Analysis
-
max time kernel
78s -
max time network
88s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2025, 15:37
Static task
static1
Behavioral task
behavioral1
Sample
N1NC5_solara.exe
Resource
win10v2004-20250314-en
Errors
General
-
Target
N1NC5_solara.exe
-
Size
2.8MB
-
MD5
d4ef72e55ee8d916a060dae174398888
-
SHA1
92dc6ce33833a32e70d377bd6d66a17c0fd2369a
-
SHA256
852a0e2b6016d2b2e0953c50e0985fe60320a70e73515cfea7706f86130a06ca
-
SHA512
a814c8a43b4602888c9f12969f96c83c193528a7679ee8432da8f8e4b11a1379e35c4b07ad6cedec5e434d0b5ec7ad8124bbd6f3092fbcd0acc1b98fbb144f16
-
SSDEEP
49152:G5wRNpPAI7CYItONjnwsp61qLJa2uQzdqYoqDLdS96A4zDziq2EJLFp2C/Xv:GaRvROYEQEqFajKoqDLgMAI2KLmC/X
Malware Config
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000022b84-7.dat family_umbral behavioral1/memory/4840-22-0x0000028095300000-0x0000028095340000-memory.dmp family_umbral -
Umbral family
-
pid Process 1036 powershell.exe 1060 powershell.exe 948 powershell.exe 4332 powershell.exe -
Disables Task Manager via registry modification
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2752 netsh.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation Server.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation tmp6230.tmp.COM Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation MBR2.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation MatrixMBR.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation N1NC5_solara.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\58ef1cb24ef99d0cdb9aa4d818c79b63.exe Server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\58ef1cb24ef99d0cdb9aa4d818c79b63.exe Server.exe -
Executes dropped EXE 28 IoCs
pid Process 4840 Umbral.exe 4932 Server.exe 2628 BootstrapperNew.exe 5608 Server.exe 1492 Server.exe 2092 Server.exe 432 Server.exe 5268 Server.exe 3972 Server.exe 5300 Server.exe 6000 Server.exe 5004 Server.exe 4808 Server.exe 3940 Server.exe 4468 Server.exe 4984 Server.exe 5328 Server.exe 432 tmp6230.tmp.COM 3792 MBR2.exe 5268 TROLL5.exe 3760 TROLL2.exe 4376 Server.exe 3960 Server.exe 4316 Server.exe 548 Server.exe 3612 MatrixMBR.exe 6000 GDI.exe 3152 MBR.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\58ef1cb24ef99d0cdb9aa4d818c79b63 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Server.exe\" .." Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\58ef1cb24ef99d0cdb9aa4d818c79b63 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Server.exe\" .." Server.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 36 discord.com 37 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 ip-api.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 MBR.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\MatrixMBR.exe MBR2.exe File opened for modification C:\Windows\System32\MatrixMBR.exe MBR2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MBR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TROLL5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TROLL2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GDI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4188 wmic.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 4332 powershell.exe 4332 powershell.exe 4332 powershell.exe 948 powershell.exe 948 powershell.exe 948 powershell.exe 1036 powershell.exe 1036 powershell.exe 1036 powershell.exe 4960 powershell.exe 4960 powershell.exe 4960 powershell.exe 1060 powershell.exe 1060 powershell.exe 1060 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4840 Umbral.exe Token: SeDebugPrivilege 4332 powershell.exe Token: SeDebugPrivilege 948 powershell.exe Token: SeDebugPrivilege 1036 powershell.exe Token: SeDebugPrivilege 4960 powershell.exe Token: SeIncreaseQuotaPrivilege 3504 wmic.exe Token: SeSecurityPrivilege 3504 wmic.exe Token: SeTakeOwnershipPrivilege 3504 