Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 12:06
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-26_96dbdca68ece16bda606115cccf43d94_.exe
Resource
win7-20240903-en
General
-
Target
2025-03-26_96dbdca68ece16bda606115cccf43d94_.exe
-
Size
831KB
-
MD5
96dbdca68ece16bda606115cccf43d94
-
SHA1
69f1d6a8c8a973fb0bb3a8d504290c1dea1b667b
-
SHA256
1f532476b1f73de60ccc029c5069a7b60a76caa3e7858295d379f901feacf4a0
-
SHA512
9373814cd9ca7ff121e3e8e0242f783703c5b1c1011fc3484f0a481fa98ae68eea96fa3355757c15e38b0da882006b050cf26db03eba3446633a9978af7ca35a
-
SSDEEP
12288:UfVbrAhRcWikvawoNGCNn+4iIsulXbd5ND4TnCuHPJKprVmeNnI/k3jWQ:UfxrWRcWikvay4iIPr4OuHPMrlI/yp
Malware Config
Extracted
phorphiex
http://twizt.net
http://185.215.113.66
http://45.93.20.18
185.215.113.66
Extracted
phorphiex
http://185.215.113.66/
http://45.93.20.18/
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9
AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z
LdgchXq1sKbAaAJ1EXAPSRBzLb8jnTZstT
MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q
4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
0xCa90599132C4D88907Bd8E046540284aa468a035
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3ESHude8zUHksQg1h6hHmzY79BS36L91Yn
CSLKveRL2zqkbV2TqiFVuW6twtpqgFajoUZLAJQTTQk2
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2
bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr
bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
-
mutex
k9ubbn6sdfs
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36
Signatures
-
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule behavioral2/files/0x000700000002420d-12.dat family_phorphiex -
Xmrig family
-
XMRig Miner payload 19 IoCs
resource yara_rule behavioral2/memory/3684-63-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3684-66-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3684-69-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3684-67-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3684-68-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3684-64-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3684-70-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3932-85-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3932-83-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3932-86-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3932-84-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3932-87-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/3932-90-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4708-109-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4708-110-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4708-108-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4708-107-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4708-106-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/4708-111-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 5 IoCs
flow pid Process 36 4440 3316.exe 67 1816 120988725.exe 67 1816 120988725.exe 115 224 192120829.exe 4 4748 2025-03-26_96dbdca68ece16bda606115cccf43d94_.exe -
Stops running service(s) 4 TTPs
-
Executes dropped EXE 18 IoCs
pid Process 4440 3316.exe 5428 156438694.exe 5492 sysldrvcs.exe 1816 120988725.exe 1040 114426124.exe 2348 2684533011.exe 1540 2402417694.exe 3508 302818552.exe 4992 sysdoruhgsf.exe 5884 sysdoruhgsf.exe 4140 sysdoruhgsf.exe 4396 sysdoruhgsf.exe 2172 91659062.exe 2364 sysldrvcs.exe 224 192120829.exe 3640 211215509.exe 1004 1666712347.exe 1852 2488830001.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\sysldrvcs.exe" 91659062.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysldrvcs.exe" 156438694.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 4992 set thread context of 5100 4992 sysdoruhgsf.exe 122 PID 4992 set thread context of 3684 4992 sysdoruhgsf.exe 123 PID 5884 set thread context of 3932 5884 sysdoruhgsf.exe 125 PID 4140 set thread context of 4708 4140 sysdoruhgsf.exe 128 PID 4396 set thread context of 8 4396 sysdoruhgsf.exe 130 -
