Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
10-11-2020 07:01
Static task
static1
Behavioral task
behavioral1
Sample
46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe
Resource
win10v20201028
General
-
Target
46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe
-
Size
5.2MB
-
MD5
636fe3f2d9f5e1694dee4a084cf76486
-
SHA1
9ad0d9882250eee6ab376295e988b32e12860691
-
SHA256
46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2
-
SHA512
015b61c6f16047a63d9ad1cb854be8cd849d8bba210d27c7e44a6e0b58ec381c758951a376edb477b4a362018e2f1d45da59e7ac7a030a272b10cd07184e710a
Malware Config
Signatures
-
Cobalt Strike reflective loader 42 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\Windows\System\pAYzJDK.exe cobalt_reflective_dll C:\Windows\System\pAYzJDK.exe cobalt_reflective_dll C:\Windows\System\IIhRzQi.exe cobalt_reflective_dll C:\Windows\System\IIhRzQi.exe cobalt_reflective_dll C:\Windows\System\ZEAoniE.exe cobalt_reflective_dll C:\Windows\System\zGmnCVn.exe cobalt_reflective_dll C:\Windows\System\FsQftVE.exe cobalt_reflective_dll C:\Windows\System\FsQftVE.exe cobalt_reflective_dll C:\Windows\System\fxFRQsL.exe cobalt_reflective_dll C:\Windows\System\BXyBCZK.exe cobalt_reflective_dll C:\Windows\System\BXyBCZK.exe cobalt_reflective_dll C:\Windows\System\fxFRQsL.exe cobalt_reflective_dll C:\Windows\System\qMwzEFA.exe cobalt_reflective_dll C:\Windows\System\qMwzEFA.exe cobalt_reflective_dll C:\Windows\System\yZXJSck.exe cobalt_reflective_dll C:\Windows\System\zGmnCVn.exe cobalt_reflective_dll C:\Windows\System\ZEAoniE.exe cobalt_reflective_dll C:\Windows\System\NVDHZYp.exe cobalt_reflective_dll C:\Windows\System\NVDHZYp.exe cobalt_reflective_dll C:\Windows\System\EbAsAaT.exe cobalt_reflective_dll C:\Windows\System\HunzEUV.exe cobalt_reflective_dll C:\Windows\System\HunzEUV.exe cobalt_reflective_dll C:\Windows\System\GoBqRtY.exe cobalt_reflective_dll C:\Windows\System\GoBqRtY.exe cobalt_reflective_dll C:\Windows\System\TovgAht.exe cobalt_reflective_dll C:\Windows\System\TovgAht.exe cobalt_reflective_dll C:\Windows\System\gMHHZjc.exe cobalt_reflective_dll C:\Windows\System\gMHHZjc.exe cobalt_reflective_dll C:\Windows\System\RXHcIDh.exe cobalt_reflective_dll C:\Windows\System\EbAsAaT.exe cobalt_reflective_dll C:\Windows\System\yZXJSck.exe cobalt_reflective_dll C:\Windows\System\ZOCgJcb.exe cobalt_reflective_dll C:\Windows\System\RXHcIDh.exe cobalt_reflective_dll C:\Windows\System\ZOCgJcb.exe cobalt_reflective_dll C:\Windows\System\bycLEWH.exe cobalt_reflective_dll C:\Windows\System\NQjoeSu.exe cobalt_reflective_dll C:\Windows\System\NQjoeSu.exe cobalt_reflective_dll C:\Windows\System\OTfnuKv.exe cobalt_reflective_dll C:\Windows\System\gLPNGaY.exe cobalt_reflective_dll C:\Windows\System\gLPNGaY.exe cobalt_reflective_dll C:\Windows\System\OTfnuKv.exe cobalt_reflective_dll C:\Windows\System\bycLEWH.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Executes dropped EXE 21 IoCs
Processes:
pAYzJDK.exeIIhRzQi.exeZEAoniE.exezGmnCVn.exeFsQftVE.exefxFRQsL.exeBXyBCZK.exeqMwzEFA.exeyZXJSck.exeNVDHZYp.exeEbAsAaT.exeHunzEUV.exeGoBqRtY.exeTovgAht.exegMHHZjc.exeRXHcIDh.exeZOCgJcb.exebycLEWH.exeNQjoeSu.exegLPNGaY.exeOTfnuKv.exepid process 5044 pAYzJDK.exe 5112 IIhRzQi.exe 1016 ZEAoniE.exe 3480 zGmnCVn.exe 3616 FsQftVE.exe 3604 fxFRQsL.exe 516 BXyBCZK.exe 3236 qMwzEFA.exe 3844 yZXJSck.exe 3848 NVDHZYp.exe 4216 EbAsAaT.exe 3104 HunzEUV.exe 4328 GoBqRtY.exe 528 TovgAht.exe 832 gMHHZjc.exe 932 RXHcIDh.exe 640 ZOCgJcb.exe 1184 bycLEWH.exe 1388 NQjoeSu.exe 1712 gLPNGaY.exe 1868 OTfnuKv.exe -
Processes:
resource yara_rule C:\Windows\System\pAYzJDK.exe upx C:\Windows\System\pAYzJDK.exe upx C:\Windows\System\IIhRzQi.exe upx C:\Windows\System\IIhRzQi.exe upx C:\Windows\System\ZEAoniE.exe upx C:\Windows\System\zGmnCVn.exe upx C:\Windows\System\FsQftVE.exe upx C:\Windows\System\FsQftVE.exe upx C:\Windows\System\fxFRQsL.exe upx C:\Windows\System\BXyBCZK.exe upx C:\Windows\System\BXyBCZK.exe upx C:\Windows\System\fxFRQsL.exe upx C:\Windows\System\qMwzEFA.exe upx C:\Windows\System\qMwzEFA.exe upx C:\Windows\System\yZXJSck.exe upx C:\Windows\System\zGmnCVn.exe upx C:\Windows\System\ZEAoniE.exe upx C:\Windows\System\NVDHZYp.exe upx C:\Windows\System\NVDHZYp.exe upx C:\Windows\System\EbAsAaT.exe upx C:\Windows\System\HunzEUV.exe upx C:\Windows\System\HunzEUV.exe upx C:\Windows\System\GoBqRtY.exe upx C:\Windows\System\GoBqRtY.exe upx C:\Windows\System\TovgAht.exe upx C:\Windows\System\TovgAht.exe upx C:\Windows\System\gMHHZjc.exe upx C:\Windows\System\gMHHZjc.exe upx C:\Windows\System\RXHcIDh.exe upx C:\Windows\System\EbAsAaT.exe upx C:\Windows\System\yZXJSck.exe upx C:\Windows\System\ZOCgJcb.exe upx C:\Windows\System\RXHcIDh.exe upx C:\Windows\System\ZOCgJcb.exe upx C:\Windows\System\bycLEWH.exe upx C:\Windows\System\NQjoeSu.exe upx C:\Windows\System\NQjoeSu.exe upx C:\Windows\System\OTfnuKv.exe upx C:\Windows\System\gLPNGaY.exe upx C:\Windows\System\gLPNGaY.exe upx C:\Windows\System\OTfnuKv.exe upx C:\Windows\System\bycLEWH.exe upx -
JavaScript code in executable 42 IoCs
Processes:
resource yara_rule C:\Windows\System\pAYzJDK.exe js C:\Windows\System\pAYzJDK.exe js C:\Windows\System\IIhRzQi.exe js C:\Windows\System\IIhRzQi.exe js C:\Windows\System\ZEAoniE.exe js C:\Windows\System\zGmnCVn.exe js C:\Windows\System\FsQftVE.exe js C:\Windows\System\FsQftVE.exe js C:\Windows\System\fxFRQsL.exe js C:\Windows\System\BXyBCZK.exe js C:\Windows\System\BXyBCZK.exe js C:\Windows\System\fxFRQsL.exe js C:\Windows\System\qMwzEFA.exe js C:\Windows\System\qMwzEFA.exe js C:\Windows\System\yZXJSck.exe js C:\Windows\System\zGmnCVn.exe js C:\Windows\System\ZEAoniE.exe js C:\Windows\System\NVDHZYp.exe js C:\Windows\System\NVDHZYp.exe js C:\Windows\System\EbAsAaT.exe js C:\Windows\System\HunzEUV.exe js C:\Windows\System\HunzEUV.exe js C:\Windows\System\GoBqRtY.exe js C:\Windows\System\GoBqRtY.exe js C:\Windows\System\TovgAht.exe js C:\Windows\System\TovgAht.exe js C:\Windows\System\gMHHZjc.exe js C:\Windows\System\gMHHZjc.exe js C:\Windows\System\RXHcIDh.exe js C:\Windows\System\EbAsAaT.exe js C:\Windows\System\yZXJSck.exe js C:\Windows\System\ZOCgJcb.exe js C:\Windows\System\RXHcIDh.exe js C:\Windows\System\ZOCgJcb.exe js C:\Windows\System\bycLEWH.exe js C:\Windows\System\NQjoeSu.exe js C:\Windows\System\NQjoeSu.exe js C:\Windows\System\OTfnuKv.exe js C:\Windows\System\gLPNGaY.exe js C:\Windows\System\gLPNGaY.exe js C:\Windows\System\OTfnuKv.exe js C:\Windows\System\bycLEWH.exe js -
Drops file in Windows directory 21 IoCs
Processes:
46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exedescription ioc process File created C:\Windows\System\pAYzJDK.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe File created C:\Windows\System\NVDHZYp.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe File created C:\Windows\System\gMHHZjc.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe File created C:\Windows\System\zGmnCVn.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe File created C:\Windows\System\yZXJSck.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe File created C:\Windows\System\GoBqRtY.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe File created C:\Windows\System\EbAsAaT.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe File created C:\Windows\System\HunzEUV.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe File created C:\Windows\System\NQjoeSu.