wmic.exe Token: SeLoadDriverPrivilege 3504 wmic.exe Token: SeSystemProfilePrivilege 3504 wmic.exe Token: SeSystemtimePrivilege 3504 wmic.exe Token: SeProfSingleProcessPrivilege 3504 wmic.exe Token: SeIncBasePriorityPrivilege 3504 wmic.exe Token: SeCreatePagefilePrivilege 3504 wmic.exe Token: SeBackupPrivilege 3504 wmic.exe Token: SeRestorePrivilege 3504 wmic.exe Token: SeShutdownPrivilege 3504 wmic.exe Token: SeDebugPrivilege 3504 wmic.exe Token: SeSystemEnvironmentPrivilege 3504 wmic.exe Token: SeRemoteShutdownPrivilege 3504 wmic.exe Token: SeUndockPrivilege 3504 wmic.exe Token: SeManageVolumePrivilege 3504 wmic.exe Token: 33 3504 wmic.exe Token: 34 3504 wmic.exe Token: 35 3504 wmic.exe Token: 36 3504 wmic.exe Token: SeIncreaseQuotaPrivilege 3504 wmic.exe Token: SeSecurityPrivilege 3504 wmic.exe Token: SeTakeOwnershipPrivilege 3504 wmic.exe Token: SeLoadDriverPrivilege 3504 wmic.exe Token: SeSystemProfilePrivilege 3504 wmic.exe Token: SeSystemtimePrivilege 3504 wmic.exe Token: SeProfSingleProcessPrivilege 3504 wmic.exe Token: SeIncBasePriorityPrivilege 3504 wmic.exe Token: SeCreatePagefilePrivilege 3504 wmic.exe Token: SeBackupPrivilege 3504 wmic.exe Token: SeRestorePrivilege 3504 wmic.exe Token: SeShutdownPrivilege 3504 wmic.exe Token: SeDebugPrivilege 3504 wmic.exe Token: SeSystemEnvironmentPrivilege 3504 wmic.exe Token: SeRemoteShutdownPrivilege 3504 wmic.exe Token: SeUndockPrivilege 3504 wmic.exe Token: SeManageVolumePrivilege 3504 wmic.exe Token: 33 3504 wmic.exe Token: 34 3504 wmic.exe Token: 35 3504 wmic.exe Token: 36 3504 wmic.exe Token: SeIncreaseQuotaPrivilege 4144 wmic.exe Token: SeSecurityPrivilege 4144 wmic.exe Token: SeTakeOwnershipPrivilege 4144 wmic.exe Token: SeLoadDriverPrivilege 4144 wmic.exe Token: SeSystemProfilePrivilege 4144 wmic.exe Token: SeSystemtimePrivilege 4144 wmic.exe Token: SeProfSingleProcessPrivilege 4144 wmic.exe Token: SeIncBasePriorityPrivilege 4144 wmic.exe Token: SeCreatePagefilePrivilege 4144 wmic.exe Token: SeBackupPrivilege 4144 wmic.exe Token: SeRestorePrivilege 4144 wmic.exe Token: SeShutdownPrivilege 4144 wmic.exe Token: SeDebugPrivilege 4144 wmic.exe Token: SeSystemEnvironmentPrivilege 4144 wmic.exe Token: SeRemoteShutdownPrivilege 4144 wmic.exe Token: SeUndockPrivilege 4144 wmic.exe Token: SeManageVolumePrivilege 4144 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3104 wrote to memory of 4840 3104 N1NC5_solara.exe 92 PID 3104 wrote to memory of 4840 3104 N1NC5_solara.exe 92 PID 3104 wrote to memory of 4932 3104 N1NC5_solara.exe 93 PID 3104 wrote to memory of 4932 3104 N1NC5_solara.exe 93 PID 3104 wrote to memory of 4932 3104 N1NC5_solara.exe 93 PID 3104 wrote to memory of 2628 3104 N1NC5_solara.exe 94 PID 3104 wrote to memory of 2628 3104 N1NC5_solara.exe 94 PID 4840 wrote to memory of 4332 4840 Umbral.exe 95 PID 4840 wrote to memory of 4332 4840 Umbral.exe 95 PID 4840 wrote to memory of 948 4840 Umbral.exe 99 PID 4840 wrote to memory of 948 4840 Umbral.exe 99 PID 4840 wrote to memory of 1036 4840 Umbral.exe 102 PID 4840 wrote to memory of 1036 4840 Umbral.exe 102 PID 4840 wrote to memory of 4960 4840 Umbral.exe 105 PID 4840 wrote to memory of 4960 4840 Umbral.exe 105 PID 4840 wrote to memory of 3504 4840 Umbral.exe 107 PID 4840 wrote to memory of 3504 4840 Umbral.exe 107 PID 4840 wrote to memory of 4144 4840 Umbral.exe 109 PID 4840 wrote to memory of 4144 4840 Umbral.exe 109 PID 4840 wrote to memory of 1668 4840 Umbral.exe 111 PID 4840 wrote to memory of 1668 4840 Umbral.exe 111 PID 4840 wrote to memory of 1060 4840 Umbral.exe 113 PID 4840 wrote to memory of 1060 4840 Umbral.exe 113 PID 4840 wrote to memory of 4188 4840 Umbral.exe 115 PID 4840 wrote to memory of 4188 4840 Umbral.exe 115 PID 4932 wrote to memory of 2752 4932 Server.exe 118 PID 4932 wrote to