Analysis
-
max time kernel
126s -
max time network
135s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
10-11-2020 07:01
Static task
static1
Behavioral task
behavioral1
Sample
a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe
Resource
win10v20201028
General
-
Target
a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe
-
Size
5.2MB
-
MD5
f7c69fa1dcdaa2dd51d1bcd593ff2867
-
SHA1
77eb257809de114b4b3cb9295c0857009127c707
-
SHA256
a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f
-
SHA512
6ff9b7549af7dfa66f789a031592d1de77188e5e15eaac76a2b4e48b88fe373f4375929c09faa718d0ea315aa20fa98e3a7b75041dfad1926aaa291107386209
Malware Config
Signatures
-
Cobalt Strike reflective loader 37 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\abYQKNt.exe cobalt_reflective_dll C:\Windows\system\abYQKNt.exe cobalt_reflective_dll \Windows\system\xInQRLv.exe cobalt_reflective_dll \Windows\system\XYZkDFe.exe cobalt_reflective_dll C:\Windows\system\xInQRLv.exe cobalt_reflective_dll C:\Windows\system\XYZkDFe.exe cobalt_reflective_dll \Windows\system\chihZBz.exe cobalt_reflective_dll C:\Windows\system\chihZBz.exe cobalt_reflective_dll \Windows\system\gUnDIyq.exe cobalt_reflective_dll C:\Windows\system\gUnDIyq.exe cobalt_reflective_dll \Windows\system\RjfHDar.exe cobalt_reflective_dll C:\Windows\system\RjfHDar.exe cobalt_reflective_dll C:\Windows\system\ZQsoXtZ.exe cobalt_reflective_dll \Windows\system\ZQsoXtZ.exe cobalt_reflective_dll \Windows\system\BnNszCm.exe cobalt_reflective_dll C:\Windows\system\BnNszCm.exe cobalt_reflective_dll \Windows\system\xPAazYr.exe cobalt_reflective_dll C:\Windows\system\xPAazYr.exe cobalt_reflective_dll \Windows\system\IIjsmGL.exe cobalt_reflective_dll \Windows\system\mYsLQnU.exe cobalt_reflective_dll C:\Windows\system\IIjsmGL.exe cobalt_reflective_dll C:\Windows\system\mYsLQnU.exe cobalt_reflective_dll \Windows\system\sUdeqoW.exe cobalt_reflective_dll C:\Windows\system\sUdeqoW.exe cobalt_reflective_dll \Windows\system\jmZfUzI.exe cobalt_reflective_dll C:\Windows\system\jmZfUzI.exe cobalt_reflective_dll \Windows\system\GwHdmIx.exe cobalt_reflective_dll C:\Windows\system\GwHdmIx.exe cobalt_reflective_dll \Windows\system\tVFuqXm.exe cobalt_reflective_dll C:\Windows\system\tVFuqXm.exe cobalt_reflective_dll \Windows\system\RnSLrsB.exe cobalt_reflective_dll \Windows\system\rHaRlkQ.exe cobalt_reflective_dll C:\Windows\system\RnSLrsB.exe cobalt_reflective_dll C:\Windows\system\rHaRlkQ.exe cobalt_reflective_dll \Windows\system\YLAQTna.exe cobalt_reflective_dll C:\Windows\system\YLAQTna.exe cobalt_reflective_dll \Windows\system\aLcbDji.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Executes dropped EXE 18 IoCs
Processes:
abYQKNt.exexInQRLv.exeXYZkDFe.exechihZBz.exegUnDIyq.exeRjfHDar.exeZQsoXtZ.exeBnNszCm.exexPAazYr.exeIIjsmGL.exemYsLQnU.exesUdeqoW.exejmZfUzI.exeGwHdmIx.exetVFuqXm.exeRnSLrsB.exerHaRlkQ.exeYLAQTna.exepid process 1900 abYQKNt.exe 1996 xInQRLv.exe 1172 XYZkDFe.exe 2036 chihZBz.exe 1968 gUnDIyq.exe 1812 RjfHDar.exe 1708 ZQsoXtZ.exe 1784 BnNszCm.exe 1704 xPAazYr.exe 1676 IIjsmGL.exe 1328 mYsLQnU.exe 836 sUdeqoW.exe 1512 jmZfUzI.exe 1396 GwHdmIx.exe 1352 tVFuqXm.exe 768 RnSLrsB.exe 1348 rHaRlkQ.exe 948 YLAQTna.exe -
Processes:
resource yara_rule \Windows\system\abYQKNt.exe upx C:\Windows\system\abYQKNt.exe upx \Windows\system\xInQRLv.exe upx \Windows\system\XYZkDFe.exe upx C:\Windows\system\xInQRLv.exe upx C:\Windows\system\XYZkDFe.exe upx \Windows\system\chihZBz.exe upx C:\Windows\system\chihZBz.exe upx \Windows\system\gUnDIyq.exe upx C:\Windows\system\gUnDIyq.exe upx \Windows\system\RjfHDar.exe upx C:\Windows\system\RjfHDar.exe upx C:\Windows\system\ZQsoXtZ.exe upx \Windows\system\ZQsoXtZ.exe upx \Windows\system\BnNszCm.exe upx C:\Windows\system\BnNszCm.exe upx \Windows\system\xPAazYr.exe upx C:\Windows\system\xPAazYr.exe upx \Windows\system\IIjsmGL.exe upx \Windows\system\mYsLQnU.exe upx C:\Windows\system\IIjsmGL.exe upx C:\Windows\system\mYsLQnU.exe upx \Windows\system\sUdeqoW.exe upx C:\Windows\system\sUdeqoW.exe upx \Windows\system\jmZfUzI.exe upx C:\Windows\system\jmZfUzI.exe upx \Windows\system\GwHdmIx.exe upx C:\Windows\system\GwHdmIx.exe upx \Windows\system\tVFuqXm.exe upx C:\Windows\system\tVFuqXm.exe upx \Windows\system\RnSLrsB.exe upx \Windows\system\rHaRlkQ.exe upx C:\Windows\system\RnSLrsB.exe upx C:\Windows\system\rHaRlkQ.exe upx \Windows\system\YLAQTna.exe upx C:\Windows\system\YLAQTna.exe upx \Windows\system\aLcbDji.exe upx -
Loads dropped DLL 19 IoCs
Processes:
a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exepid process 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe -
JavaScript code in executable 37 IoCs
Processes:
resource yara_rule \Windows\system\abYQKNt.exe js C:\Windows\system\abYQKNt.exe js \Windows\system\xInQRLv.exe js \Windows\system\XYZkDFe.exe js C:\Windows\system\xInQRLv.exe js C:\Windows\system\XYZkDFe.exe js \Windows\system\chihZBz.exe js C:\Windows\system\chihZBz.exe js \Windows\system\gUnDIyq.exe js C:\Windows\system\gUnDIyq.exe js \Windows\system\RjfHDar.exe js C:\Windows\system\RjfHDar.exe js C:\Windows\system\ZQsoXtZ.exe js \Windows\system\ZQsoXtZ.exe js \Windows\system\BnNszCm.exe js C:\Windows\system\BnNszCm.exe js \Windows\system\xPAazYr.exe js C:\Windows\system\xPAazYr.exe js \Windows\system\IIjsmGL.exe js \Windows\system\mYsLQnU.exe js C:\Windows\system\IIjsmGL.exe js C:\Windows\system\mYsLQnU.exe js \Windows\system\sUdeqoW.exe js C:\Windows\system\sUdeqoW.exe js \Windows\system\jmZfUzI.exe js C:\Windows\system\jmZfUzI.exe js \Windows\system\GwHdmIx.exe js C:\Windows\system\GwHdmIx.exe js \Windows\system\tVFuqXm.exe js C:\Windows\system\tVFuqXm.exe js \Windows\system\RnSLrsB.exe js \Windows\system\rHaRlkQ.exe js C:\Windows\system\RnSLrsB.exe js C:\Windows\system\rHaRlkQ.exe js \Windows\system\YLAQTna.exe js C:\Windows\system\YLAQTna.exe js \Windows\system\aLcbDji.exe js -
Drops file in Windows directory 19 IoCs
Processes:
a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exedescription ioc process File created C:\Windows\System\sUdeqoW.exe a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe File created C:\Windows\System\tVFuqXm.exe a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe File created C:\Windows\System\YLAQTna.exe a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe File created C:\Windows\System\abYQKNt.exe a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe File created C:\Windows\System\gUnDIyq.exe a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe File created C:\Windows\System\ZQsoXtZ.exe a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe File created C:\Windows\System\IIjsmGL.exe a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe File created C:\Windows\System\mYsLQnU.exe a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe File created C:\Windows\System\XYZkDFe.exe a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe File created C:\Windows\System\jmZfUzI.exe a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe File created C:\Windows\System\aLcbDji.exe