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe File created C:\Windows\System\gLPNGaY.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe File created C:\Windows\System\IIhRzQi.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe File created C:\Windows\System\ZEAoniE.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe File created C:\Windows\System\BXyBCZK.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe File created C:\Windows\System\qMwzEFA.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe File created C:\Windows\System\ZOCgJcb.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe File created C:\Windows\System\bycLEWH.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe File created C:\Windows\System\OTfnuKv.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe File created C:\Windows\System\FsQftVE.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe File created C:\Windows\System\fxFRQsL.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe File created C:\Windows\System\TovgAht.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe File created C:\Windows\System\RXHcIDh.exe 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exedescription pid process Token: SeLockMemoryPrivilege 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe Token: SeLockMemoryPrivilege 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exedescription pid process target process PID 4756 wrote to memory of 5044 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe pAYzJDK.exe PID 4756 wrote to memory of 5044 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe pAYzJDK.exe PID 4756 wrote to memory of 5112 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe IIhRzQi.exe PID 4756 wrote to memory of 5112 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe IIhRzQi.exe PID 4756 wrote to memory of 1016 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe ZEAoniE.exe PID 4756 wrote to memory of 1016 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe ZEAoniE.exe PID 4756 wrote to memory of 3480 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe zGmnCVn.exe PID 4756 wrote to memory of 3480 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe zGmnCVn.exe PID 4756 wrote to memory of 3616 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe FsQftVE.exe PID 4756 wrote to memory of 3616 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe FsQftVE.exe PID 4756 wrote to memory of 3604 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe fxFRQsL.exe PID 4756 wrote to memory of 3604 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe fxFRQsL.exe PID 4756 wrote to memory of 516 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe BXyBCZK.exe PID 4756 wrote to memory of 516 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe BXyBCZK.exe PID 4756 wrote to memory of 3236 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe qMwzEFA.exe PID 4756 wrote to memory of 3236 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe qMwzEFA.exe PID 4756 wrote to memory of 3844 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe yZXJSck.exe PID 4756 wrote to memory of 3844 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe yZXJSck.exe PID 4756 wrote to memory of 3848 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe NVDHZYp.exe PID 4756 wrote to memory of 3848 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe NVDHZYp.exe PID 4756 wrote to memory of 4216 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe EbAsAaT.exe PID 4756 wrote to memory of 4216 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe EbAsAaT.exe PID 4756 wrote to memory of 3104 