Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2025, 03:13
Behavioral task
behavioral1
Sample
abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe
Resource
win7-20240729-en
General
-
Target
abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe
-
Size
78KB
-
MD5
c6eb7e6bf6099b9717344e2138b93e43
-
SHA1
991ed21cdf93ecd52b4dcbcf0d770dc2878366a3
-
SHA256
abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a
-
SHA512
310d45c36f399a328ddf7aef94b0b48aaae8544e7db90927300a4e4a7393b424533aa73f121a5e45f9cfe4c750682fd37621ed1073fce28a3d8f94956fc60a36
-
SSDEEP
1536:vm9HCOFmav82bMaLZWfUM0cWhwpLXux5efnkzc:e5gOzxHM07ipIAfnkz
Malware Config
Extracted
phorphiex
http://185.215.113.66/
http://45.93.20.18/
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9
AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z
LdgchXq1sKbAaAJ1EXAPSRBzLb8jnTZstT
MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q
4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
0xCa90599132C4D88907Bd8E046540284aa468a035
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3ESHude8zUHksQg1h6hHmzY79BS36L91Yn
CSLKveRL2zqkbV2TqiFVuW6twtpqgFajoUZLAJQTTQk2
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2
bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr
bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
-
mutex
g7774ddg7f3s
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36
Extracted
phorphiex
http://185.215.113.66
http://45.93.20.18
185.215.113.66
Signatures
-
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule behavioral2/files/0x000b000000024242-3.dat family_phorphiex -
Xmrig family
-
XMRig Miner payload 20 IoCs
resource yara_rule behavioral2/memory/4968-51-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4968-55-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4968-57-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4968-53-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4968-56-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4968-54-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4968-50-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4968-58-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1956-75-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1956-79-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1956-78-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1956-77-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1956-76-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/1956-80-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4280-101-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4280-99-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4280-98-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4280-102-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4280-100-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4280-103-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 2 IoCs
flow pid Process 39 2008 196622051.exe 39 2008 196622051.exe -
Stops running service(s) 4 TTPs
-
Executes dropped EXE 28 IoCs
pid Process 2312 sysldpsvc.exe 2008 196622051.exe 2908 1974819652.exe 5372 2343026543.exe 1892 2613011327.exe 4876 297722235.exe 1532 sysdoruhgsf.exe 4748 sysdoruhgsf.exe 3288 sysdoruhgsf.exe 4484 sysdoruhgsf.exe 836 sysdoruhgsf.exe 5664 sysdoruhgsf.exe 2744 sysdoruhgsf.exe 2236 sysdoruhgsf.exe 1804 sysdoruhgsf.exe 1120 sysdoruhgsf.exe 2576 sysdoruhgsf.exe 5644 sysdoruhgsf.exe 848 sysdoruhgsf.exe 916 sysdoruhgsf.exe 3296 sysdoruhgsf.exe 316 sysdoruhgsf.exe 1300 sysdoruhgsf.exe 3768 sysdoruhgsf.exe 5760 sysdoruhgsf.exe 2332 sysdoruhgsf.exe 5252 sysdoruhgsf.exe 1252 sysdoruhgsf.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysldpsvc.exe" abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe -
Suspicious use of SetThreadContext 23 IoCs
