Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
10-11-2020 06:47
Static task
static1
Behavioral task
behavioral1
Sample
4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe
Resource
win10v20201028
General
-
Target
4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe
-
Size
5.2MB
-
MD5
1e8b9bbb56933d7459bfebfdc716ad80
-
SHA1
7e3bd5882b4827fbe03b94062f37af705abc498d
-
SHA256
4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76
-
SHA512
a19c64b0cf1a59f61346555153de01c8cbfa447954bdfa30a71aed93d5eb0ac410444492d2e15f7305983132b85d77a4a8f448ccf656b4db8ec2bd4a9f0cfb3a
Malware Config
Signatures
-
Cobalt Strike reflective loader 42 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\Windows\System\xGKasYa.exe cobalt_reflective_dll C:\Windows\System\xGKasYa.exe cobalt_reflective_dll C:\Windows\System\iBNLdvO.exe cobalt_reflective_dll C:\Windows\System\iBNLdvO.exe cobalt_reflective_dll C:\Windows\System\NvSKrcv.exe cobalt_reflective_dll C:\Windows\System\NvSKrcv.exe cobalt_reflective_dll C:\Windows\System\ltmYuRH.exe cobalt_reflective_dll C:\Windows\System\ltmYuRH.exe cobalt_reflective_dll C:\Windows\System\FOHlCDc.exe cobalt_reflective_dll C:\Windows\System\FOHlCDc.exe cobalt_reflective_dll C:\Windows\System\FGaEOrs.exe cobalt_reflective_dll C:\Windows\System\FGaEOrs.exe cobalt_reflective_dll C:\Windows\System\BvUQUSm.exe cobalt_reflective_dll C:\Windows\System\BvUQUSm.exe cobalt_reflective_dll C:\Windows\System\PAnbOCx.exe cobalt_reflective_dll C:\Windows\System\PAnbOCx.exe cobalt_reflective_dll C:\Windows\System\SokqbRj.exe cobalt_reflective_dll C:\Windows\System\SokqbRj.exe cobalt_reflective_dll C:\Windows\System\Wsjylkl.exe cobalt_reflective_dll C:\Windows\System\Wsjylkl.exe cobalt_reflective_dll C:\Windows\System\MBMSujj.exe cobalt_reflective_dll C:\Windows\System\MBMSujj.exe cobalt_reflective_dll C:\Windows\System\mIFKDUH.exe cobalt_reflective_dll C:\Windows\System\mIFKDUH.exe cobalt_reflective_dll C:\Windows\System\EYrLZpA.exe cobalt_reflective_dll C:\Windows\System\EYrLZpA.exe cobalt_reflective_dll C:\Windows\System\nTctnhx.exe cobalt_reflective_dll C:\Windows\System\nTctnhx.exe cobalt_reflective_dll C:\Windows\System\uEmDuFx.exe cobalt_reflective_dll C:\Windows\System\uEmDuFx.exe cobalt_reflective_dll C:\Windows\System\aHhAzAO.exe cobalt_reflective_dll C:\Windows\System\MEksmge.exe cobalt_reflective_dll C:\Windows\System\aHhAzAO.exe cobalt_reflective_dll C:\Windows\System\SPSobiw.exe cobalt_reflective_dll C:\Windows\System\MEksmge.exe cobalt_reflective_dll C:\Windows\System\SPSobiw.exe cobalt_reflective_dll C:\Windows\System\vBTJNLF.exe cobalt_reflective_dll C:\Windows\System\VRahzSM.exe cobalt_reflective_dll C:\Windows\System\VRahzSM.exe cobalt_reflective_dll C:\Windows\System\vBTJNLF.exe cobalt_reflective_dll C:\Windows\System\lwCGGNU.exe cobalt_reflective_dll C:\Windows\System\lwCGGNU.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Executes dropped EXE 21 IoCs
Processes:
xGKasYa.exeiBNLdvO.exeNvSKrcv.exeltmYuRH.exeFOHlCDc.exeFGaEOrs.exeBvUQUSm.exePAnbOCx.exeSokqbRj.exeWsjylkl.exeMBMSujj.exemIFKDUH.exeEYrLZpA.exenTctnhx.exeuEmDuFx.exeaHhAzAO.exeMEksmge.exeSPSobiw.exevBTJNLF.exeVRahzSM.exelwCGGNU.exepid process 5068 xGKasYa.exe 3868 iBNLdvO.exe 3324 NvSKrcv.exe 3744 ltmYuRH.exe 3292 FOHlCDc.exe 3600 FGaEOrs.exe 3012 BvUQUSm.exe 4104 PAnbOCx.exe 2272 SokqbRj.exe 3804 Wsjylkl.exe 2476 MBMSujj.exe 68 mIFKDUH.exe 644 EYrLZpA.exe 996 nTctnhx.exe 1108 uEmDuFx.exe 1252 aHhAzAO.exe 1468 MEksmge.exe 1572 SPSobiw.exe 1760 vBTJNLF.exe 1876 VRahzSM.exe 2108 lwCGGNU.exe -
Processes:
resource yara_rule C:\Windows\System\xGKasYa.exe upx C:\Windows\System\xGKasYa.exe upx C:\Windows\System\iBNLdvO.exe upx C:\Windows\System\iBNLdvO.exe upx C:\Windows\System\NvSKrcv.exe upx C:\Windows\System\NvSKrcv.exe upx C:\Windows\System\ltmYuRH.exe upx C:\Windows\System\ltmYuRH.exe upx C:\Windows\System\FOHlCDc.exe upx C:\Windows\System\FOHlCDc.exe upx C:\Windows\System\FGaEOrs.exe upx C:\Windows\System\FGaEOrs.exe upx C:\Windows\System\BvUQUSm.exe upx C:\Windows\System\BvUQUSm.exe upx C:\Windows\System\PAnbOCx.exe upx C:\Windows\System\PAnbOCx.exe upx C:\Windows\System\SokqbRj.exe upx C:\Windows\System\SokqbRj.exe upx C:\Windows\System\Wsjylkl.exe upx C:\Windows\System\Wsjylkl.exe upx C:\Windows\System\MBMSujj.exe upx C:\Windows\System\MBMSujj.exe upx C:\Windows\System\mIFKDUH.exe upx C:\Windows\System\mIFKDUH.exe upx C:\Windows\System\EYrLZpA.exe upx C:\Windows\System\EYrLZpA.exe upx C:\Windows\System\nTctnhx.exe upx C:\Windows\System\nTctnhx.exe upx C:\Windows\System\uEmDuFx.exe upx C:\Windows\System\uEmDuFx.exe upx C:\Windows\System\aHhAzAO.exe upx C:\Windows\System\MEksmge.exe upx C:\Windows\System\aHhAzAO.exe upx C:\Windows\System\SPSobiw.exe upx C:\Windows\System\MEksmge.exe upx C:\Windows\System\SPSobiw.exe upx C:\Windows\System\vBTJNLF.exe upx C:\Windows\System\VRahzSM.exe upx C:\Windows\System\VRahzSM.exe upx C:\Windows\System\vBTJNLF.exe upx C:\Windows\System\lwCGGNU.exe upx C:\Windows\System\lwCGGNU.exe upx -
JavaScript code in executable 42 IoCs
Processes:
resource yara_rule C:\Windows\System\xGKasYa.exe js C:\Windows\System\xGKasYa.exe js C:\Windows\System\iBNLdvO.exe js C:\Windows\System\iBNLdvO.exe js C:\Windows\System\NvSKrcv.exe js C:\Windows\System\NvSKrcv.exe js C:\Windows\System\ltmYuRH.exe js C:\Windows\System\ltmYuRH.exe js C:\Windows\System\FOHlCDc.exe js C:\Windows\System\FOHlCDc.exe js C:\Windows\System\FGaEOrs.exe js C:\Windows\System\FGaEOrs.exe js C:\Windows\System\BvUQUSm.exe js C:\Windows\System\BvUQUSm.exe js C:\Windows\System\PAnbOCx.exe js C:\Windows\System\PAnbOCx.exe js C:\Windows\System\SokqbRj.exe js C:\Windows\System\SokqbRj.exe js C:\Windows\System\Wsjylkl.exe js C:\Windows\System\Wsjylkl.exe js C:\Windows\System\MBMSujj.exe js C:\Windows\System\MBMSujj.exe js C:\Windows\System\mIFKDUH.exe js C:\Windows\System\mIFKDUH.exe js C:\Windows\System\EYrLZpA.exe js C:\Windows\System\EYrLZpA.exe js C:\Windows\System\nTctnhx.exe js C:\Windows\System\nTctnhx.exe js C:\Windows\System\uEmDuFx.exe js C:\Windows\System\uEmDuFx.exe js C:\Windows\System\aHhAzAO.exe js C:\Windows\System\MEksmge.exe js C:\Windows\System\aHhAzAO.exe js C:\Windows\System\SPSobiw.exe js C:\Windows\System\MEksmge.exe js C:\Windows\System\SPSobiw.exe js C:\Windows\System\vBTJNLF.exe js C:\Windows\System\VRahzSM.exe js C:\Windows\System\VRahzSM.exe js C:\Windows\System\vBTJNLF.exe js C:\Windows\System\lwCGGNU.exe js C:\Windows\System\lwCGGNU.exe js -
Drops file in Windows directory 21 IoCs
Processes:
4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exedescription ioc process File created C:\Windows\System\PAnbOCx.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe File created C:\Windows\System\aHhAzAO.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe File created C:\Windows\System\xGKasYa.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe File created C:\Windows\System\iBNLdvO.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe File created C:\Windows\System\ltmYuRH.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe File created C:\Windows\System\Wsjylkl.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe File created C:\Windows\System\uEmDuFx.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe File created C:\Windows\System\vBTJNLF.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe File created C:\Windows\System\FOHlCDc.