a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe File created C:\Windows\System\chihZBz.exe a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe File created C:\Windows\System\RjfHDar.exe a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe File created C:\Windows\System\BnNszCm.exe a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe File created C:\Windows\System\xPAazYr.exe a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe File created C:\Windows\System\xInQRLv.exe a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe File created C:\Windows\System\GwHdmIx.exe a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe File created C:\Windows\System\RnSLrsB.exe a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe File created C:\Windows\System\rHaRlkQ.exe a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe -
Suspicious use of WriteProcessMemory 57 IoCs
Processes:
a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exedescription pid process target process PID 308 wrote to memory of 1900 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe abYQKNt.exe PID 308 wrote to memory of 1900 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe abYQKNt.exe PID 308 wrote to memory of 1900 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe abYQKNt.exe PID 308 wrote to memory of 1996 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe xInQRLv.exe PID 308 wrote to memory of 1996 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe xInQRLv.exe PID 308 wrote to memory of 1996 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe xInQRLv.exe PID 308 wrote to memory of 1172 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe XYZkDFe.exe PID 308 wrote to memory of 1172 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe XYZkDFe.exe PID 308 wrote to memory of 1172 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe XYZkDFe.exe PID 308 wrote to memory of 2036 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe chihZBz.exe PID 308 wrote to memory of 2036 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe chihZBz.exe PID 308 wrote to memory of 2036 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe chihZBz.exe PID 308 wrote to memory of 1968 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe gUnDIyq.exe PID 308 wrote to memory of 1968 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe gUnDIyq.exe PID 308 wrote to memory of 1968 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe gUnDIyq.exe PID 308 wrote to memory of 1812 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe RjfHDar.exe PID 308 wrote to memory of 1812 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe RjfHDar.exe PID 308 wrote to memory of 1812 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe RjfHDar.exe PID 308 wrote to memory of 1708 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe ZQsoXtZ.exe PID 308 wrote to memory of 1708 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe ZQsoXtZ.exe PID 308 wrote to memory of 1708 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe ZQsoXtZ.exe PID 308 wrote to memory of 1784 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe BnNszCm.exe PID 308 wrote to memory of 1784 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe BnNszCm.exe PID 308 wrote to memory of 1784 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe BnNszCm.exe PID 308 wrote to memory of 1704 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe xPAazYr.exe PID 308 wrote to memory of 1704 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe xPAazYr.exe PID 308 wrote to memory of 1704 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe xPAazYr.exe PID 308 wrote to memory of 1676 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe IIjsmGL.exe PID 308 wrote to memory of 1676 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe IIjsmGL.exe PID 308 wrote to memory of 1676 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe IIjsmGL.exe PID 308 wrote to memory of 1328 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe mYsLQnU.exe PID 308 wrote to memory of 1328 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe mYsLQnU.exe PID 308 wrote to memory of 1328 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe mYsLQnU.exe PID 308 wrote to memory of 836 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe sUdeqoW.exe PID 308 wrote to memory of 836 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe sUdeqoW.exe PID 308 wrote to memory of 836 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe sUdeqoW.exe PID 308 wrote to memory of 1512 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe jmZfUzI.exe PID 308 wrote to memory of 1512 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe jmZfUzI.exe PID 308 wrote to memory of 1512 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe jmZfUzI.exe PID 308 wrote to memory of 1396 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe GwHdmIx.exe PID 308 wrote to memory of 1396 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe GwHdmIx.exe PID 308 wrote to memory of 1396 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe GwHdmIx.exe PID 308 wrote to memory of 1352 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe tVFuqXm.exe PID 308 wrote to memory of 1352 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe tVFuqXm.exe PID 308 wrote to memory of 1352 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe tVFuqXm.exe PID 308 wrote to memory of 768 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe RnSLrsB.exe PID 308 wrote to memory of 768 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe RnSLrsB.exe PID 308 wrote to memory of 768 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe RnSLrsB.exe PID 308 wrote to memory of 1348 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe rHaRlkQ.exe PID 308 wrote to memory of 1348 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe rHaRlkQ.exe PID 308 wrote to memory of 1348 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe rHaRlkQ.exe PID 308 wrote to memory of 948 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe YLAQTna.exe PID 308 wrote to memory of 948 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe YLAQTna.exe PID 308 wrote to memory of 948 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe YLAQTna.exe PID 308 wrote to memory of 1624 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe aLcbDji.exe PID 308 wrote to memory of 1624 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe aLcbDji.exe PID 308 wrote to memory of 1624 308 a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe aLcbDji.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe"C:\Users\Admin\AppData\Local\Temp\a142c06bd241abb9ba258bdb3edccea807825bdeb84ef50cf20b3ea67cd40e7f.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\abYQKNt.exeC:\Windows\System\abYQKNt.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xInQRLv.exeC:\Windows\System\xInQRLv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XYZkDFe.exeC:\Windows\System\XYZkDFe.