memory of 2752 4932 Server.exe 118 PID 4932 wrote to memory of 2752 4932 Server.exe 118 PID 5680 wrote to memory of 5608 5680 cmd.exe 124 PID 5680 wrote to memory of 5608 5680 cmd.exe 124 PID 5680 wrote to memory of 5608 5680 cmd.exe 124 PID 5220 wrote to memory of 1492 5220 cmd.exe 125 PID 5220 wrote to memory of 1492 5220 cmd.exe 125 PID 5220 wrote to memory of 1492 5220 cmd.exe 125 PID 4392 wrote to memory of 2092 4392 cmd.exe 132 PID 4392 wrote to memory of 2092 4392 cmd.exe 132 PID 4392 wrote to memory of 2092 4392 cmd.exe 132 PID 3924 wrote to memory of 432 3924 cmd.exe 133 PID 3924 wrote to memory of 432 3924 cmd.exe 133 PID 3924 wrote to memory of 432 3924 cmd.exe 133 PID 4332 wrote to memory of 5268 4332 cmd.exe 138 PID 4332 wrote to memory of 5268 4332 cmd.exe 138 PID 4332 wrote to memory of 5268 4332 cmd.exe 138 PID 1988 wrote to memory of 3972 1988 cmd.exe 139 PID 1988 wrote to memory of 3972 1988 cmd.exe 139 PID 1988 wrote to memory of 3972 1988 cmd.exe 139 PID 1388 wrote to memory of 5300 1388 cmd.exe 146 PID 1388 wrote to memory of 5300 1388 cmd.exe 146 PID 1388 wrote to memory of 5300 1388 cmd.exe 146 PID 4964 wrote to memory of 6000 4964 cmd.exe 147 PID 4964 wrote to memory of 6000 4964 cmd.exe 147 PID 4964 wrote to memory of 6000 4964 cmd.exe 147 PID 5168 wrote to memory of 5004 5168 cmd.exe 158 PID 5168 wrote to memory of 5004 5168 cmd.exe 158 PID 5168 wrote to memory of 5004 5168 cmd.exe 158 PID 5812 wrote to memory of 4808 5812 cmd.exe 159 PID 5812 wrote to memory of 4808 5812 cmd.exe 159 PID 5812 wrote to memory of 4808 5812 cmd.exe 159 PID 4648 wrote to memory of 3940 4648 cmd.exe 164 PID 4648 wrote to memory of 3940 4648 cmd.exe 164 PID 4648 wrote to memory of 3940 4648 cmd.exe 164 PID 916 wrote to memory of 4468 916 cmd.exe 165 PID 916 wrote to memory of 4468 916 cmd.exe 165 PID 916 wrote to memory of 4468 916 cmd.exe 165
Processes
-
C:\Users\Admin\AppData\Local\Temp\N1NC5_solara.exe"C:\Users\Admin\AppData\Local\Temp\N1NC5_solara.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\Umbral.exe"C:\Users\Admin\AppData\Local\Temp\Umbral.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Umbral.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:1668
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:4188
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Server.exe" "Server.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\tmp6230.tmp.COM"C:\Users\Admin\AppData\Local\Temp\tmp6230.tmp.COM"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:432 -
C:\Users\Admin\AppData\Local\Temp\MBR2.exe"C:\Users\Admin\AppData\Local\Temp\MBR2.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3792 -
C:\Windows\System32\MatrixMBR.exe"C:\Windows\System32\MatrixMBR.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\GDI.exe"C:\Users\Admin\AppData\Local\Temp\GDI.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6000
-
-
C:\Users\Admin\AppData\Local\Temp\MBR.exe"C:\Users\Admin\AppData\Local\Temp\MBR.exe"6⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:3152
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\TROLL5.exe"C:\Users\Admin\AppData\Local\Temp\TROLL5.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5268
-
-
C:\Users\Admin\AppData\Local\Temp\TROLL2.exe"C:\Users\Admin\AppData\Local\Temp\TROLL2.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"2⤵
- Executes dropped EXE
PID:2628
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..1⤵
- Suspicious use of WriteProcessMemory
PID:5680 -
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp\Server.exe ..2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5608
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..1⤵
- Suspicious use of WriteProcessMemory
PID:5220 -