resource yara_rule behavioral2/memory/3684-58-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3684-60-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3684-63-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3684-61-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3684-66-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3684-69-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3684-67-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3684-68-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3684-64-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3684-59-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3684-70-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3684-62-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3932-85-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3932-83-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3932-86-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3932-84-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3932-87-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/3932-90-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4708-109-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4708-110-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4708-108-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4708-107-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4708-106-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/4708-111-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\sysldrvcs.exe 156438694.exe File opened for modification C:\Windows\sysldrvcs.exe 156438694.exe File created C:\Windows\sysldrvcs.exe 91659062.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5592 sc.exe 2388 sc.exe 2208 sc.exe 5232 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 192120829.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 211215509.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1666712347.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2488830001.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-26_96dbdca68ece16bda606115cccf43d94_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3316.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 156438694.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysldrvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 114426124.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2402417694.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91659062.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysldrvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 120988725.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2684533011.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3508 302818552.exe 3508 302818552.exe 3508 302818552.exe 3508 302818552.exe 4992 sysdoruhgsf.exe 4992 sysdoruhgsf.exe 5100 conhost.exe 5884 sysdoruhgsf.exe 5100 conhost.exe 4140 sysdoruhgsf.exe 5100 conhost.exe 4396 sysdoruhgsf.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeLockMemoryPrivilege 3684 dwm.exe Token: SeLockMemoryPrivilege 3932 dwm.exe Token: SeLockMemoryPrivilege 4708 dwm.exe Token: SeLockMemoryPrivilege 8 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4748 wrote to memory of 4440 4748 2025-03-26_96dbdca68ece16bda606115cccf43d94_.exe 89 PID 4748 wrote to memory of 4440 4748 2025-03-26_96dbdca68ece16bda606115cccf43d94_.exe 89 PID 4748 wrote to memory of 4440 4748 2025-03-26_96dbdca68ece16bda606115cccf43d94_.exe 89 PID 4440 wrote to memory of 5428 4440 3316.exe 97 PID 4440 wrote to memory of 5428 4440 3316.exe 97 PID 4440 wrote to memory of 5428 4440 3316.exe 97 PID 5428 wrote to memory of 5492 5428 156438694.exe 98 PID 5428 wrote to memory of 5492 5428 156438694.exe 98 PID 5428 wrote to memory of 5492 5428 156438694.exe 98 PID 5492 wrote to memory of 1816 5492 sysldrvcs.exe 108 PID 5492 wrote to memory of 1816 5492 sysldrvcs.exe 108 PID 5492 wrote to memory of 1816 5492 sysldrvcs.exe 108 PID 1816 wrote to memory of 1040 1816 120988725.exe 109 PID 1816 wrote to memory of 1040 1816 120988725.exe 109 PID 1816 wrote to memory of 1040 1816 120988725.exe 109 PID 5492 wrote to memory of 2348 5492 sysldrvcs.exe 110 PID 5492 wrote to memory of 2348 5492 sysldrvcs.exe 110 PID 5492 wrote to memory of 2348 5492 sysldrvcs.exe 110 PID 1816 wrote to