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\chihZBz.exeC:\Windows\System\chihZBz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\gUnDIyq.exeC:\Windows\System\gUnDIyq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RjfHDar.exeC:\Windows\System\RjfHDar.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZQsoXtZ.exeC:\Windows\System\ZQsoXtZ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BnNszCm.exeC:\Windows\System\BnNszCm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xPAazYr.exeC:\Windows\System\xPAazYr.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IIjsmGL.exeC:\Windows\System\IIjsmGL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\mYsLQnU.exeC:\Windows\System\mYsLQnU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\sUdeqoW.exeC:\Windows\System\sUdeqoW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jmZfUzI.exeC:\Windows\System\jmZfUzI.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GwHdmIx.exeC:\Windows\System\GwHdmIx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\tVFuqXm.exeC:\Windows\System\tVFuqXm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RnSLrsB.exeC:\Windows\System\RnSLrsB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\rHaRlkQ.exeC:\Windows\System\rHaRlkQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YLAQTna.exeC:\Windows\System\YLAQTna.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aLcbDji.exeC:\Windows\System\aLcbDji.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\BnNszCm.exeMD5
86f00eda2e134d3663aaab78d20d1638
SHA1697556d2157018c9d870b1fbebb126fc33fdafe9
SHA256ca2bd1d15c1c94dee830e488db5a264b0d45cc8f6d6605e153ff44f089ef8491
SHA5121070d043d90b36dac26740fab5fc8ca0d752d5b402bf50a1a6ea5ffa56a5fa26c3828a8440674f9e1fe6de63d132af8cc3ad0e49767d146f8e8067c0bb8755f2
-
C:\Windows\system\GwHdmIx.exeMD5
47c1834756e3851df7b77d48e4578096
SHA1716d057dfbd8c147e3c6d684fcdd326b57f8c0b6
SHA25693ccfb04e155a1e402859ab48d72ed47f67d1cb7f21fa96d0fc538353c903ec9
SHA512ab8ff7067d1d2c40e595738bfd4a6f03caf201070ed0b54e2c58c5b60cea572bfd69120c62638740eab5e4740c046dc303bd988ca264c78a9505b221033f3af6
-
C:\Windows\system\IIjsmGL.exeMD5
5285aafa71c0009bbb23f2412ed63539
SHA154cfd6d5f2bcf6014c8a5cd8360e01f0b17a73ea
SHA2564f1c65fb3123427f21655e2dea90a9ad7c3f1a54d083239bf5c1f49859cd3671
SHA512fe920f02c3249b1d22a7e64b0bb7fbbe4d363aa73cdc3792120b54b749a10f52190a5b720885e558e70d2a8e6df8715785f95ec310cb7e5d5d780460eea87c21
-
C:\Windows\system\RjfHDar.exeMD5
bf83f3337914ce153273c1d0afd42960
SHA11926f07652b63de2bfd667de2d3332a1b91af293
SHA2568237d6d122c28bf57c1995f85be4201dc3e7af29a81cb5e5a687db67a306beab
SHA512f91180da29a4f939f6090c14a8742d1567073a116d8c7dcef21a99ba2e0c58d4694703f88cba533245483a24ea9861b34118e9b430b0cce894e1653bccb32e5d
-
C:\Windows\system\RnSLrsB.exeMD5
e89936b5ccfc92b4f4449b7730cbf011
SHA137cbc5aedfe30d874db798690c935efaa78d7be6
SHA256a4c5de206340eb8e7ec4709ee94c3d14838d9c01b93be6027f6d0ee0fdd6153a
SHA512263446041dada057e5769b093bacea323fa210523c50db6ce369976049f774518d948ed38039cad9d4882792ebd9d4e418d200c6e5ce588281f24c258b5bba28
-
C:\Windows\system\XYZkDFe.exeMD5
6d617a8cd494746e4cd4e4432c0cad2d
SHA15d7f88d45116ae9efbf97dc098cac095febe201c
SHA25610b54805cbe9ca44607a7d1968cba8f4eb8a5eca240f4d81ed4c4b8d30c0e4eb
SHA51263c35eebe2d0ed9e4fc5476b9334bad85da2950b29b7728bb9df3c3f3be10e87bdba297c13cbbaefbb3420f429a51da337f175adb9f6a8e6f006df36de3cabba
-
C:\Windows\system\YLAQTna.exeMD5
514d87a13295abe520e1bb8b95145043
SHA100090422578dc84ce77c700accf93de615cee14c
SHA25681e8ffda048ca89211d7a30378bfcfc6f35ddec297e020377d4a1210bd170a46