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe File created C:\Windows\System\EYrLZpA.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe File created C:\Windows\System\nTctnhx.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe File created C:\Windows\System\MEksmge.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe File created C:\Windows\System\SPSobiw.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe File created C:\Windows\System\VRahzSM.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe File created C:\Windows\System\NvSKrcv.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe File created C:\Windows\System\FGaEOrs.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe File created C:\Windows\System\BvUQUSm.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe File created C:\Windows\System\SokqbRj.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe File created C:\Windows\System\MBMSujj.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe File created C:\Windows\System\mIFKDUH.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe File created C:\Windows\System\lwCGGNU.exe 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exedescription pid process Token: SeLockMemoryPrivilege 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe Token: SeLockMemoryPrivilege 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exedescription pid process target process PID 4688 wrote to memory of 5068 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe xGKasYa.exe PID 4688 wrote to memory of 5068 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe xGKasYa.exe PID 4688 wrote to memory of 3868 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe iBNLdvO.exe PID 4688 wrote to memory of 3868 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe iBNLdvO.exe PID 4688 wrote to memory of 3324 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe NvSKrcv.exe PID 4688 wrote to memory of 3324 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe NvSKrcv.exe PID 4688 wrote to memory of 3744 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe ltmYuRH.exe PID 4688 wrote to memory of 3744 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe ltmYuRH.exe PID 4688 wrote to memory of 3292 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe FOHlCDc.exe PID 4688 wrote to memory of 3292 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe FOHlCDc.exe PID 4688 wrote to memory of 3600 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe FGaEOrs.exe PID 4688 wrote to memory of 3600 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe FGaEOrs.exe PID 4688 wrote to memory of 3012 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe BvUQUSm.exe PID 4688 wrote to memory of 3012 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe BvUQUSm.exe PID 4688 wrote to memory of 4104 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe PAnbOCx.exe PID 4688 wrote to memory of 4104 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe PAnbOCx.exe PID 4688 wrote to memory of 2272 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe SokqbRj.exe PID 4688 wrote to memory of 2272 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe SokqbRj.exe PID 4688 wrote to memory of 3804 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe Wsjylkl.exe PID 4688 wrote to memory of 3804 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe Wsjylkl.exe PID 4688 wrote to memory of 2476 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe MBMSujj.exe PID 4688 wrote to memory of 2476 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe MBMSujj.exe PID 4688 wrote to memory of 68 