868-38-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1868-37-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1868-35-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1868-29-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1868-28-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1868-39-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/720-56-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/720-59-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/720-60-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/720-58-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/720-57-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/720-61-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2232-79-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2232-82-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2232-81-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2232-80-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2232-78-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/2232-83-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 876 sc.exe 1920 sc.exe 4412 sc.exe 4492 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1727619307.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 745111286.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0x00090000000186d2-13.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 4868 220721988.exe 4868 220721988.exe 4868 220721988.exe 4868 220721988.exe 4572 sysdoruhgsf.exe 4572 sysdoruhgsf.exe 5224 conhost.exe 2620 sysdoruhgsf.exe 5224 conhost.exe 5104 sysdoruhgsf.exe 5224 conhost.exe 3476 sysdoruhgsf.exe 5224 conhost.exe 3304 sysdoruhgsf.exe 5224 conhost.exe 4060 sysdoruhgsf.exe 5224 conhost.exe 3724 sysdoruhgsf.exe 5224 conhost.exe 732 sysdoruhgsf.exe 5224 conhost.exe 1176 sysdoruhgsf.exe 5224 conhost.exe 3192 sysdoruhgsf.exe 5224 conhost.exe 1740 sysdoruhgsf.exe 5224 conhost.exe 2544 sysdoruhgsf.exe 5224 conhost.exe 4860 sysdoruhgsf.exe 5224 conhost.exe 2408 sysdoruhgsf.exe 5224 conhost.exe 5452 sysdoruhgsf.exe 5224 conhost.exe 4460 sysdoruhgsf.exe 5224 conhost.exe 5652 sysdoruhgsf.exe 5224 conhost.exe 2944 sysdoruhgsf.exe 5224 conhost.exe 2668 sysdoruhgsf.exe 5224 conhost.exe 732 sysdoruhgsf.exe 5224 conhost.exe 5032 sysdoruhgsf.exe 5224 conhost.exe 3296 sysdoruhgsf.exe 5224 conhost.exe 2480 sysdoruhgsf.exe 5224 conhost.exe 5388 sysdoruhgsf.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeLockMemoryPrivilege 1868 dwm.exe Token: SeLockMemoryPrivilege 720 dwm.exe Token: SeLockMemoryPrivilege 2232 dwm.exe Token: SeLockMemoryPrivilege 2008 dwm.exe Token: SeLockMemoryPrivilege 2120 dwm.exe Token: SeLockMemoryPrivilege 5652 dwm.exe Token: SeLockMemoryPrivilege 516 dwm.exe Token: SeLockMemoryPrivilege 4568 dwm.exe Token: SeLockMemoryPrivilege 5508 dwm.exe Token: SeLockMemoryPrivilege 5368 dwm.exe Token: SeLockMemoryPrivilege 5920 dwm.exe Token: SeLockMemoryPrivilege 2964 dwm.exe Token: SeLockMemoryPrivilege 4480 dwm.exe Token: SeLockMemoryPrivilege 4464 dwm.exe Token: SeLockMemoryPrivilege 5600 dwm.exe Token: SeLockMemoryPrivilege 2072 dwm.exe Token: SeLockMemoryPrivilege 5692 dwm.exe Token: SeLockMemoryPrivilege 5532 dwm.exe Token: SeLockMemoryPrivilege 2444 dwm.exe Token: SeLockMemoryPrivilege 5196 dwm.exe Token: SeLockMemoryPrivilege 2820 dwm.exe Token: SeLockMemoryPrivilege 4048 dwm.exe Token: SeLockMemoryPrivilege 4572 dwm.exe Token: SeLockMemoryPrivilege 5800 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5304 wrote to memory of 3940 5304 0x00090000000186d2-13.exe 90 PID 5304 wrote to memory of 3940 5304 