SHA5120a6a5524afc4e810ce3d9fef4473ea218f44aad9ef07b8d264017dae77f2017bed256f637d300bc630fc54cc3eaf320b8ea2580eead25c4d52f0ab7a899c64b3
-
C:\Windows\system\ZQsoXtZ.exeMD5
9a67b6bc643dbd3ab6b0ff890adf7878
SHA164e9e799997c9d6a58bfb366af7bb5710f931f09
SHA25620992a9908747ab0933cefd254d017a991731f2b7464e278427a099ef927620d
SHA512734570871faa9ebed46105202c672e39fcb88134f02130e08c3474a3bc2d2bf5d24221e6c7ac99988ef4fac1a9cb5780b4106418f88a5aafd852daa877f97e87
-
C:\Windows\system\abYQKNt.exeMD5
24e73b2625a8ca049f760e53240cb224
SHA166fddb9005f84cde249f54c182009bf83882f564
SHA25626ddf44b320feb5eb0bc0c934bb64dfa4993f7de4f36af8eef30c0906e3639bf
SHA512393ad6ce8fe6c821a28a22de3df973870a95f38cf8b8d94af56ce1864ba78b7fb3b9817f4b11beb2fdb79eec02092ca3db744e5c1091ce20d6b9ddf7232aa4e0
-
C:\Windows\system\chihZBz.exeMD5
ff3368ea5045dfbe18b46b3c3f461c3a
SHA1dee3a7d85f9c0e896d393bfe8520d90d65bf4414
SHA256fa3584431d288c528620272d501a6ec89e5d50b5ea01019eb2d2cde49c977096
SHA5123484ceb4245b72132d8c282fd71d36f8d7ac9c2aa6e1f2c4687e0619fa5be7b7d5d264410dac79ddc17f6c5633c77a338e2c06eba4d73c9a9a1353883da411d2
-
C:\Windows\system\gUnDIyq.exeMD5
f22c9ea7fa3c079ce5cb505649f6255a
SHA182b89c75b94769a1a7b90b5c79c33f1bc20d4810
SHA25687768cefcadd55b0d019e1b8a646b639adf6164f28ecd382f8051561a117367b
SHA512d4a925ce709b124d9eb6863a9418ba0d2881ce4d3ef0c42ebfa5e5547431201623084a5a3b2651bd0c223f98fa230a588f2d075cfd4dfa7288e650a03d0c7e38
-
C:\Windows\system\jmZfUzI.exeMD5
fca5e17f555018839577081fc4bd65a1
SHA1d0e26990b22cc04b96b766afed188b11ef8fa7ae
SHA25629dd4dc31ca39a0c640e21a908ef52ac01f1defe2f48fb792aa8299339c20e5e
SHA512f9ce2ac01a35074819210ee6e665cae30b26200dbf337e687b59d9f744a2883ff1e840d6579888b33a808e9f8c2347a9692040ead33c4d33f0169fed7b4ce528
-
C:\Windows\system\mYsLQnU.exeMD5
7b0758184c556d6b2b186cff9646c60e
SHA17c723fd89d66c37b2fc9c166b99cb796e973c9db
SHA256d46030e16dbfe8a7a8cff9f9b9affac4916d702b870110d3d983a9cbf162ebff
SHA512900a030ad4e69bb352065c457bfd48b0ebc04b46b5fa201082fe7ca80d3c99c17ac16428fb4ef0a884b57db6c842a1340a0ce00d7f92ed20f65bcc09c10f6c13
-
C:\Windows\system\rHaRlkQ.exeMD5
cbc379108d5d4350e5df3d16a35901d9
SHA160135292d0a9e55aa8c3dfca909129225cce5957
SHA256e44ce5ae0b19d83b230598afed030dd5d4e197da31440cc68103fd04ed7a74e4
SHA5123eab768d456c2c65766087657df840b60a545b640d109f89afb77c67fa4dc6b9284296a2ea1329d407fd58264e9f7fd4a104112eb3d8c10c971b68e8569bcd94
-
C:\Windows\system\sUdeqoW.exeMD5
2319fc3142b3c684ad41db563ffb1c65
SHA12f8ef44e4bef428618c98f6e2c48c8cc98ffe28f
SHA256429deeed23745ecbc334ad93f2fad1c97ac2bd8c3fa17a20933257bb72f4e8d7
SHA51257def10c72bbd217d360abaa391f266cf7d08d8bd7240fa8983d83dabef8c01b8d98cd50989a6d17fb215da14dae4979c6283ceebd12a2edde865643a0ad62d1
-
C:\Windows\system\tVFuqXm.exeMD5
8f021163d9577e1f8dac04cae3673ccf
SHA1fff1d35493ac375c9c05c156489fb9d87f4b169a
SHA2567d32bec75b6363ec542b4351668aab5ab25fbe81b8909bcb4825ac7c67186191
SHA512b6adbb44e80290cb63c113862ab01e3adce438064167b5e6d1ec978bb0b946ec18d683d9683d4caac67bda6867790dd0f667a2a028a54db17d2d9cadb136376d
-
C:\Windows\system\xInQRLv.exeMD5
b66046eb91846f9a6422dfdcb138764d
SHA12231ff0ce1f7902f6986310243d7abc493038781
SHA256f05c72b10f18755c4d191d895a87e89dad491b0b7ba2126b18a2acf532f6b909
SHA512b76d84d8395d2b0ce1caaae61e77283b758e3cbe6c0717b80e66607291d60234dfe617f47a0dcef2c1e3649568843f904fd16b74c42425cf9b9232db4ac31b63
-
C:\Windows\system\xPAazYr.exeMD5
050ceb07263f74ed9202abc58ed1553a
SHA1b59551184fec3a163725e1ac140142d00f85d71c
SHA256551f247add4e7454ca822aba094bde893422da10c2cbb3017f895a46fd7b8d07