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe mIFKDUH.exe PID 4688 wrote to memory of 68 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe mIFKDUH.exe PID 4688 wrote to memory of 644 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe EYrLZpA.exe PID 4688 wrote to memory of 644 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe EYrLZpA.exe PID 4688 wrote to memory of 996 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe nTctnhx.exe PID 4688 wrote to memory of 996 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe nTctnhx.exe PID 4688 wrote to memory of 1108 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe uEmDuFx.exe PID 4688 wrote to memory of 1108 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe uEmDuFx.exe PID 4688 wrote to memory of 1252 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe aHhAzAO.exe PID 4688 wrote to memory of 1252 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe aHhAzAO.exe PID 4688 wrote to memory of 1468 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe MEksmge.exe PID 4688 wrote to memory of 1468 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe MEksmge.exe PID 4688 wrote to memory of 1572 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe SPSobiw.exe PID 4688 wrote to memory of 1572 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe SPSobiw.exe PID 4688 wrote to memory of 1760 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe vBTJNLF.exe PID 4688 wrote to memory of 1760 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe vBTJNLF.exe PID 4688 wrote to memory of 1876 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe VRahzSM.exe PID 4688 wrote to memory of 1876 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe VRahzSM.exe PID 4688 wrote to memory of 2108 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe lwCGGNU.exe PID 4688 wrote to memory of 2108 4688 4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe lwCGGNU.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe"C:\Users\Admin\AppData\Local\Temp\4d2e83867bbbf25515822c09d23b912933eb86c79cfcab3670d6a35ddc4bec76.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\xGKasYa.exeC:\Windows\System\xGKasYa.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\iBNLdvO.exeC:\Windows\System\iBNLdvO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\NvSKrcv.exeC:\Windows\System\NvSKrcv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ltmYuRH.exeC:\Windows\System\ltmYuRH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FOHlCDc.exeC:\Windows\System\FOHlCDc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FGaEOrs.exeC:\Windows\System\FGaEOrs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BvUQUSm.exeC:\Windows\System\BvUQUSm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\PAnbOCx.exeC:\Windows\System\PAnbOCx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SokqbRj.exeC:\Windows\System\SokqbRj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\Wsjylkl.exeC:\Windows\System\Wsjylkl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\MBMSujj.exeC:\Windows\System\MBMSujj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\mIFKDUH.exeC:\Windows\System\mIFKDUH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EYrLZpA.exeC:\Windows\System\EYrLZpA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\nTctnhx.exeC:\Windows\System\nTctnhx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uEmDuFx.exeC:\Windows\System\uEmDuFx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aHhAzAO.exeC:\Windows\System\aHhAzAO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\MEksmge.exeC:\Windows\System\MEksmge.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SPSobiw.exeC:\Windows\System\SPSobiw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\vBTJNLF.exeC:\Windows\System\vBTJNLF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VRahzSM.exeC:\Windows\System\VRahzSM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lwCGGNU.exeC:\Windows\System\lwCGGNU.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System\BvUQUSm.exeMD5