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe HunzEUV.exe PID 4756 wrote to memory of 3104 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe HunzEUV.exe PID 4756 wrote to memory of 4328 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe GoBqRtY.exe PID 4756 wrote to memory of 4328 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe GoBqRtY.exe PID 4756 wrote to memory of 528 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe TovgAht.exe PID 4756 wrote to memory of 528 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe TovgAht.exe PID 4756 wrote to memory of 832 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe gMHHZjc.exe PID 4756 wrote to memory of 832 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe gMHHZjc.exe PID 4756 wrote to memory of 932 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe RXHcIDh.exe PID 4756 wrote to memory of 932 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe RXHcIDh.exe PID 4756 wrote to memory of 640 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe ZOCgJcb.exe PID 4756 wrote to memory of 640 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe ZOCgJcb.exe PID 4756 wrote to memory of 1184 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe bycLEWH.exe PID 4756 wrote to memory of 1184 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe bycLEWH.exe PID 4756 wrote to memory of 1388 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe NQjoeSu.exe PID 4756 wrote to memory of 1388 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe NQjoeSu.exe PID 4756 wrote to memory of 1712 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe gLPNGaY.exe PID 4756 wrote to memory of 1712 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe gLPNGaY.exe PID 4756 wrote to memory of 1868 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe OTfnuKv.exe PID 4756 wrote to memory of 1868 4756 46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe OTfnuKv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe"C:\Users\Admin\AppData\Local\Temp\46677a836f102a255f6c73cbb44335abb2dd7dd042263974b6ee641c6bc52ad2.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\pAYzJDK.exeC:\Windows\System\pAYzJDK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IIhRzQi.exeC:\Windows\System\IIhRzQi.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZEAoniE.exeC:\Windows\System\ZEAoniE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zGmnCVn.exeC:\Windows\System\zGmnCVn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FsQftVE.exeC:\Windows\System\FsQftVE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\fxFRQsL.exeC:\Windows\System\fxFRQsL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BXyBCZK.exeC:\Windows\System\BXyBCZK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qMwzEFA.exeC:\Windows\System\qMwzEFA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\yZXJSck.exeC:\Windows\System\yZXJSck.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\NVDHZYp.exeC:\Windows\System\NVDHZYp.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EbAsAaT.exeC:\Windows\System\EbAsAaT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HunzEUV.exeC:\Windows\System\HunzEUV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GoBqRtY.exeC:\Windows\System\GoBqRtY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TovgAht.exeC:\Windows\System\TovgAht.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\gMHHZjc.exeC:\Windows\System\gMHHZjc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RXHcIDh.exeC:\Windows\System\RXHcIDh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZOCgJcb.exeC:\Windows\System\ZOCgJcb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bycLEWH.exeC:\Windows\System\bycLEWH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\NQjoeSu.exeC:\Windows\System\NQjoeSu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\gLPNGaY.exeC:\Windows\System\gLPNGaY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OTfnuKv.exeC:\Windows\System\OTfnuKv.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System\BXyBCZK.exeMD5