0x00090000000186d2-13.exe 90 PID 5304 wrote to memory of 3940 5304 0x00090000000186d2-13.exe 90 PID 5304 wrote to memory of 4784 5304 0x00090000000186d2-13.exe 91 PID 5304 wrote to memory of 4784 5304 0x00090000000186d2-13.exe 91 PID 5304 wrote to memory of 4784 5304 0x00090000000186d2-13.exe 91 PID 5304 wrote to memory of 4868 5304 0x00090000000186d2-13.exe 99 PID 5304 wrote to memory of 4868 5304 0x00090000000186d2-13.exe 99 PID 4572 wrote to memory of 5224 4572 sysdoruhgsf.exe 109 PID 4572 wrote to memory of 5224 4572 sysdoruhgsf.exe 109 PID 4572 wrote to memory of 5224 4572 sysdoruhgsf.exe 109 PID 4572 wrote to memory of 5224 4572 sysdoruhgsf.exe 109 PID 4572 wrote to memory of 5224 4572 sysdoruhgsf.exe 109 PID 4572 wrote to memory of 5224 4572 sysdoruhgsf.exe 109 PID 4572 wrote to memory of 5224 4572 sysdoruhgsf.exe 109 PID 4572 wrote to memory of 5224 4572 sysdoruhgsf.exe 109 PID 4572 wrote to memory of 5224 4572 sysdoruhgsf.exe 109 PID 4572 wrote to memory of 1868 4572 sysdoruhgsf.exe 110 PID 4572 wrote to memory of 1868 4572 sysdoruhgsf.exe 110 PID 4572 wrote to memory of 1868 4572 sysdoruhgsf.exe 110 PID 4572 wrote to memory of 1868 4572 sysdoruhgsf.exe 110 PID 4572 wrote to memory of 1868 4572 sysdoruhgsf.exe 110 PID 2620 wrote to memory of 720 2620 sysdoruhgsf.exe 114 PID 2620 wrote to memory of 720 2620 sysdoruhgsf.exe 114 PID 2620 wrote to memory of 720 2620 sysdoruhgsf.exe 114 PID 2620 wrote to memory of 720 2620 sysdoruhgsf.exe 114 PID 2620 wrote to memory of 720 2620 sysdoruhgsf.exe 114 PID 5104 wrote to memory of 2232 5104 sysdoruhgsf.exe 119 PID 5104 wrote to memory of 2232 5104 sysdoruhgsf.exe 119 PID 5104 wrote to memory of 2232 5104 sysdoruhgsf.exe 119 PID 5104 wrote to memory of 2232 5104 sysdoruhgsf.exe 119 PID 5104 wrote to memory of 2232 5104 sysdoruhgsf.exe 119 PID 3476 wrote to memory of 2008 3476 sysdoruhgsf.exe 121 PID 3476 wrote to memory of 2008 3476 sysdoruhgsf.exe 121 PID 3476 wrote to memory of 2008 3476 sysdoruhgsf.exe 121 PID 3476 wrote to memory of 2008 3476 sysdoruhgsf.exe 121 PID 3476 wrote to memory of 2008 3476 sysdoruhgsf.exe 121 PID 3304 wrote to memory of 2120 3304 sysdoruhgsf.exe 123 PID 3304 wrote to memory of 2120 3304 sysdoruhgsf.exe 123 PID 3304 wrote to memory of 2120 3304 sysdoruhgsf.exe 123 PID 3304 wrote to memory of 2120 3304 sysdoruhgsf.exe 123 PID 3304 wrote to memory of 2120 3304 sysdoruhgsf.exe 123 PID 4060 wrote to memory of 5652 4060 sysdoruhgsf.exe 125 PID 4060 wrote to memory of 5652 4060 sysdoruhgsf.exe 125 PID 4060 wrote to memory of 5652 4060 sysdoruhgsf.exe 125 PID 4060 wrote to memory of 5652 4060 sysdoruhgsf.exe 125 PID 4060 wrote to memory of 5652 4060 sysdoruhgsf.exe 125 PID 3724 wrote to memory of 516 3724 sysdoruhgsf.exe 127 PID 3724 wrote to memory of 516 3724 sysdoruhgsf.exe 127 PID 3724 wrote to memory of 516 3724 sysdoruhgsf.exe 127 PID 3724 wrote to memory of 516 3724 sysdoruhgsf.exe 127 PID 3724 wrote to memory of 516 3724 sysdoruhgsf.exe 127 PID 732 wrote to memory of 4568 732 sysdoruhgsf.exe 132 PID 732 wrote to memory of 4568 732 sysdoruhgsf.exe 132 PID 732 wrote to memory of 4568 732 sysdoruhgsf.exe 132 PID 732 wrote to memory of 4568 732 sysdoruhgsf.exe 132 PID 732 wrote to memory of 4568 732 sysdoruhgsf.exe 132 PID 1176 wrote to memory of 5508 1176 sysdoruhgsf.exe 134 PID 1176 wrote to memory of 5508 1176 sysdoruhgsf.exe 134 PID 1176 wrote to memory of 5508 1176 sysdoruhgsf.exe 134 PID 1176 wrote to memory of 5508 1176 sysdoruhgsf.exe 134 PID 1176 wrote to memory of 5508 1176 sysdoruhgsf.exe 134 PID 3192 wrote to memory of 5368 3192 sysdoruhgsf.exe 136 PID 3192 wrote to memory of 5368 3192 sysdoruhgsf.exe 136