cfc3325e80eddb60e6d9816420c52b18
SHA16898861d590dc788223b025bd1ecd1c6f0d74200
SHA256553495e70d5fea593e4704c31e5b8813e261255f8d38e5712c7a8b1d4e256982
SHA5128ab4881daeec17e7966dc73ca7e72ce566024a6cc274b499a5e67f27769497c83b7590a9606da9dd5830f97566c9864ffa9f0f45a96012c890f2948ad34af192
-
C:\Windows\System\BvUQUSm.exeMD5
cfc3325e80eddb60e6d9816420c52b18
SHA16898861d590dc788223b025bd1ecd1c6f0d74200
SHA256553495e70d5fea593e4704c31e5b8813e261255f8d38e5712c7a8b1d4e256982
SHA5128ab4881daeec17e7966dc73ca7e72ce566024a6cc274b499a5e67f27769497c83b7590a9606da9dd5830f97566c9864ffa9f0f45a96012c890f2948ad34af192
-
C:\Windows\System\EYrLZpA.exeMD5
89f48518c5219973fb51ba623a456b16
SHA1e894d56f5c8cb9047ee5209e1c98b144361f3702
SHA256a9f2720d6ed8bd9491000ba925154eeb45bcbda8051ec2c77871c7d038665464
SHA5121d310ea284dbac87589199aa931c889c7003bd3e9d0e982c9936b13603c136ed33ec2470eff1a6a2ec4ad16c27a2a49b3bac80574c9d0166ab9600f59b0e08b2
-
C:\Windows\System\EYrLZpA.exeMD5
89f48518c5219973fb51ba623a456b16
SHA1e894d56f5c8cb9047ee5209e1c98b144361f3702
SHA256a9f2720d6ed8bd9491000ba925154eeb45bcbda8051ec2c77871c7d038665464
SHA5121d310ea284dbac87589199aa931c889c7003bd3e9d0e982c9936b13603c136ed33ec2470eff1a6a2ec4ad16c27a2a49b3bac80574c9d0166ab9600f59b0e08b2
-
C:\Windows\System\FGaEOrs.exeMD5
4a01433387fa563351276ac54d7b0f79
SHA11197fc0f7641d6e526e66a5d5fa4d623b789b472
SHA256fdd3a813322b5240dfa7a2c0e8abb143eac7dcb40c9391fef89a0ebfea4b72b0
SHA512ba7c393ea6be19bf24b815f82584a2c6fe5f43c82c046877dea7ea5246917768f27757398102573b8dedb3bb40f1a1f3009c86aa927b182e41843e72aa70852a
-
C:\Windows\System\FGaEOrs.exeMD5
4a01433387fa563351276ac54d7b0f79
SHA11197fc0f7641d6e526e66a5d5fa4d623b789b472
SHA256fdd3a813322b5240dfa7a2c0e8abb143eac7dcb40c9391fef89a0ebfea4b72b0
SHA512ba7c393ea6be19bf24b815f82584a2c6fe5f43c82c046877dea7ea5246917768f27757398102573b8dedb3bb40f1a1f3009c86aa927b182e41843e72aa70852a
-
C:\Windows\System\FOHlCDc.exeMD5
98288b2660eae0a76384f3cf3ff1fe79
SHA13fa038f5405e0de9aafef9401a6363ff8fb67ca0
SHA2560c00ef9ef8a653e07e978e0cd4d36f125014d7dc0edbb476012ffb442a4a297f
SHA51255bb87663cf9e74e5ac4dd314561ed87a0d79e20557d9274728b5fef0fb411f5d876566deaa0e4feaa1a74f0176bc77649aac3acbe32760bafdb8bada60a0511
-
C:\Windows\System\FOHlCDc.exeMD5
98288b2660eae0a76384f3cf3ff1fe79
SHA13fa038f5405e0de9aafef9401a6363ff8fb67ca0
SHA2560c00ef9ef8a653e07e978e0cd4d36f125014d7dc0edbb476012ffb442a4a297f
SHA51255bb87663cf9e74e5ac4dd314561ed87a0d79e20557d9274728b5fef0fb411f5d876566deaa0e4feaa1a74f0176bc77649aac3acbe32760bafdb8bada60a0511
-
C:\Windows\System\MBMSujj.exeMD5
22a8ddb8abf644b2a5d302f6958a0831
SHA196e5fe76188da17a28d9be8153f9a2267e052b02
SHA256ab5ee12bed0fab8aca3372e181162d8b531ba08d2011adf4c53ff4fc5e2b1768
SHA512a7a51f876e845b4494edc8d473fb6e7c9b27e900e0960e64d871fb4cd0c1f00339514a08c2572b16cc861aec9225685bbaa1a2e23519bea62a3682ca1aacd3ed
-
C:\Windows\System\MBMSujj.exeMD5
22a8ddb8abf644b2a5d302f6958a0831
SHA196e5fe76188da17a28d9be8153f9a2267e052b02
SHA256ab5ee12bed0fab8aca3372e181162d8b531ba08d2011adf4c53ff4fc5e2b1768
SHA512a7a51f876e845b4494edc8d473fb6e7c9b27e900e0960e64d871fb4cd0c1f00339514a08c2572b16cc861aec9225685bbaa1a2e23519bea62a3682ca1aacd3ed
-
C:\Windows\System\MEksmge.exeMD5
9a5f9ffd136dcf31bb519a3df51097c4
SHA1069be7c793f5e5c91c52ff4ce344678128104f80
SHA25606ba17877d1b9563f177c24ea6e69e524e26c5bf9a4ab96085a0e2ea28e0232a