019e9bc88bf3d6c943fbee90ebe16482
SHA12e70bce4229e818b2dd62af7dc4c562cab5ab6ea
SHA2568abba266b2ed8b131090c2bb022efa305ce9e74f729a7789a78ffe52aeaa2b00
SHA512382295d8dfd39a1765f79623589a3df577256c82530173cda4509c415c9046e3ba035bdc5192863a5fd56ec2a2711a3b1077b53773588599fe7d8865ff72f95c
-
C:\Windows\System\BXyBCZK.exeMD5
019e9bc88bf3d6c943fbee90ebe16482
SHA12e70bce4229e818b2dd62af7dc4c562cab5ab6ea
SHA2568abba266b2ed8b131090c2bb022efa305ce9e74f729a7789a78ffe52aeaa2b00
SHA512382295d8dfd39a1765f79623589a3df577256c82530173cda4509c415c9046e3ba035bdc5192863a5fd56ec2a2711a3b1077b53773588599fe7d8865ff72f95c
-
C:\Windows\System\EbAsAaT.exeMD5
437d5ff36114779009143797b37b48bb
SHA1749d85919a20b02ce2cb71a65c6156f996a5a35f
SHA256a8882f714486e208ecb652744120064fda389a73b5ee0c67d51c8f5b80b202d0
SHA5120ceb9c3ceeb36fb35dedec15a0a57baa85cb85275adff7a5a36d566ed51bcf47f53f16fe42fd1dbbd54ea169d8ed39dc4c1f0c5a1a5dec2cd4df89f8041224bc
-
C:\Windows\System\EbAsAaT.exeMD5
437d5ff36114779009143797b37b48bb
SHA1749d85919a20b02ce2cb71a65c6156f996a5a35f
SHA256a8882f714486e208ecb652744120064fda389a73b5ee0c67d51c8f5b80b202d0
SHA5120ceb9c3ceeb36fb35dedec15a0a57baa85cb85275adff7a5a36d566ed51bcf47f53f16fe42fd1dbbd54ea169d8ed39dc4c1f0c5a1a5dec2cd4df89f8041224bc
-
C:\Windows\System\FsQftVE.exeMD5
9c1fe5e9f1a967a773740f166fc96789
SHA1de08a0fbf373f2c01302ae4b8f032daf054513e7
SHA256333a9f7e9e3db615f50a7463ead7a37d766fb786f274072bb0026d5b2ad1ac83
SHA5127150e2ce7726b2881358997dc7001c0bf886a9f5be9cca0da8d78918562d0be4c9b7175694dae44b7747e6488647713786742d956f28ba4612e2cd5e1e149762
-
C:\Windows\System\FsQftVE.exeMD5
9c1fe5e9f1a967a773740f166fc96789
SHA1de08a0fbf373f2c01302ae4b8f032daf054513e7
SHA256333a9f7e9e3db615f50a7463ead7a37d766fb786f274072bb0026d5b2ad1ac83
SHA5127150e2ce7726b2881358997dc7001c0bf886a9f5be9cca0da8d78918562d0be4c9b7175694dae44b7747e6488647713786742d956f28ba4612e2cd5e1e149762
-
C:\Windows\System\GoBqRtY.exeMD5
ac2783306f4644da24cc4f63b1b6c24f
SHA1c54b743eb0df5bf1fe14581bc9d892618165c3df
SHA25625d4c88dfe53e3b04df429773befdc4c10854d4bf46dbb40a5177849ebb4c6f0
SHA512594be05c3a7ac03ee5523bef630e93f3c8eec853a4eee6e393a85c0ca4d77f90c7ded84cc3ef7a6f0bbb9c44d1ca27d9df157b3f468f342f2950acc86038217a
-
C:\Windows\System\GoBqRtY.exeMD5
ac2783306f4644da24cc4f63b1b6c24f
SHA1c54b743eb0df5bf1fe14581bc9d892618165c3df
SHA25625d4c88dfe53e3b04df429773befdc4c10854d4bf46dbb40a5177849ebb4c6f0
SHA512594be05c3a7ac03ee5523bef630e93f3c8eec853a4eee6e393a85c0ca4d77f90c7ded84cc3ef7a6f0bbb9c44d1ca27d9df157b3f468f342f2950acc86038217a
-
C:\Windows\System\HunzEUV.exeMD5
b81f953cf5408247a8e3fbd72ecdcdb5
SHA183ac8f9a5ed757ed7b1dddc1e6aaafb5f4480c4c
SHA256b71f44dcdc488e5b941ec62bfafa835cfb130cb73d55cc8d5c64c2f650a9bfa2
SHA512de532afeffc8752cb4398edbac2dffb66d0b4d8bb91cc95019fcd75c2e324289aecdbc401147b20614d2a59dd0e633f97c1ee998dd6bc3b89ea381ffaa8e308c
-
C:\Windows\System\HunzEUV.exeMD5
b81f953cf5408247a8e3fbd72ecdcdb5
SHA183ac8f9a5ed757ed7b1dddc1e6aaafb5f4480c4c
SHA256b71f44dcdc488e5b941ec62bfafa835cfb130cb73d55cc8d5c64c2f650a9bfa2
SHA512de532afeffc8752cb4398edbac2dffb66d0b4d8bb91cc95019fcd75c2e324289aecdbc401147b20614d2a59dd0e633f97c1ee998dd6bc3b89ea381ffaa8e308c
-
C:\Windows\System\IIhRzQi.exeMD5
4ae8d77d029dcf0f48125567d71110f3
SHA1f5c28b01a7268580e6e7f5a88642043edf6110a3
SHA256fe0b670a6a346385eb1a6b92e4ee4049a49e4615f731ae2ba59b182da2042736