memory of 1540 1816 120988725.exe 111 PID 1816 wrote to memory of 1540 1816 120988725.exe 111 PID 1816 wrote to memory of 1540 1816 120988725.exe 111 PID 1816 wrote to memory of 3508 1816 120988725.exe 112 PID 1816 wrote to memory of 3508 1816 120988725.exe 112 PID 4992 wrote to memory of 5100 4992 sysdoruhgsf.exe 122 PID 4992 wrote to memory of 5100 4992 sysdoruhgsf.exe 122 PID 4992 wrote to memory of 5100 4992 sysdoruhgsf.exe 122 PID 4992 wrote to memory of 5100 4992 sysdoruhgsf.exe 122 PID 4992 wrote to memory of 5100 4992 sysdoruhgsf.exe 122 PID 4992 wrote to memory of 5100 4992 sysdoruhgsf.exe 122 PID 4992 wrote to memory of 5100 4992 sysdoruhgsf.exe 122 PID 4992 wrote to memory of 5100 4992 sysdoruhgsf.exe 122 PID 4992 wrote to memory of 5100 4992 sysdoruhgsf.exe 122 PID 4992 wrote to memory of 3684 4992 sysdoruhgsf.exe 123 PID 4992 wrote to memory of 3684 4992 sysdoruhgsf.exe 123 PID 4992 wrote to memory of 3684 4992 sysdoruhgsf.exe 123 PID 4992 wrote to memory of 3684 4992 sysdoruhgsf.exe 123 PID 4992 wrote to memory of 3684 4992 sysdoruhgsf.exe 123 PID 5884 wrote to memory of 3932 5884 sysdoruhgsf.exe 125 PID 5884 wrote to memory of 3932 5884 sysdoruhgsf.exe 125 PID 5884 wrote to memory of 3932 5884 sysdoruhgsf.exe 125 PID 5884 wrote to memory of 3932 5884 sysdoruhgsf.exe 125 PID 5884 wrote to memory of 3932 5884 sysdoruhgsf.exe 125 PID 4140 wrote to memory of 4708 4140 sysdoruhgsf.exe 128 PID 4140 wrote to memory of 4708 4140 sysdoruhgsf.exe 128 PID 4140 wrote to memory of 4708 4140 sysdoruhgsf.exe 128 PID 4140 wrote to memory of 4708 4140 sysdoruhgsf.exe 128 PID 4140 wrote to memory of 4708 4140 sysdoruhgsf.exe 128 PID 4396 wrote to memory of 8 4396 sysdoruhgsf.exe 130 PID 4396 wrote to memory of 8 4396 sysdoruhgsf.exe 130 PID 4396 wrote to memory of 8 4396 sysdoruhgsf.exe 130 PID 4396 wrote to memory of 8 4396 sysdoruhgsf.exe 130 PID 4396 wrote to memory of 8 4396 sysdoruhgsf.exe 130 PID 5492 wrote to memory of 2172 5492 sysldrvcs.exe 131 PID 5492 wrote to memory of 2172 5492 sysldrvcs.exe 131 PID 5492 wrote to memory of 2172 5492 sysldrvcs.exe 131 PID 2172 wrote to memory of 2364 2172 91659062.exe 132 PID 2172 wrote to memory of 2364 2172 91659062.exe 132 PID 2172 wrote to memory of 2364 2172 91659062.exe 132 PID 2364 wrote to memory of 224 2364 sysldrvcs.exe 133 PID 2364 wrote to memory of 224 2364 sysldrvcs.exe 133 PID 2364 wrote to memory of 224 2364 sysldrvcs.exe 133 PID 224 wrote to memory of 3640 224 192120829.exe 134 PID 224 wrote to memory of 3640 224 192120829.exe 134 PID 224 wrote to memory of 3640 224 192120829.exe 134
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-26_96dbdca68ece16bda606115cccf43d94_.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-26_96dbdca68ece16bda606115cccf43d94_.exe"1⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\3316.exe"C:\Users\Admin\AppData\Local\Temp\3316.exe"2⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\156438694.exeC:\Users\Admin\AppData\Local\Temp\156438694.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5428 -
C:\Windows\sysldrvcs.exeC:\Windows\sysldrvcs.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5492 -
C:\Users\Admin\AppData\Local\Temp\120988725.exeC:\Users\Admin\AppData\Local\Temp\120988725.exe5⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\114426124.exeC:\Users\Admin\AppData\Local\Temp\114426124.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1040
-
-
C:\Users\Admin\AppData\Local\Temp\2402417694.exeC:\Users\Admin\AppData\Local\Temp\2402417694.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\302818552.exeC:\Users\Admin\AppData\Local\Temp\302818552.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3508 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "MgrDrvSvc"7⤵
- Launches sc.exe
PID:5592
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "MgrDrvSvc" binpath= "C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe" start= "auto"7⤵
- Launches sc.exe
PID:2388
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog7⤵
- Launches sc.exe
PID:2208
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "MgrDrvSvc"7⤵
- Launches sc.exe
PID:5232