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp\Server.exe ..2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..1⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp\Server.exe ..2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2092
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..1⤵
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp\Server.exe ..2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:432
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..1⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp\Server.exe ..2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3972
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..1⤵
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp\Server.exe ..2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5268
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..1⤵
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp\Server.exe ..2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6000
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..1⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp\Server.exe ..2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..1⤵
- Suspicious use of WriteProcessMemory
PID:5168 -
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp\Server.exe ..2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..1⤵
- Suspicious use of WriteProcessMemory
PID:5812 -
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp\Server.exe ..2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..1⤵
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp\Server.exe ..2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..1⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp\Server.exe ..2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3940
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..1⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp\Server.exe ..2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5328
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..1⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp\Server.exe ..2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4984
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..1⤵PID:5884
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp\Server.exe ..2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4376
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..1⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp\Server.exe ..2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3960
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x338 0x33c1⤵PID:4496
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..1⤵PID:5288
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp\Server.exe ..2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Server.exe" ..1⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp\Server.exe ..2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:548
-
Network
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
319B
MD5824ba7b7eed8b900a98dd25129c4cd83
SHA154478770b2158000ef365591d42977cb854453a1
SHA256d182dd648c92e41cd62dccc65f130c07f0a96c03b32f907c3d1218e9aa5bda03
SHA512ae4f3a9673711ecb6cc5d06874c587341d5094803923b53b6e982278fa64549d7acf866de165e23750facd55da556b6794c0d32f129f4087529c73acd4ffb11e
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
1KB
MD5276798eeb29a49dc6e199768bc9c2e71
SHA15fdc8ccb897ac2df7476fbb07517aca5b7a6205b
SHA256cd0a1056e8f1b6cb5cb328532239d802f4e2aa8f8fcdc0fcb487684bd68e0dcc
SHA5120d34fce64bbefc57d64fa6e03ca886952263d5f24df9c1c4cce6a1e8f5a47a9a21e9820f8d38caa7f7b43a52336ce00b738ea18419aaa7c788b72e04ce19e4f2
-
Filesize
1KB
MD545ad40f012b09e141955482368549640
SHA13f9cd15875c1e397c3b2b5592805577ae88a96cb
SHA256ea3b59172f1a33677f9cb3843fb4d6093b806d3a7cf2f3c6d4692f5421f656ce