SHA5120c27ab519e3fa6cbe504b7c130f28fbad732bf5774c8ec0d4d1cf4be69ba071c72774fe5acd9590057935bf0ec84df98aeba8c7a7c03944081505babc3bbc365
-
C:\Windows\System\IIhRzQi.exeMD5
4ae8d77d029dcf0f48125567d71110f3
SHA1f5c28b01a7268580e6e7f5a88642043edf6110a3
SHA256fe0b670a6a346385eb1a6b92e4ee4049a49e4615f731ae2ba59b182da2042736
SHA5120c27ab519e3fa6cbe504b7c130f28fbad732bf5774c8ec0d4d1cf4be69ba071c72774fe5acd9590057935bf0ec84df98aeba8c7a7c03944081505babc3bbc365
-
C:\Windows\System\NQjoeSu.exeMD5
b0a6d55b5b9c3021ce0fcf0ef3c6572c
SHA1e50d7ccdb7d1f2abba8e45fc9053be2f4618265e
SHA256c5fff90611b1f44302e606ae30661237fa045a070aa9cf8ac14721aea16354ce
SHA512985597a2b446daca8d6ed8c01313f3b3cd6da8e156164ebd3789c21d0753a52b4e377260a1b08643df1e8f0bf3f8d318d5113e8e0fa0ae842d449b6947c5ba3e
-
C:\Windows\System\NQjoeSu.exeMD5
b0a6d55b5b9c3021ce0fcf0ef3c6572c
SHA1e50d7ccdb7d1f2abba8e45fc9053be2f4618265e
SHA256c5fff90611b1f44302e606ae30661237fa045a070aa9cf8ac14721aea16354ce
SHA512985597a2b446daca8d6ed8c01313f3b3cd6da8e156164ebd3789c21d0753a52b4e377260a1b08643df1e8f0bf3f8d318d5113e8e0fa0ae842d449b6947c5ba3e
-
C:\Windows\System\NVDHZYp.exeMD5
8a590fece1aec40bfc13ce58b6e1ed49
SHA1ed8d9072a5675bd985960f0bb031253989dbe271
SHA256cc46844ca8d4721a64317f1a39295dbd2be3f2bb60c94c5d40e8eafb3720c85f
SHA512ab8178017ab9cd3b45f14628a72962c3b288036e8d8357f14a988675630c1af5e9c4d13b952a8063d42c6d30be4c997194d4e790f67ec62db6cdd3fa671d19d6
-
C:\Windows\System\NVDHZYp.exeMD5
8a590fece1aec40bfc13ce58b6e1ed49
SHA1ed8d9072a5675bd985960f0bb031253989dbe271
SHA256cc46844ca8d4721a64317f1a39295dbd2be3f2bb60c94c5d40e8eafb3720c85f
SHA512ab8178017ab9cd3b45f14628a72962c3b288036e8d8357f14a988675630c1af5e9c4d13b952a8063d42c6d30be4c997194d4e790f67ec62db6cdd3fa671d19d6
-
C:\Windows\System\OTfnuKv.exeMD5
61494b4b80e399219435536574708b67
SHA12f526cc22391410160da5fee7a0d477da61c3087
SHA25630627794d9c58304d7be6254d63e27bc310cea4d32f0fe63ff6e94b6e594729c
SHA512c510577d77664830cb7357235860c3c0136012e718519b1f0cfcd199b014dfee0e25f2548823dfecd51f4a4130b676c1314032d6c0f4e296fdecf8d1f33b856f
-
C:\Windows\System\OTfnuKv.exeMD5
61494b4b80e399219435536574708b67
SHA12f526cc22391410160da5fee7a0d477da61c3087
SHA25630627794d9c58304d7be6254d63e27bc310cea4d32f0fe63ff6e94b6e594729c
SHA512c510577d77664830cb7357235860c3c0136012e718519b1f0cfcd199b014dfee0e25f2548823dfecd51f4a4130b676c1314032d6c0f4e296fdecf8d1f33b856f
-
C:\Windows\System\RXHcIDh.exeMD5
b44d67dd0a07d483fc79466a16a87c00
SHA1d15340cef0d94d67ab9f5741d9a82a9bdb09902c
SHA256f6e59bbabb40d536ffe39ededc1f5a538e33e040d4d7d4c2d25db643c8f81337
SHA512f71c5490f6e9f37ec374e402dcb5c5484f6b1437feaea8ba4bafaf202a631cd9e035f836f0e716b788ca411509878b2df8d1aeeb8f4591ce84b68fcd8cce6b45
-
C:\Windows\System\RXHcIDh.exeMD5
b44d67dd0a07d483fc79466a16a87c00
SHA1d15340cef0d94d67ab9f5741d9a82a9bdb09902c
SHA256f6e59bbabb40d536ffe39ededc1f5a538e33e040d4d7d4c2d25db643c8f81337
SHA512f71c5490f6e9f37ec374e402dcb5c5484f6b1437feaea8ba4bafaf202a631cd9e035f836f0e716b788ca411509878b2df8d1aeeb8f4591ce84b68fcd8cce6b45
-
C:\Windows\System\TovgAht.exeMD5
46c3615970bc937b74e13126f732a8cf
SHA1dec1c19bb0afd81df31122f8af30362b30155d64
SHA2566e46d39e8eab2c5b064a685d23c801c355f1528cdd3b17be0215dd5efbd8084d
SHA512d0878ecd35e6fcaa768caad8c04803fffce030d4083f5f522afe2f7113e62a5c89f10d42ebbabbc553907fceb64bf45e404ff8c2953d7bb56bfaeffaea4b65a0
-
C:\Windows\System\TovgAht.exeMD5
46c3615970bc937b74e13126f732a8cf
SHA1dec1c19bb0afd81df31122f8af30362b30155d64
SHA2566e46d39e8eab2c5b064a685d23c801c355f1528cdd3b17be0215dd5efbd8084d
SHA512d0878ecd35e6fcaa768caad8c04803fffce030d4083f5f522afe2f7113e62a5c89f10d42ebbabbc553907fceb64bf45e404ff8c2953d7bb56bfaeffaea4b65a0
-