SHA512d697e66314a407b011eebc0a1fb31159e52e6f72a04ea9bffd363d1e184959a7711fc8c669d94d268757586f7dd6085e5c56ab2d8faabf17cc95a3fb3a884ee6
-
\Windows\system\BnNszCm.exeMD5
86f00eda2e134d3663aaab78d20d1638
SHA1697556d2157018c9d870b1fbebb126fc33fdafe9
SHA256ca2bd1d15c1c94dee830e488db5a264b0d45cc8f6d6605e153ff44f089ef8491
SHA5121070d043d90b36dac26740fab5fc8ca0d752d5b402bf50a1a6ea5ffa56a5fa26c3828a8440674f9e1fe6de63d132af8cc3ad0e49767d146f8e8067c0bb8755f2
-
\Windows\system\GwHdmIx.exeMD5
47c1834756e3851df7b77d48e4578096
SHA1716d057dfbd8c147e3c6d684fcdd326b57f8c0b6
SHA25693ccfb04e155a1e402859ab48d72ed47f67d1cb7f21fa96d0fc538353c903ec9
SHA512ab8ff7067d1d2c40e595738bfd4a6f03caf201070ed0b54e2c58c5b60cea572bfd69120c62638740eab5e4740c046dc303bd988ca264c78a9505b221033f3af6
-
\Windows\system\IIjsmGL.exeMD5
5285aafa71c0009bbb23f2412ed63539
SHA154cfd6d5f2bcf6014c8a5cd8360e01f0b17a73ea
SHA2564f1c65fb3123427f21655e2dea90a9ad7c3f1a54d083239bf5c1f49859cd3671
SHA512fe920f02c3249b1d22a7e64b0bb7fbbe4d363aa73cdc3792120b54b749a10f52190a5b720885e558e70d2a8e6df8715785f95ec310cb7e5d5d780460eea87c21
-
\Windows\system\RjfHDar.exeMD5
bf83f3337914ce153273c1d0afd42960
SHA11926f07652b63de2bfd667de2d3332a1b91af293
SHA2568237d6d122c28bf57c1995f85be4201dc3e7af29a81cb5e5a687db67a306beab
SHA512f91180da29a4f939f6090c14a8742d1567073a116d8c7dcef21a99ba2e0c58d4694703f88cba533245483a24ea9861b34118e9b430b0cce894e1653bccb32e5d
-
\Windows\system\RnSLrsB.exeMD5
e89936b5ccfc92b4f4449b7730cbf011
SHA137cbc5aedfe30d874db798690c935efaa78d7be6
SHA256a4c5de206340eb8e7ec4709ee94c3d14838d9c01b93be6027f6d0ee0fdd6153a
SHA512263446041dada057e5769b093bacea323fa210523c50db6ce369976049f774518d948ed38039cad9d4882792ebd9d4e418d200c6e5ce588281f24c258b5bba28
-
\Windows\system\XYZkDFe.exeMD5
6d617a8cd494746e4cd4e4432c0cad2d
SHA15d7f88d45116ae9efbf97dc098cac095febe201c
SHA25610b54805cbe9ca44607a7d1968cba8f4eb8a5eca240f4d81ed4c4b8d30c0e4eb
SHA51263c35eebe2d0ed9e4fc5476b9334bad85da2950b29b7728bb9df3c3f3be10e87bdba297c13cbbaefbb3420f429a51da337f175adb9f6a8e6f006df36de3cabba
-
\Windows\system\YLAQTna.exeMD5
514d87a13295abe520e1bb8b95145043
SHA100090422578dc84ce77c700accf93de615cee14c
SHA25681e8ffda048ca89211d7a30378bfcfc6f35ddec297e020377d4a1210bd170a46
SHA5120a6a5524afc4e810ce3d9fef4473ea218f44aad9ef07b8d264017dae77f2017bed256f637d300bc630fc54cc3eaf320b8ea2580eead25c4d52f0ab7a899c64b3
-
\Windows\system\ZQsoXtZ.exeMD5
9a67b6bc643dbd3ab6b0ff890adf7878
SHA164e9e799997c9d6a58bfb366af7bb5710f931f09
SHA25620992a9908747ab0933cefd254d017a991731f2b7464e278427a099ef927620d
SHA512734570871faa9ebed46105202c672e39fcb88134f02130e08c3474a3bc2d2bf5d24221e6c7ac99988ef4fac1a9cb5780b4106418f88a5aafd852daa877f97e87
-
\Windows\system\aLcbDji.exeMD5
ed78f9265b08c6b40f4936c2443b4ef5
SHA14a714b47aaae51294a50e653dd52cc035a7378b7
SHA256330eccdc6b6ae7a5d0f88f0eb995a9b2b9b8c1ea0da54ad9efd378f4851dc0d2
SHA512c25bab5f2d0fc92b44725942726e68427d5c069f5779b5749edb1d8e927b890aaccc546a5386cc753ae3552ebe1a85dad8a0b47f0d2f1fd928c97554485d3a33
-
\Windows\system\abYQKNt.exeMD5
24e73b2625a8ca049f760e53240cb224
SHA166fddb9005f84cde249f54c182009bf83882f564
SHA25626ddf44b320feb5eb0bc0c934bb64dfa4993f7de4f36af8eef30c0906e3639bf
SHA512393ad6ce8fe6c821a28a22de3df973870a95f38cf8b8d94af56ce1864ba78b7fb3b9817f4b11beb2fdb79eec02092ca3db744e5c1091ce20d6b9ddf7232aa4e0
-
\Windows\system\chihZBz.exeMD5
ff3368ea5045dfbe18b46b3c3f461c3a
SHA1dee3a7d85f9c0e896d393bfe8520d90d65bf4414
SHA256fa3584431d288c528620272d501a6ec89e5d50b5ea01019eb2d2cde49c977096