SHA512aa3e0b86917078084763ef9f6875609c1ce7478cdbe59dd802f9d0b1b3fbf198833e946d5db9bd44a253f20c66f80d125fe2be71998c87a215baa481f0ea9801
-
C:\Windows\System\MEksmge.exeMD5
9a5f9ffd136dcf31bb519a3df51097c4
SHA1069be7c793f5e5c91c52ff4ce344678128104f80
SHA25606ba17877d1b9563f177c24ea6e69e524e26c5bf9a4ab96085a0e2ea28e0232a
SHA512aa3e0b86917078084763ef9f6875609c1ce7478cdbe59dd802f9d0b1b3fbf198833e946d5db9bd44a253f20c66f80d125fe2be71998c87a215baa481f0ea9801
-
C:\Windows\System\NvSKrcv.exeMD5
76b81000155dbd92ba508bf76c055fc2
SHA120748ba035794468719007621fe16009b0ae9d76
SHA256c4a2466369eb152cde7456816216095d419b8b936e06ed95e227f5a8ced62c00
SHA512966b8e41c1d313026f8afd7702bd239442f3cb69381f71e521da549181f965441f467ee97a2cfd1d51e1bbc8705d950b52f9f986414d1519297b2f68c2f18e46
-
C:\Windows\System\NvSKrcv.exeMD5
76b81000155dbd92ba508bf76c055fc2
SHA120748ba035794468719007621fe16009b0ae9d76
SHA256c4a2466369eb152cde7456816216095d419b8b936e06ed95e227f5a8ced62c00
SHA512966b8e41c1d313026f8afd7702bd239442f3cb69381f71e521da549181f965441f467ee97a2cfd1d51e1bbc8705d950b52f9f986414d1519297b2f68c2f18e46
-
C:\Windows\System\PAnbOCx.exeMD5
0cb7b1573acfb2ec70509d8db4e8cee3
SHA15a5fbd988ab7cffd0ad319cf9e37b02b84f35abc
SHA2566d5a2c682895cc60dcf21c7013ee7315323c2f7f42c48e47cfef1f22402c1f2f
SHA51293d7b8ed9416e65cef40105b5e6bfda6167e59df1d7ac1bb1b90bec2a642a40e9409d1c86cac1c3b8fdaa695315cd74b53d97ffd4665bf1497ecd3c8257cc1f0
-
C:\Windows\System\PAnbOCx.exeMD5
0cb7b1573acfb2ec70509d8db4e8cee3
SHA15a5fbd988ab7cffd0ad319cf9e37b02b84f35abc
SHA2566d5a2c682895cc60dcf21c7013ee7315323c2f7f42c48e47cfef1f22402c1f2f
SHA51293d7b8ed9416e65cef40105b5e6bfda6167e59df1d7ac1bb1b90bec2a642a40e9409d1c86cac1c3b8fdaa695315cd74b53d97ffd4665bf1497ecd3c8257cc1f0
-
C:\Windows\System\SPSobiw.exeMD5
0074950fa0f23786f302107de959ce68
SHA1e7d2e56543306d06697df8c04b51e33a3c210346
SHA256f526172a2b288f1d702579f759e34803f9b21086e48d971ad107638061d8309a
SHA5120136b488437ab9bb160883b24ba0470cd5f247d8d69773dd66c653dd5fcaa5fcb26fffd006647de8060adda980937e576521cbfb14d566c420b79c6ac4b57643
-
C:\Windows\System\SPSobiw.exeMD5
0074950fa0f23786f302107de959ce68
SHA1e7d2e56543306d06697df8c04b51e33a3c210346
SHA256f526172a2b288f1d702579f759e34803f9b21086e48d971ad107638061d8309a
SHA5120136b488437ab9bb160883b24ba0470cd5f247d8d69773dd66c653dd5fcaa5fcb26fffd006647de8060adda980937e576521cbfb14d566c420b79c6ac4b57643
-
C:\Windows\System\SokqbRj.exeMD5
5a6ad4dfbb523b471966368db75baba2
SHA13b2882fecb32f00a12574027558c5d8fb2a5d737
SHA25689742dfb2ee5095f67f91186b0b68c2b145344d44b3f47c265fbd35d70a337e3
SHA512dd7cb065348d6c742e6ce17faa482c08371e1ff5885f8c152cdbf585bbaf286f067a42191cc11bc88be6267e078e6883366752c007d9bd0ac02f1ec1beed65a7
-
C:\Windows\System\SokqbRj.exeMD5
5a6ad4dfbb523b471966368db75baba2
SHA13b2882fecb32f00a12574027558c5d8fb2a5d737
SHA25689742dfb2ee5095f67f91186b0b68c2b145344d44b3f47c265fbd35d70a337e3
SHA512dd7cb065348d6c742e6ce17faa482c08371e1ff5885f8c152cdbf585bbaf286f067a42191cc11bc88be6267e078e6883366752c007d9bd0ac02f1ec1beed65a7
-
C:\Windows\System\VRahzSM.exeMD5
c4a958fd39c51e4054ee2339f9dc199d
SHA1ddf94a3dc7c394f11bfbdd6fa36138d69f2083b6
SHA256a64186996125bf909b499ad42d095af635f01eae217fa23591174c54c7bd629f
SHA512f14658b460fd0e10f9a52ef59d1c730e0f2d6a67dccdd425941ba73f864518ffe48988a3bc05c8c67cd59d5a35055f3c9aa60ee8b91dc391da931ed9e2ea3c15
-
C:\Windows\System\VRahzSM.exeMD5
c4a958fd39c51e4054ee2339f9dc199d
SHA1ddf94a3dc7c394f11bfbdd6fa36138d69f2083b6
SHA256a64186996125bf909b499ad42d095af635f01eae217fa23591174c54c7bd629f
SHA512f14658b460fd0e10f9a52ef59d1c730e0f2d6a67dccdd425941ba73f864518ffe48988a3bc05c8c67cd59d5a35055f3c9aa60ee8b91dc391da931ed9e2ea3c15
-