C:\Windows\System\ZEAoniE.exeMD5
0d1adf7bfba0b55c53368ffaa816fd06
SHA101716fd0e2fa627723d6c375095e2fe866522e1d
SHA2560f9d3d008d06c349dffde5910d2d24855be3cbbde127b7bec3d8d781fd28671d
SHA512d348bade1a4cb4504d1de3958deef166921afe9ea45d07d4ef9698d185557595cbd508a3115bbcc42460e541e31b3e1842acb42b0f60e0dd0f05835d7e2d0194
-
C:\Windows\System\ZEAoniE.exeMD5
0d1adf7bfba0b55c53368ffaa816fd06
SHA101716fd0e2fa627723d6c375095e2fe866522e1d
SHA2560f9d3d008d06c349dffde5910d2d24855be3cbbde127b7bec3d8d781fd28671d
SHA512d348bade1a4cb4504d1de3958deef166921afe9ea45d07d4ef9698d185557595cbd508a3115bbcc42460e541e31b3e1842acb42b0f60e0dd0f05835d7e2d0194
-
C:\Windows\System\ZOCgJcb.exeMD5
6d7d12614ae18cfad5f44b5c2cadca29
SHA1b90d3dfb41a9503828625fb4d4c7f78f78bae1a7
SHA2564ef814acc2851e76885147c6aad1deea67caa33fddd5142405181d53f6ee100c
SHA512b78d72c70fa5d70a918ccb71861899a50858de78c962d685e1764645e5c515adc3f26954e172e964bfb6fe7172908d4d7293a7d1a7dbf73398a1459bd40a54db
-
C:\Windows\System\ZOCgJcb.exeMD5
6d7d12614ae18cfad5f44b5c2cadca29
SHA1b90d3dfb41a9503828625fb4d4c7f78f78bae1a7
SHA2564ef814acc2851e76885147c6aad1deea67caa33fddd5142405181d53f6ee100c
SHA512b78d72c70fa5d70a918ccb71861899a50858de78c962d685e1764645e5c515adc3f26954e172e964bfb6fe7172908d4d7293a7d1a7dbf73398a1459bd40a54db
-
C:\Windows\System\bycLEWH.exeMD5
43f60510d1a5498f877fe74d108a4460
SHA1c4f932020753cb13dd67a12bac4192a5865f60d8
SHA25679c403af731a260a84f3b7e0ddfb412302f0a207189030d0889603668f1dfb09
SHA512ffb64aadb5daa58affababcb298efbe3de970f322501969d9621ffa350a842f3c0fb7ce8d655d887d379bd960ceae61f78eb51fb99cb57a77ecfe0b5c483e8b0
-
C:\Windows\System\bycLEWH.exeMD5
43f60510d1a5498f877fe74d108a4460
SHA1c4f932020753cb13dd67a12bac4192a5865f60d8
SHA25679c403af731a260a84f3b7e0ddfb412302f0a207189030d0889603668f1dfb09
SHA512ffb64aadb5daa58affababcb298efbe3de970f322501969d9621ffa350a842f3c0fb7ce8d655d887d379bd960ceae61f78eb51fb99cb57a77ecfe0b5c483e8b0
-
C:\Windows\System\fxFRQsL.exeMD5
ae9c9fb2ccd41f5cd9a8b7e0646ab1f3
SHA1b5e410f24d5dfb470637f2c9d76d6618907888ed
SHA2567a9655e6b69c99b9746c9613a9775cad123d9519c8200c7c2cf004b4737924c0
SHA512887e725e9993621852c6c586672b95d10f394eb52b21509aaf595af10525e5a72dd60b50bd94e4ea4f7f17cdb98ed5d4256a3781b38647d0fb1adfa823bd4bf1
-
C:\Windows\System\fxFRQsL.exeMD5
ae9c9fb2ccd41f5cd9a8b7e0646ab1f3
SHA1b5e410f24d5dfb470637f2c9d76d6618907888ed
SHA2567a9655e6b69c99b9746c9613a9775cad123d9519c8200c7c2cf004b4737924c0
SHA512887e725e9993621852c6c586672b95d10f394eb52b21509aaf595af10525e5a72dd60b50bd94e4ea4f7f17cdb98ed5d4256a3781b38647d0fb1adfa823bd4bf1
-
C:\Windows\System\gLPNGaY.exeMD5
924549265a8b72aa0a63440429f40646
SHA1aec4df4939b2493ed38535fcbd088f543bc99bd3
SHA2564ee2fec680df0fb6fa49c37b60131ed24b87156aa942dc0c4987d59f8b705a7f
SHA5126c1ef9f2a838a82091b3385925db907730b54ab629c39f482c2f40e09707ba02bf7f8604d88a6520cdbbf98ef94de759ff1f769a0efdf4c9112b79fd5b42d04b
-
C:\Windows\System\gLPNGaY.exeMD5
924549265a8b72aa0a63440429f40646
SHA1aec4df4939b2493ed38535fcbd088f543bc99bd3
SHA2564ee2fec680df0fb6fa49c37b60131ed24b87156aa942dc0c4987d59f8b705a7f
SHA5126c1ef9f2a838a82091b3385925db907730b54ab629c39f482c2f40e09707ba02bf7f8604d88a6520cdbbf98ef94de759ff1f769a0efdf4c9112b79fd5b42d04b
-
C:\Windows\System\gMHHZjc.exeMD5
d8c70ce28ab9938f8d7a346767bb482e
SHA1dfd3d0940fd80ca92b2dba3244458141c0bc57ad
SHA2561665efb4afdb6126f677901bd85a531f611b1b36e7fb7c2e89be26c46a0bfb0f
SHA51209342c947196290ab0c99a53dd5b793c8345ca184400ecea3a74dc5946e7013c8cee682a830e3605f71b639279d72fc4d543fa5024f529479d1cac3423b5722f
-
C:\Windows\System\gMHHZjc.exeMD5
d8c70ce28ab9938f8d7a346767bb482e
SHA1dfd3d0940fd80ca92b2dba3244458141c0bc57ad
SHA2561665efb4afdb6126f677901bd85a531f611b1b36e7fb7c2e89be26c46a0bfb0f