SHA5123de08f8affca1c1450088f560776cf3d65146cadac43c06eb922c7b3cea436e519966cf38458303ffeb1a58c53f8952cffda6c34216fda7594e014b516e83b33
-
Filesize
944B
MD587d9fe9e5ee685ff2b66e5396fcdcb99
SHA10ac74edba86591b97d1a7531c3d2e659f0843b7f
SHA256f84df996802a7b65b0a58ecd1960f157bdc82f817bae81409eb4184e438ed9b8
SHA512ce602ffb6822849af961afc13b972d0d344bbfaa50c5fe372cf475f424a9227f788ea64a1dfa9b96d8e01cfa2b7f0f9e695ea001ea37a6c7c235c86931d1cf3e
-
Filesize
948B
MD5985b3105d8889886d6fd953575c54e08
SHA10f9a041240a344d82bac0a180520e7982c15f3cd
SHA2565178fdd457eb3eb25c8f72ed4c22c582a83de0d324db66d0446d660f226e944d
SHA5120fd59bc4886b70aa3b7eeeaa23229b7fdc93410ca7f8452860e4a1bbda2559eaa5e4b05c3ec2d85f7d648daf3c16741f4c2c18f2dd3bae4cc4a4e57ae4f665b0
-
Filesize
3.4MB
MD507b2ed9af56f55a999156738b17848df
SHA1960e507c0ef860080b573c4e11a76328c8831d08
SHA25673427b83bd00a8745e5182d2cdb3727e654ae9af5e42befc45903027f6606597
SHA5123a982d1130b41e6c01943eee7fa546c3da95360afdad03bff434b9211201c80f22bd8bf79d065180010bc0659ee1e71febbfd750320d95811ee26a54ee1b34c6
-
Filesize
11KB
MD5c08ae6d9c6ecd7e13f827bf68767785f
SHA1e71c2ec8d00c1e82b8b07baee0688b0a28604454
SHA256e153def894c867923dd56a7025b7b0b7bd3ee37c801a5957201d39f999bb28bf
SHA512c28bbe8abc66ad2433e5a3b93a4601b28225e86cb4bff077fd3224adfa63164bebfa3002a42b1cb4cb3c7ccad0208f8b143b8a17099bea04fcb964e667c7a1c0
-
Filesize
93KB
MD5d2fc66cf781a2497fceb4041a93cc676
SHA1480b1aa31b0b31fc0e0833afbba06533ab9a90ee
SHA256acddde9514e3b9d5c40b3d1750af5f4187c99f8987b027d6da44fb6bcf79b3ca
SHA5126c4cb42f786301be7614d4cb0b32601fea151351b0877e2371632435eb2c54bd4cd04d6b23bf4f49017ccaf679331162aac7329a1ed2409e3c2e02d0326e3487
-
Filesize
205KB
MD53dc0e225f886bae3b655cd9d738ed32f
SHA1abda127fd477bd9d051cd57b16ac13f44030a9ae
SHA256c22e2419f04fe03a92255a139ca8814697962e86d191a1d4171788fd0c903f68
SHA512c8a6c0bfa96defde6f83d847583ff2ec065a43f80f9886259a2d1fe7df306ef6ed7aeed61b7dcf0bdc111fc67419eb66cf1ca44e831711dd4ea7d25ed9aed09b
-
Filesize
32KB
MD5c30d7d561c7cd145687cfec82a8dc436
SHA16cd3cc34b5074a8b25a1d1b605d56ed9b0bc4203
SHA256d467702296dbb5c5f84db6ffa8373684b429997c0ea3f1e2c88365250239bf01
SHA512f8f1c5aaca62a20dd9342491a9d82571c8c280807dd61c9bd91d035436651115fce371bed4cab19af325b4b956b36fcd4ec93cccb433229438047947078260c8
-
Filesize
105KB
MD552a2a5517deb1a06896891a35299ce20
SHA1badcbdfef312bd71de997a7416ee20cee5d66af6
SHA256dcdf5140bc51db27f3aec80ae9a66a57aad446a2522904d288770e8d8cde8cee
SHA5127cb0de412c0508f5af522aeaf3731dda418f72f7cae8dd3f21b34d5cdbc08f9dea8699d59878610496c68d687227a0269739221490d70d03b8e4b84dfd29d5f1
-
Filesize
712KB
MD5542a4e400ff233b21a1a3c27751ac783
SHA1000a67f00b0003531d65a6ed6f16488ae5dcd0fe
SHA25679f00c7dab0891824136539fabd542c74e26cbed94b9add3f1aa7f793d653de6
SHA5128335118ca0c268635d9495b331fb65800a32a0631f132cd34ce84ca3b523d0a9e23eee6d76539d0c81d86fda534da56c936914012d8bad35040b15cc8caaf645
-
Filesize
231KB
MD5edfc834a78aa9ffddb793cf2bd1e7aa1
SHA1e5e559c15bffa95a233a6bcef428f5b51df71d90
SHA256b8ccc05c96538a0c62b3a108f26c56c851027300eba900764d9ac1e0519f786c
SHA51260456bedfd091fd7cd8a0f285d8e8634bde097a2b887f24e59173aab8d7335832dd9185608b693f9a4369eb4b750435cb6cd95f4b43dcf039580a23a51589b06
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
921KB
MD5d0ae6aea701de9f127f91e7efdb50252
SHA1cb9ef64cbcb999372fb4046e99fe89a03df9bc81
SHA256c1aeab35f61f12db28274d82713bff400b808625854a18e49504022f92805e31
SHA512505d11808e9923ff0ec1a51acd51509711f8c5c42da81b47a97249954b06f6f45ddda4655446daeb7f231785cd484ebc6e9ada92b857ad3a8d7ce04276536f13
-
Filesize
250KB
MD524c441662c09b94e14a4096a8e59c316
SHA111576cad137bd8ed76efecd711c0390fe5c85292
SHA256339fe94164952a8454e6ec5fc75e2c38baade2c14b231e47bf41989ffbb55ee4
SHA5127f6ca1366733c5fb4925001c0846510732031a9e5f1b16291ff596187c20a88f41193389cedcb73e3928c318fc972be4f03e3cb71f1487c34642897ff9a2b590