C:\Windows\System\Wsjylkl.exeMD5
c889d8e95c196a403ed674e045688059
SHA132ef40bb98cc731167c643ea5e845a9cc288f259
SHA256d8bff096c9c2824da7aee27fc06a9028befed38ded3363cca5b177e28adcdd11
SHA512e01829561fd3356efa0e1e335ea98ba4bc78f7dea7373d77836359faf2087222cb81584925994d573727cac4dd6872f0e4d69eee42fceef27be255e4b03eae22
-
C:\Windows\System\Wsjylkl.exeMD5
c889d8e95c196a403ed674e045688059
SHA132ef40bb98cc731167c643ea5e845a9cc288f259
SHA256d8bff096c9c2824da7aee27fc06a9028befed38ded3363cca5b177e28adcdd11
SHA512e01829561fd3356efa0e1e335ea98ba4bc78f7dea7373d77836359faf2087222cb81584925994d573727cac4dd6872f0e4d69eee42fceef27be255e4b03eae22
-
C:\Windows\System\aHhAzAO.exeMD5
8f321b65ee482411155ca2078b89ea03
SHA1fad89a2605ec8845eb736094de34e9706f29be8c
SHA2568b19326e063a7b11ae07c2fa9b8a6faa8b4cace194853116400a53904e5d68af
SHA512233444a2da8885cd77f950d269e03847ea24c4f5a4536f833b930199869cf42d99fa9dec9d34b634715e24d4646e969e389c065e93105a6a30ac6f3ff41171b3
-
C:\Windows\System\aHhAzAO.exeMD5
8f321b65ee482411155ca2078b89ea03
SHA1fad89a2605ec8845eb736094de34e9706f29be8c
SHA2568b19326e063a7b11ae07c2fa9b8a6faa8b4cace194853116400a53904e5d68af
SHA512233444a2da8885cd77f950d269e03847ea24c4f5a4536f833b930199869cf42d99fa9dec9d34b634715e24d4646e969e389c065e93105a6a30ac6f3ff41171b3
-
C:\Windows\System\iBNLdvO.exeMD5
3fb9a2e277ec902f83256cd2db4f5fa1
SHA11a4fa3b6d7f01949819f3e2d3b4830017a3e020d
SHA256dfef3c1c58def9b77af94738c6f30edd39952123e4c9a3dfb6dc092ad178d610
SHA512e0d8be6709d56252ca78dd89b2ee11f26fd82b6c4f74ea8c806c6fc6e93c253b38a85bcc2b8a181dea0f0e819f0d618a6da2d036662e04b16bfe35326192a1ef
-
C:\Windows\System\iBNLdvO.exeMD5
3fb9a2e277ec902f83256cd2db4f5fa1
SHA11a4fa3b6d7f01949819f3e2d3b4830017a3e020d
SHA256dfef3c1c58def9b77af94738c6f30edd39952123e4c9a3dfb6dc092ad178d610
SHA512e0d8be6709d56252ca78dd89b2ee11f26fd82b6c4f74ea8c806c6fc6e93c253b38a85bcc2b8a181dea0f0e819f0d618a6da2d036662e04b16bfe35326192a1ef
-
C:\Windows\System\ltmYuRH.exeMD5
a23449304672333bf9ad2ace88b06701
SHA176f392bcb4659f4b315ea81059760c505e664ee0
SHA2564e501da528a2f26da57327e5ce58b1069afad1b3640ac3eb9a20fc6ac3513887
SHA512dcb16d27a2e27d501f06e17eedbe5dda062dad9b50123693d70637bcb41218fc78eeab634cc49f7d2cf50629d55af6210cf4f711a18ef4b99f90d46c801a483a
-
C:\Windows\System\ltmYuRH.exeMD5
a23449304672333bf9ad2ace88b06701
SHA176f392bcb4659f4b315ea81059760c505e664ee0
SHA2564e501da528a2f26da57327e5ce58b1069afad1b3640ac3eb9a20fc6ac3513887
SHA512dcb16d27a2e27d501f06e17eedbe5dda062dad9b50123693d70637bcb41218fc78eeab634cc49f7d2cf50629d55af6210cf4f711a18ef4b99f90d46c801a483a
-
C:\Windows\System\lwCGGNU.exeMD5
5eccceb2272123a42f23f8806ec52b2d
SHA105887c5eada488e16c2519ffd59920a9f9662f84
SHA256c43574593f7b27eece54936d6f29756c6e88fd50dba41fac4d2616e8f4021fea
SHA512b1d4015b2d77da6407221da5814640c9237b1052c8fe1022039c2bbc154b014526beb0013704790a93758055108fe6cf00c443dde4469cb486b414f5a8580372
-
C:\Windows\System\lwCGGNU.exeMD5
5eccceb2272123a42f23f8806ec52b2d
SHA105887c5eada488e16c2519ffd59920a9f9662f84
SHA256c43574593f7b27eece54936d6f29756c6e88fd50dba41fac4d2616e8f4021fea
SHA512b1d4015b2d77da6407221da5814640c9237b1052c8fe1022039c2bbc154b014526beb0013704790a93758055108fe6cf00c443dde4469cb486b414f5a8580372
-
C:\Windows\System\mIFKDUH.exeMD5
b727b356279bef13fc6408b6ec8d570c
SHA1676440fc6d8230207021140de4f13a572a0a50eb
SHA256b0f514145c1c5a519d037334fc57764d5ce50f9a038b535adf1c2fb07ba1c0a2
SHA512f9d9735a5cef3841e76e23258d9e730c72febbfaeea977ba6b1074ea37d3ee0fd1aa650807605360c679493ccb88d86b21da5d51e7ae072f55fe1093ef071828
-
C:\Windows\System\mIFKDUH.exeMD5
b727b356279bef13fc6408b6ec8d570c
SHA1676440fc6d8230207021140de4f13a572a0a50eb
SHA256b0f514145c1c5a519d037334fc57764d5ce50f9a038b535adf1c2fb07ba1c0a2