SHA5123484ceb4245b72132d8c282fd71d36f8d7ac9c2aa6e1f2c4687e0619fa5be7b7d5d264410dac79ddc17f6c5633c77a338e2c06eba4d73c9a9a1353883da411d2
-
\Windows\system\gUnDIyq.exeMD5
f22c9ea7fa3c079ce5cb505649f6255a
SHA182b89c75b94769a1a7b90b5c79c33f1bc20d4810
SHA25687768cefcadd55b0d019e1b8a646b639adf6164f28ecd382f8051561a117367b
SHA512d4a925ce709b124d9eb6863a9418ba0d2881ce4d3ef0c42ebfa5e5547431201623084a5a3b2651bd0c223f98fa230a588f2d075cfd4dfa7288e650a03d0c7e38
-
\Windows\system\jmZfUzI.exeMD5
fca5e17f555018839577081fc4bd65a1
SHA1d0e26990b22cc04b96b766afed188b11ef8fa7ae
SHA25629dd4dc31ca39a0c640e21a908ef52ac01f1defe2f48fb792aa8299339c20e5e
SHA512f9ce2ac01a35074819210ee6e665cae30b26200dbf337e687b59d9f744a2883ff1e840d6579888b33a808e9f8c2347a9692040ead33c4d33f0169fed7b4ce528
-
\Windows\system\mYsLQnU.exeMD5
7b0758184c556d6b2b186cff9646c60e
SHA17c723fd89d66c37b2fc9c166b99cb796e973c9db
SHA256d46030e16dbfe8a7a8cff9f9b9affac4916d702b870110d3d983a9cbf162ebff
SHA512900a030ad4e69bb352065c457bfd48b0ebc04b46b5fa201082fe7ca80d3c99c17ac16428fb4ef0a884b57db6c842a1340a0ce00d7f92ed20f65bcc09c10f6c13
-
\Windows\system\rHaRlkQ.exeMD5
cbc379108d5d4350e5df3d16a35901d9
SHA160135292d0a9e55aa8c3dfca909129225cce5957
SHA256e44ce5ae0b19d83b230598afed030dd5d4e197da31440cc68103fd04ed7a74e4
SHA5123eab768d456c2c65766087657df840b60a545b640d109f89afb77c67fa4dc6b9284296a2ea1329d407fd58264e9f7fd4a104112eb3d8c10c971b68e8569bcd94
-
\Windows\system\sUdeqoW.exeMD5
2319fc3142b3c684ad41db563ffb1c65
SHA12f8ef44e4bef428618c98f6e2c48c8cc98ffe28f
SHA256429deeed23745ecbc334ad93f2fad1c97ac2bd8c3fa17a20933257bb72f4e8d7
SHA51257def10c72bbd217d360abaa391f266cf7d08d8bd7240fa8983d83dabef8c01b8d98cd50989a6d17fb215da14dae4979c6283ceebd12a2edde865643a0ad62d1
-
\Windows\system\tVFuqXm.exeMD5
8f021163d9577e1f8dac04cae3673ccf
SHA1fff1d35493ac375c9c05c156489fb9d87f4b169a
SHA2567d32bec75b6363ec542b4351668aab5ab25fbe81b8909bcb4825ac7c67186191
SHA512b6adbb44e80290cb63c113862ab01e3adce438064167b5e6d1ec978bb0b946ec18d683d9683d4caac67bda6867790dd0f667a2a028a54db17d2d9cadb136376d
-
\Windows\system\xInQRLv.exeMD5
b66046eb91846f9a6422dfdcb138764d
SHA12231ff0ce1f7902f6986310243d7abc493038781
SHA256f05c72b10f18755c4d191d895a87e89dad491b0b7ba2126b18a2acf532f6b909
SHA512b76d84d8395d2b0ce1caaae61e77283b758e3cbe6c0717b80e66607291d60234dfe617f47a0dcef2c1e3649568843f904fd16b74c42425cf9b9232db4ac31b63
-
\Windows\system\xPAazYr.exeMD5
050ceb07263f74ed9202abc58ed1553a
SHA1b59551184fec3a163725e1ac140142d00f85d71c
SHA256551f247add4e7454ca822aba094bde893422da10c2cbb3017f895a46fd7b8d07
SHA512d697e66314a407b011eebc0a1fb31159e52e6f72a04ea9bffd363d1e184959a7711fc8c669d94d268757586f7dd6085e5c56ab2d8faabf17cc95a3fb3a884ee6
-
memory/768-46-0x0000000000000000-mapping.dmp
-
memory/836-34-0x0000000000000000-mapping.dmp
-
memory/948-52-0x0000000000000000-mapping.dmp
-
memory/1172-6-0x0000000000000000-mapping.dmp
-
memory/1328-30-0x0000000000000000-mapping.dmp
-
memory/1348-49-0x0000000000000000-mapping.dmp
-
memory/1352-43-0x0000000000000000-mapping.dmp
-
memory/1396-40-0x0000000000000000-mapping.dmp
-
memory/1512-37-0x0000000000000000-mapping.dmp
-
memory/1624-55-0x0000000000000000-mapping.dmp
-
memory/1676-27-0x0000000000000000-mapping.dmp
-
memory/1704-25-0x0000000000000000-mapping.dmp
-
memory/1708-19-0x0000000000000000-mapping.dmp
-
memory/1784-22-0x0000000000000000-mapping.dmp
-
memory/1812-16-0x0000000000000000-mapping.dmp
-
memory/1900-1-0x0000000000000000-mapping.dmp
-
memory/1968-13-0x0000000000000000-mapping.dmp
-
memory/1996-4-0x0000000000000000-mapping.dmp
-
memory/2036-10-0x0000000000000000-mapping.dmp