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2684533011.exeC:\Users\Admin\AppData\Local\Temp\2684533011.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\91659062.exeC:\Users\Admin\AppData\Local\Temp\91659062.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\sysldrvcs.exeC:\Users\Admin\sysldrvcs.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\192120829.exeC:\Users\Admin\AppData\Local\Temp\192120829.exe7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\211215509.exeC:\Users\Admin\AppData\Local\Temp\211215509.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3640
-
-
C:\Users\Admin\AppData\Local\Temp\2488830001.exeC:\Users\Admin\AppData\Local\Temp\2488830001.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1852
-
-
-
C:\Users\Admin\AppData\Local\Temp\1666712347.exeC:\Users\Admin\AppData\Local\Temp\1666712347.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1004
-
-
-
-
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exeC:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100 -
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5884 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
-
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\system32\dwm.exedwm.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:8
-
-
-
-
C:\Windows\system32\dwm.exedwm.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD560686a27b79838583920c9a0954104c9
SHA10c253b3c72cd5b01a9403230ff3ec9d3cdd8b71c
SHA256270149da5feb9487799083b5e76d41d3aa69afaf8f731e72e7d64c3a7c070c7e
SHA512c0a9308b5a3baca0906c9663ca3e3eaf64fc131aaa5358557874b30e4b743ffe898da6fbace032c3481693bf9081f938127fd07c8d550d9eb74958b20e24ab04
-
Filesize
13KB
MD5181921fd5d4f7e043b446392233698ee
SHA10f710714ea4c01446dcb2ea4f29256fd53633f5c
SHA256aed4ab578ba8613117a2132bee215cdc3b360a1d9f993ad937ed3eecd7e9f3e6
SHA512a04699fa408ceb79f89cf61f2bea6ab85b6d93b52989f7d5ba6bdb22964fe8bc2a19aa3e1a02b063b11f8a63f3d3582ba0a621b97d911c27e2010fe9df5c6172
-
Filesize
101KB
MD58a30adfbb8c9ed8170177ce8c5738fbf
SHA12d029ddd39fe81a08982dd4309a74045aa91004f
SHA25672b19310a8c3cdfc23be1041eb773e6e41a08ec608e53b027b32e05a275b1da9
SHA5128885308b53b8d1baab14a98ec257acac9c700f2cebe48cbb79a25e3d7133f0016ba082ec9f8397c9b1677375dd5a1d3894d813aba5947f267b44b012fa6a027f
-
Filesize
13KB
MD56f4621d1dc7f9bb63ab7e8a1cdd9eb1d
SHA1a0dddcc5e9d2a6de685092c738bdf45648ec91cf
SHA256e6e33ad61fb56bfc14aa0b5c56bf460eb18b7840350b73b2c01c7d4c840c7b1e
SHA512583211132ff1d72c3968ff2edaf765c39dff6d8977ea802d5cab520749cedaff6971b71eec329823123e469f86a4ef300253d824653e869554d41f40778a0be3
-
Filesize
20KB
MD52e5f10745392643c8cf21aae4241e4cc
SHA1ad390d62e2215a37a3faf5e0cb3f0f3244452c07
SHA25644db578a4075ab126df387da3fa757f76bd3074606f3a9be21ee55ec6ac1ed29
SHA51285e63e752fc43d4b2be83628f5f8dcb288276c5369a3e940f795e87409f70473221d2d28a87f04e68c126bc0836171310d00247f240e05f4618e1f9393b132af
-
Filesize
19KB
MD59adb4c4939743d5f3e670b4d783d38e5
SHA17c989249b99b82def352f66bc97d9403fd6e653b
SHA256be502d8d90235a3c317e97cacb55b0eb5ec2aa8c50a582ec6f0527d08e99a759
SHA5127573981af4fc4845e4af61067e4620b92aace90b4ac218a14920dc6f93bddafac92a8f7b02c61f3d41b42ba9f1aabbea3c215dc439da3e9c9dc68060c9a53ac1
-
Filesize
2.5MB
MD5024dd77c38676e6ce0a5a2201f6145de
SHA15d020adf1adb0b0c0b370df63b2b09d89df0acfb
SHA256b4553ff5d7ae98614d4856de134f49e503f046a15fc49033af3232fbeab9ed4c
SHA512a94312eaea187830c28680164d80e3e9c2f58a7b24930dc224ac52a308406ccfd56524dffaf5c3a37e6b713d1d711f1b44d99d1fb60669c8b2351bb4c9d2fc85
-
Filesize
10KB
MD521789ebcbfca1eb0c6881e6af6216a81
SHA130152ddbe1150a2a612eb7b08e6551830276c8f0
SHA256c0d12405d2a5cd6064e6e498d6f5f7fd48c72b2d02f171f20f898a4d2832968c
SHA512cf3296247865130e4e769f09280d5f15237bedf474734f7b383130dfd01c5407a081e3f571152c393845b08d8ed48a0b2d23d11e905783332fb2552d20ad4514
-
Filesize
4KB
MD532fc0728b4b40be1c390f80d212fca53
SHA1e249035f092c59e916733019b5a7716108bf6944
SHA256d7a35bb650700ce669ae683fa4914e448834489586d9c10a2d3878536a95e154
SHA5120a015841231bb18d4ebea2801160788052cec9648f73688da554135530a8269b4043dc4f2b39da0933e980396644e4241c2ec510c691f744e9042a1710ff1632
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d