description pid Process procid_target PID 1532 set thread context of 5576 1532 sysdoruhgsf.exe 120 PID 1532 set thread context of 4968 1532 sysdoruhgsf.exe 121 PID 4748 set thread context of 1956 4748 sysdoruhgsf.exe 123 PID 3288 set thread context of 4280 3288 sysdoruhgsf.exe 125 PID 4484 set thread context of 5132 4484 sysdoruhgsf.exe 127 PID 836 set thread context of 4632 836 sysdoruhgsf.exe 129 PID 5664 set thread context of 4388 5664 sysdoruhgsf.exe 132 PID 2744 set thread context of 1208 2744 sysdoruhgsf.exe 134 PID 2236 set thread context of 1744 2236 sysdoruhgsf.exe 136 PID 1804 set thread context of 764 1804 sysdoruhgsf.exe 138 PID 1120 set thread context of 5004 1120 sysdoruhgsf.exe 140 PID 2576 set thread context of 2440 2576 sysdoruhgsf.exe 142 PID 5644 set thread context of 5952 5644 sysdoruhgsf.exe 144 PID 848 set thread context of 4756 848 sysdoruhgsf.exe 146 PID 916 set thread context of 1956 916 sysdoruhgsf.exe 148 PID 3296 set thread context of 5568 3296 sysdoruhgsf.exe 150 PID 316 set thread context of 868 316 sysdoruhgsf.exe 152 PID 1300 set thread context of 2580 1300 sysdoruhgsf.exe 154 PID 3768 set thread context of 4800 3768 sysdoruhgsf.exe 159 PID 5760 set thread context of 5108 5760 sysdoruhgsf.exe 161 PID 2332 set thread context of 440 2332 sysdoruhgsf.exe 163 PID 5252 set thread context of 4468 5252 sysdoruhgsf.exe 165 PID 1252 set thread context of 2996 1252 sysdoruhgsf.exe 167 -
resource yara_rule behavioral2/memory/4968-47-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4968-51-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4968-49-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4968-55-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4968-57-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4968-53-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4968-56-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4968-54-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4968-50-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4968-46-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4968-48-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4968-45-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4968-58-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1956-75-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1956-79-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1956-78-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1956-77-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1956-76-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/1956-80-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4280-101-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4280-99-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4280-98-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4280-102-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4280-100-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4280-103-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\sysldpsvc.exe abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe File opened for modification C:\Windows\sysldpsvc.exe abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2064 sc.exe 400 sc.exe 2480 sc.exe 1920 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2613011327.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysldpsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 196622051.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1974819652.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2343026543.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4876 297722235.exe 4876 297722235.exe 4876 297722235.exe 4876 297722235.exe 1532 sysdoruhgsf.exe 1532 sysdoruhgsf.exe 5576 conhost.exe 4748 sysdoruhgsf.exe 5576 conhost.exe 3288 sysdoruhgsf.exe 5576 conhost.exe 4484 sysdoruhgsf.exe 5576 conhost.exe 836 sysdoruhgsf.exe 5576 conhost.exe 5664 sysdoruhgsf.exe 5576 conhost.exe 2744 sysdoruhgsf.exe 5576 conhost.exe 2236 sysdoruhgsf.exe 5576 conhost.exe 1804 sysdoruhgsf.exe 5576 conhost.exe 1120 sysdoruhgsf.exe 5576 conhost.exe 2576 sysdoruhgsf.exe 5576 conhost.exe 5644 sysdoruhgsf.exe 5576 conhost.exe 848 sysdoruhgsf.exe 5576 conhost.exe 916 sysdoruhgsf.exe 5576 conhost.exe 3296 sysdoruhgsf.exe 5576 conhost.exe 316 sysdoruhgsf.exe 5576 conhost.exe 1300 sysdoruhgsf.exe 5576 conhost.exe 3768 sysdoruhgsf.exe 5576 conhost.exe 5760 sysdoruhgsf.exe 5576 conhost.exe 2332 sysdoruhgsf.exe 5576 conhost.exe 5252 sysdoruhgsf.exe 5576 conhost.exe 1252 sysdoruhgsf.