SHA512f9d9735a5cef3841e76e23258d9e730c72febbfaeea977ba6b1074ea37d3ee0fd1aa650807605360c679493ccb88d86b21da5d51e7ae072f55fe1093ef071828
-
C:\Windows\System\nTctnhx.exeMD5
64e6c70b33386f6f76bb565fbb93cc36
SHA1a635137a3969374952a2b84618e7ba692b91abc7
SHA256be36cffb95db3e9acde71a5d40eebc2f81c58bcc375bb2ca0a4ec73ba88a3679
SHA512757499ef3396d03710613579530dcb263002c314939d7f1933cbb024f35bb3294d13de336c17b7beaa522237413a600e8ed97d468407c150d0deb1a912ba2788
-
C:\Windows\System\nTctnhx.exeMD5
64e6c70b33386f6f76bb565fbb93cc36
SHA1a635137a3969374952a2b84618e7ba692b91abc7
SHA256be36cffb95db3e9acde71a5d40eebc2f81c58bcc375bb2ca0a4ec73ba88a3679
SHA512757499ef3396d03710613579530dcb263002c314939d7f1933cbb024f35bb3294d13de336c17b7beaa522237413a600e8ed97d468407c150d0deb1a912ba2788
-
C:\Windows\System\uEmDuFx.exeMD5
86b2a2ab8a606e6de69404a65865745d
SHA1884a9b0fdd4a21905badac832081a136a6219cf2
SHA25689687993b626b2fa5a43239d7cdfc0a0bba36126dfaa1bf6b4069f082ad30032
SHA512042c5cbc95bae13903b381638d79df645b8f074b6cdfbe60333b07d15f9b68e7123bff9c421a0feb758f12e8a5e017a5d1d6ad5b66ce16797abfb6ebe820755a
-
C:\Windows\System\uEmDuFx.exeMD5
86b2a2ab8a606e6de69404a65865745d
SHA1884a9b0fdd4a21905badac832081a136a6219cf2
SHA25689687993b626b2fa5a43239d7cdfc0a0bba36126dfaa1bf6b4069f082ad30032
SHA512042c5cbc95bae13903b381638d79df645b8f074b6cdfbe60333b07d15f9b68e7123bff9c421a0feb758f12e8a5e017a5d1d6ad5b66ce16797abfb6ebe820755a
-
C:\Windows\System\vBTJNLF.exeMD5
2c2436e31d46a15806a503ef066d316f
SHA12affaef6994fe48c53ab5d480bf1e564cec1b664
SHA256edbd195d97e4f296c52c3b2b26e366855475a8b0b098073f3a10e8b1ab04682d
SHA512f05526cb38acbe46935a3586db2d63c8f25c7b486abebe8b3fe937f1f9cda7c1f91c23bb2dc01eb98f5f2c0a29fc0f9fb949c6edfa507ee16f26f7cc6d49c3df
-
C:\Windows\System\vBTJNLF.exeMD5
2c2436e31d46a15806a503ef066d316f
SHA12affaef6994fe48c53ab5d480bf1e564cec1b664
SHA256edbd195d97e4f296c52c3b2b26e366855475a8b0b098073f3a10e8b1ab04682d
SHA512f05526cb38acbe46935a3586db2d63c8f25c7b486abebe8b3fe937f1f9cda7c1f91c23bb2dc01eb98f5f2c0a29fc0f9fb949c6edfa507ee16f26f7cc6d49c3df
-
C:\Windows\System\xGKasYa.exeMD5
7346a5cb1ca067eedbf30f24b03f0027
SHA177f09ec2c7e7ae476698909bc047540c2b04e173
SHA25624cf211bf128f6ddf5ac0f210d96ef3b82e924c7d3189abab32d25eafe5c4e45
SHA512d76440f5438346ce27546db6df9d4b78675dc99fcd50dc6de1cd58d06a4995f85236fcba59f981df3901372e2c2369ba15d3f5881eb95d257ec5b03f5c26532c
-
C:\Windows\System\xGKasYa.exeMD5
7346a5cb1ca067eedbf30f24b03f0027
SHA177f09ec2c7e7ae476698909bc047540c2b04e173
SHA25624cf211bf128f6ddf5ac0f210d96ef3b82e924c7d3189abab32d25eafe5c4e45
SHA512d76440f5438346ce27546db6df9d4b78675dc99fcd50dc6de1cd58d06a4995f85236fcba59f981df3901372e2c2369ba15d3f5881eb95d257ec5b03f5c26532c
-
memory/68-33-0x0000000000000000-mapping.dmp
-
memory/644-36-0x0000000000000000-mapping.dmp
-
memory/996-39-0x0000000000000000-mapping.dmp
-
memory/1108-42-0x0000000000000000-mapping.dmp
-
memory/1252-45-0x0000000000000000-mapping.dmp
-
memory/1468-47-0x0000000000000000-mapping.dmp
-
memory/1572-49-0x0000000000000000-mapping.dmp
-
memory/1760-52-0x0000000000000000-mapping.dmp
-
memory/1876-55-0x0000000000000000-mapping.dmp
-
memory/2108-60-0x0000000000000000-mapping.dmp
-
memory/2272-24-0x0000000000000000-mapping.dmp
-
memory/2476-30-0x0000000000000000-mapping.dmp
-
memory/3012-18-0x0000000000000000-mapping.dmp
-
memory/3292-12-0x0000000000000000-mapping.dmp
-
memory/3324-6-0x0000000000000000-mapping.dmp
-
memory/3600-15-0x0000000000000000-mapping.dmp
-
memory/3744-9-0x0000000000000000-mapping.dmp
-
memory/3804-27-0x0000000000000000-mapping.dmp
-
memory/3868-3-0x0000000000000000-mapping.dmp
-
memory/4104-21-0x0000000000000000-mapping.dmp
-
memory/5068-0-0x0000000000000000-mapping.dmp