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x00090000000186d2-13.exe"C:\Users\Admin\AppData\Local\Temp\0x00090000000186d2-13.exe"1⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5304 -
C:\Users\Admin\AppData\Local\Temp\1727619307.exeC:\Users\Admin\AppData\Local\Temp\1727619307.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3940
-
-
C:\Users\Admin\AppData\Local\Temp\745111286.exeC:\Users\Admin\AppData\Local\Temp\745111286.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4784
-
-
C:\Users\Admin\AppData\Local\Temp\220721988.exeC:\Users\Admin\AppData\Local\Temp\220721988.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4868 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "MgrDrvSvc"3⤵
- Launches sc.exe
PID:876
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "MgrDrvSvc" binpath= "C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe" start= "auto"3⤵
- Launches sc.exe
PID:1920
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:4412
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "MgrDrvSvc"3⤵
- Launches sc.exe
PID:4492
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exeC:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5224 -
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:720
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5652
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5508
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5368
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5920
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2544 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4860 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2408 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5452 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5600
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4460 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5652 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5692
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2944 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5532
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:732 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5196
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5032 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3296 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2480 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5388 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5800
-
-
-
-
C:\Windows\system32\dwm.exedwm.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD560686a27b79838583920c9a0954104c9
SHA10c253b3c72cd5b01a9403230ff3ec9d3cdd8b71c
SHA256270149da5feb9487799083b5e76d41d3aa69afaf8f731e72e7d64c3a7c070c7e
SHA512c0a9308b5a3baca0906c9663ca3e3eaf64fc131aaa5358557874b30e4b743ffe898da6fbace032c3481693bf9081f938127fd07c8d550d9eb74958b20e24ab04
-
Filesize
2.5MB
MD5024dd77c38676e6ce0a5a2201f6145de
SHA15d020adf1adb0b0c0b370df63b2b09d89df0acfb
SHA256b4553ff5d7ae98614d4856de134f49e503f046a15fc49033af3232fbeab9ed4c
SHA512a94312eaea187830c28680164d80e3e9c2f58a7b24930dc224ac52a308406ccfd56524dffaf5c3a37e6b713d1d711f1b44d99d1fb60669c8b2351bb4c9d2fc85
-
Filesize
20KB
MD52e5f10745392643c8cf21aae4241e4cc
SHA1ad390d62e2215a37a3faf5e0cb3f0f3244452c07
SHA25644db578a4075ab126df387da3fa757f76bd3074606f3a9be21ee55ec6ac1ed29
SHA51285e63e752fc43d4b2be83628f5f8dcb288276c5369a3e940f795e87409f70473221d2d28a87f04e68c126bc0836171310d00247f240e05f4618e1f9393b132af
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d