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeLockMemoryPrivilege 4968 dwm.exe Token: SeLockMemoryPrivilege 1956 dwm.exe Token: SeLockMemoryPrivilege 4280 dwm.exe Token: SeLockMemoryPrivilege 5132 dwm.exe Token: SeLockMemoryPrivilege 4632 dwm.exe Token: SeLockMemoryPrivilege 4388 dwm.exe Token: SeLockMemoryPrivilege 1208 dwm.exe Token: SeLockMemoryPrivilege 1744 dwm.exe Token: SeLockMemoryPrivilege 764 dwm.exe Token: SeLockMemoryPrivilege 5004 dwm.exe Token: SeLockMemoryPrivilege 2440 dwm.exe Token: SeLockMemoryPrivilege 5952 dwm.exe Token: SeLockMemoryPrivilege 4756 dwm.exe Token: SeLockMemoryPrivilege 1956 dwm.exe Token: SeLockMemoryPrivilege 5568 dwm.exe Token: SeLockMemoryPrivilege 868 dwm.exe Token: SeLockMemoryPrivilege 2580 dwm.exe Token: SeLockMemoryPrivilege 4800 dwm.exe Token: SeLockMemoryPrivilege 5108 dwm.exe Token: SeLockMemoryPrivilege 440 dwm.exe Token: SeLockMemoryPrivilege 4468 dwm.exe Token: SeLockMemoryPrivilege 2996 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2312 2584 abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe 89 PID 2584 wrote to memory of 2312 2584 abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe 89 PID 2584 wrote to memory of 2312 2584 abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe 89 PID 2312 wrote to memory of 2008 2312 sysldpsvc.exe 97 PID 2312 wrote to memory of 2008 2312 sysldpsvc.exe 97 PID 2312 wrote to memory of 2008 2312 sysldpsvc.exe 97 PID 2008 wrote to memory of 2908 2008 196622051.exe 98 PID 2008 wrote to memory of 2908 2008 196622051.exe 98 PID 2008 wrote to memory of 2908 2008 196622051.exe 98 PID 2312 wrote to memory of 5372 2312 sysldpsvc.exe 101 PID 2312 wrote to memory of 5372 2312 sysldpsvc.exe 101 PID 2312 wrote to memory of 5372 2312 sysldpsvc.exe 101 PID 2008 wrote to memory of 1892 2008 196622051.exe 104 PID 2008 wrote to memory of 1892 2008 196622051.exe 104 PID 2008 wrote to memory of 1892 2008 196622051.exe 104 PID 2008 wrote to memory of 4876 2008 196622051.exe 109 PID 2008 wrote to memory of 4876 2008 196622051.exe 109 PID 1532 wrote to memory of 5576 1532 sysdoruhgsf.exe 120 PID 1532 wrote to memory of 5576 1532 sysdoruhgsf.exe 120 PID 1532 wrote to memory of 5576 1532 sysdoruhgsf.exe 120 PID 1532 wrote to memory of 5576 1532 sysdoruhgsf.exe 120 PID 1532 wrote to memory of 5576 1532 sysdoruhgsf.exe 120 PID 1532 wrote to memory of 5576 1532 sysdoruhgsf.exe 120 PID 1532 wrote to memory of 5576 1532 sysdoruhgsf.exe 120 PID 1532 wrote to memory of 5576 1532 sysdoruhgsf.exe 120 PID 1532 wrote to memory of 5576 1532 sysdoruhgsf.exe 120 PID 1532 wrote to memory of 4968 1532 sysdoruhgsf.exe 121 PID 1532 wrote to memory of 4968 1532 sysdoruhgsf.exe 121 PID 1532 wrote to memory of 4968 1532 sysdoruhgsf.exe 121 PID 1532 wrote to memory of 4968 1532 sysdoruhgsf.exe 121 PID 1532 wrote to memory of 4968 1532 sysdoruhgsf.exe 121 PID 4748 wrote to memory of 1956 4748 sysdoruhgsf.exe 123 PID 4748 wrote to memory of 1956 4748 sysdoruhgsf.exe 123 PID 4748 wrote to memory of 1956 4748 sysdoruhgsf.exe 123 PID 4748 wrote to memory of 1956 4748 sysdoruhgsf.exe 123 PID 4748 wrote to memory of 1956 4748 sysdoruhgsf.exe 123 PID 3288 wrote to memory of 4280 3288 sysdoruhgsf.exe 125 PID 3288 wrote to memory of 4280 3288 sysdoruhgsf.exe 125 PID 3288 wrote to memory of 4280 3288 sysdoruhgsf.exe 125 PID 3288 wrote to memory of 4280 3288 sysdoruhgsf.exe 125 PID 3288 wrote to memory of 4280 3288 sysdoruhgsf.exe 125 PID 4484 wrote to memory of 5132 4484 sysdoruhgsf.exe 127 PID 4484 wrote to memory of 5132 4484 sysdoruhgsf.exe 127 PID 4484 wrote to memory of 5132 4484 sysdoruhgsf.exe 127 PID 4484 wrote to memory of 5132 4484 sysdoruhgsf.exe 127 PID 4484 wrote to memory of 5132 4484 sysdoruhgsf.exe 127 PID 836 wrote to memory of 4632 836 sysdoruhgsf.exe 129 PID 836 wrote to memory of 4632 836 sysdoruhgsf.exe 129 PID 836 wrote to memory of 4632 836 sysdoruhgsf.exe 129 PID 836 wrote to memory of 4632 836 sysdoruhgsf.exe 129 PID 836 wrote to memory of 4632 836 sysdoruhgsf.exe 129 PID 5664 wrote to memory of 4388 5664 sysdoruhgsf.exe 132 PID 5664 wrote to memory of 4388 5664 sysdoruhgsf.exe 132 PID 5664 wrote to memory of 4388 5664 sysdoruhgsf.exe 132 PID 5664 wrote to memory of 4388 5664 sysdoruhgsf.exe 132 PID 5664 wrote to memory of 4388 5664 sysdoruhgsf.exe 132 PID 2744 wrote to memory of 1208 2744 sysdoruhgsf.exe 134 PID 2744 wrote to memory of 1208 2744 sysdoruhgsf.exe 134 PID 2744 wrote to memory of 1208 2744 sysdoruhgsf.exe 134 PID 2744 wrote to memory of 1208 2744 sysdoruhgsf.exe 134 PID 2744 wrote to memory of 1208 2744 sysdoruhgsf.exe 134 PID 2236 wrote to memory of 1744 2236 sysdoruhgsf.exe 136 PID 2236 wrote to memory of 1744 2236 sysdoruhgsf.exe 136 PID 2236 wrote to memory of 1744 2236 sysdoruhgsf.exe 136
Processes
-