SHA51209342c947196290ab0c99a53dd5b793c8345ca184400ecea3a74dc5946e7013c8cee682a830e3605f71b639279d72fc4d543fa5024f529479d1cac3423b5722f
-
C:\Windows\System\pAYzJDK.exeMD5
24fefb91908bd2689671f6adc176aee8
SHA133e60002bd2980a40f1a1acb809c40844b1d9b82
SHA256d0364b22c595597307d4a320356f1b431b38da69749d25a43eff00d632061cb3
SHA5127413b1a43cda942ddf05cc016d8be8c7ac6c73e34a1828b4f1f6fa85e403757f273bc1aa198e01531827f2e0f1912037586a13d4a5b78498649ae7499ea12e51
-
C:\Windows\System\pAYzJDK.exeMD5
24fefb91908bd2689671f6adc176aee8
SHA133e60002bd2980a40f1a1acb809c40844b1d9b82
SHA256d0364b22c595597307d4a320356f1b431b38da69749d25a43eff00d632061cb3
SHA5127413b1a43cda942ddf05cc016d8be8c7ac6c73e34a1828b4f1f6fa85e403757f273bc1aa198e01531827f2e0f1912037586a13d4a5b78498649ae7499ea12e51
-
C:\Windows\System\qMwzEFA.exeMD5
7b5c0934398971caee8d73702c8eba45
SHA1ac892c1ec2012362ec2b3d8c6dc6973b30d7c650
SHA256572862fa6a31dcc5dacd88a824c0d7fbd6d192ecfd0902f501166902e57f8647
SHA512522b0947a0bf303753ced325ea5ffae9d17604ab51b3b6a7f16f0a6c98d91fc2fdd84f8a40284d40c467190d4db201d7b94d6b484d7fb221d972041afaa1966a
-
C:\Windows\System\qMwzEFA.exeMD5
7b5c0934398971caee8d73702c8eba45
SHA1ac892c1ec2012362ec2b3d8c6dc6973b30d7c650
SHA256572862fa6a31dcc5dacd88a824c0d7fbd6d192ecfd0902f501166902e57f8647
SHA512522b0947a0bf303753ced325ea5ffae9d17604ab51b3b6a7f16f0a6c98d91fc2fdd84f8a40284d40c467190d4db201d7b94d6b484d7fb221d972041afaa1966a
-
C:\Windows\System\yZXJSck.exeMD5
5580993bc1f214f9880cf03a2d5a9806
SHA177c3ae07ff2d093e49d6fbfee3fe19e27957b415
SHA25644a175fcd96c04e9effe7a9c77537958f96849672de688839729f2093ab38e7a
SHA5128e628b02c105b3a5590daac0033a5fe3103eb819a0358bcc36337fe6a88c76babc530fdb8b0a7ed5b2eac68bb1b0c2e2d26e0a5b021f2ddc5369c137719f9950
-
C:\Windows\System\yZXJSck.exeMD5
5580993bc1f214f9880cf03a2d5a9806
SHA177c3ae07ff2d093e49d6fbfee3fe19e27957b415
SHA25644a175fcd96c04e9effe7a9c77537958f96849672de688839729f2093ab38e7a
SHA5128e628b02c105b3a5590daac0033a5fe3103eb819a0358bcc36337fe6a88c76babc530fdb8b0a7ed5b2eac68bb1b0c2e2d26e0a5b021f2ddc5369c137719f9950
-
C:\Windows\System\zGmnCVn.exeMD5
4bb92b88a46dca1836f6e2cb3e27585d
SHA1ff250b3f2546b4ce0d8f45bcacf3b5455b24ee37
SHA256f690ac12e7109d328e129bad990fd93aa4b75ba7ea3314be4219cd9048950ae1
SHA512a4eccee85b2411688136478a6cbe210488229990af8fccfe7aa655e8291b1e572f2363e832f22f907a6cde50ba015cb8a508491fe5d7c9108fc24a3f489e5082
-
C:\Windows\System\zGmnCVn.exeMD5
4bb92b88a46dca1836f6e2cb3e27585d
SHA1ff250b3f2546b4ce0d8f45bcacf3b5455b24ee37
SHA256f690ac12e7109d328e129bad990fd93aa4b75ba7ea3314be4219cd9048950ae1
SHA512a4eccee85b2411688136478a6cbe210488229990af8fccfe7aa655e8291b1e572f2363e832f22f907a6cde50ba015cb8a508491fe5d7c9108fc24a3f489e5082
-
memory/516-17-0x0000000000000000-mapping.dmp
-
memory/528-38-0x0000000000000000-mapping.dmp
-
memory/640-46-0x0000000000000000-mapping.dmp
-
memory/832-42-0x0000000000000000-mapping.dmp
-
memory/932-43-0x0000000000000000-mapping.dmp
-
memory/1016-6-0x0000000000000000-mapping.dmp
-
memory/1184-48-0x0000000000000000-mapping.dmp
-
memory/1388-53-0x0000000000000000-mapping.dmp
-
memory/1712-56-0x0000000000000000-mapping.dmp
-
memory/1868-60-0x0000000000000000-mapping.dmp
-
memory/3104-31-0x0000000000000000-mapping.dmp
-
memory/3236-21-0x0000000000000000-mapping.dmp
-
memory/3480-8-0x0000000000000000-mapping.dmp
-
memory/3604-14-0x0000000000000000-mapping.dmp
-
memory/3616-10-0x0000000000000000-mapping.dmp
-
memory/3844-23-0x0000000000000000-mapping.dmp
-
memory/3848-26-0x0000000000000000-mapping.dmp
-
memory/4216-28-0x0000000000000000-mapping.dmp
-
memory/4328-34-0x0000000000000000-mapping.dmp
-
memory/5044-0-0x0000000000000000-mapping.dmp
-
memory/5112-3-0x0000000000000000-mapping.dmp