C:\Users\Admin\AppData\Local\Temp\abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe"C:\Users\Admin\AppData\Local\Temp\abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\sysldpsvc.exeC:\Windows\sysldpsvc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\196622051.exeC:\Users\Admin\AppData\Local\Temp\196622051.exe3⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\1974819652.exeC:\Users\Admin\AppData\Local\Temp\1974819652.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\2613011327.exeC:\Users\Admin\AppData\Local\Temp\2613011327.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1892
-
-
C:\Users\Admin\AppData\Local\Temp\297722235.exeC:\Users\Admin\AppData\Local\Temp\297722235.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4876 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "MgrDrvSvc"5⤵
- Launches sc.exe
PID:1920
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "MgrDrvSvc" binpath= "C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe" start= "auto"5⤵
- Launches sc.exe
PID:2064
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog5⤵
- Launches sc.exe
PID:400
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "MgrDrvSvc"5⤵
- Launches sc.exe
PID:2480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2343026543.exeC:\Users\Admin\AppData\Local\Temp\2343026543.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5372
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exeC:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5576 -
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5132
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5664 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1804 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1120 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2576 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5644 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5952
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:848 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:916 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3296 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5568
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:316 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1300 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3768 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4800
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5760 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5252 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1252 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
-
-
C:\Windows\system32\dwm.exedwm.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5181921fd5d4f7e043b446392233698ee
SHA10f710714ea4c01446dcb2ea4f29256fd53633f5c
SHA256aed4ab578ba8613117a2132bee215cdc3b360a1d9f993ad937ed3eecd7e9f3e6
SHA512a04699fa408ceb79f89cf61f2bea6ab85b6d93b52989f7d5ba6bdb22964fe8bc2a19aa3e1a02b063b11f8a63f3d3582ba0a621b97d911c27e2010fe9df5c6172
-
Filesize
53KB
MD560686a27b79838583920c9a0954104c9
SHA10c253b3c72cd5b01a9403230ff3ec9d3cdd8b71c
SHA256270149da5feb9487799083b5e76d41d3aa69afaf8f731e72e7d64c3a7c070c7e
SHA512c0a9308b5a3baca0906c9663ca3e3eaf64fc131aaa5358557874b30e4b743ffe898da6fbace032c3481693bf9081f938127fd07c8d550d9eb74958b20e24ab04
-
Filesize
19KB
MD59adb4c4939743d5f3e670b4d783d38e5
SHA17c989249b99b82def352f66bc97d9403fd6e653b
SHA256be502d8d90235a3c317e97cacb55b0eb5ec2aa8c50a582ec6f0527d08e99a759
SHA5127573981af4fc4845e4af61067e4620b92aace90b4ac218a14920dc6f93bddafac92a8f7b02c61f3d41b42ba9f1aabbea3c215dc439da3e9c9dc68060c9a53ac1
-
Filesize
20KB
MD52e5f10745392643c8cf21aae4241e4cc
SHA1ad390d62e2215a37a3faf5e0cb3f0f3244452c07
SHA25644db578a4075ab126df387da3fa757f76bd3074606f3a9be21ee55ec6ac1ed29
SHA51285e63e752fc43d4b2be83628f5f8dcb288276c5369a3e940f795e87409f70473221d2d28a87f04e68c126bc0836171310d00247f240e05f4618e1f9393b132af
-
Filesize
2.5MB
MD5024dd77c38676e6ce0a5a2201f6145de
SHA15d020adf1adb0b0c0b370df63b2b09d89df0acfb
SHA256b4553ff5d7ae98614d4856de134f49e503f046a15fc49033af3232fbeab9ed4c
SHA512a94312eaea187830c28680164d80e3e9c2f58a7b24930dc224ac52a308406ccfd56524dffaf5c3a37e6b713d1d711f1b44d99d1fb60669c8b2351bb4c9d2fc85
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
Filesize
78KB
MD5c6eb7e6bf6099b9717344e2138b93e43
SHA1991ed21cdf93ecd52b4dcbcf0d770dc2878366a3
SHA256abcd10949a438a7c9d6096d48cfc0fb30d45dffed4b9dd616ac1b51d9783509a
SHA512310d45c36f399a328ddf7aef94b0b48aaae8544e7db90927300a4e4a7393b424533aa73f121a5e45f9cfe4c750682fd37621ed1073fce28a3d8f94956fc60a36