Analysis
-
max time kernel
136s -
max time network
137s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
10-11-2020 07:01
Static task
static1
Behavioral task
behavioral1
Sample
b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe
Resource
win10v20201028
General
-
Target
b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe
-
Size
5.2MB
-
MD5
949808e26e1e30587392b8db2a75c628
-
SHA1
817192e4e3272d4bdd67f2405cd069fee40189d0
-
SHA256
b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4
-
SHA512
77a18430b8e772738c6f5271bda3876b0e00593ea4949d1f26063898a3d750003403151bd84b2fcdbce75c6728e755c6253e739da5b8e7985275db53cbf7743e
Malware Config
Signatures
-
Cobalt Strike reflective loader 42 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\Windows\System\LJpdYVv.exe cobalt_reflective_dll C:\Windows\System\LJpdYVv.exe cobalt_reflective_dll C:\Windows\System\cfYypij.exe cobalt_reflective_dll C:\Windows\System\cfYypij.exe cobalt_reflective_dll C:\Windows\System\yZqlRyk.exe cobalt_reflective_dll C:\Windows\System\yZqlRyk.exe cobalt_reflective_dll C:\Windows\System\iznTmTz.exe cobalt_reflective_dll C:\Windows\System\iznTmTz.exe cobalt_reflective_dll C:\Windows\System\kNXzBNz.exe cobalt_reflective_dll C:\Windows\System\kNXzBNz.exe cobalt_reflective_dll C:\Windows\System\rxbtSQL.exe cobalt_reflective_dll C:\Windows\System\rxbtSQL.exe cobalt_reflective_dll C:\Windows\System\rFcEwlh.exe cobalt_reflective_dll C:\Windows\System\rFcEwlh.exe cobalt_reflective_dll C:\Windows\System\zNHhhaN.exe cobalt_reflective_dll C:\Windows\System\zNHhhaN.exe cobalt_reflective_dll C:\Windows\System\etYJRAu.exe cobalt_reflective_dll C:\Windows\System\etYJRAu.exe cobalt_reflective_dll C:\Windows\System\iryHRYW.exe cobalt_reflective_dll C:\Windows\System\iryHRYW.exe cobalt_reflective_dll C:\Windows\System\CfjRpQx.exe cobalt_reflective_dll C:\Windows\System\CfjRpQx.exe cobalt_reflective_dll C:\Windows\System\noDEwqT.exe cobalt_reflective_dll C:\Windows\System\noDEwqT.exe cobalt_reflective_dll C:\Windows\System\LWshgaA.exe cobalt_reflective_dll C:\Windows\System\LWshgaA.exe cobalt_reflective_dll C:\Windows\System\KpZkmEE.exe cobalt_reflective_dll C:\Windows\System\KpZkmEE.exe cobalt_reflective_dll C:\Windows\System\bqehWUE.exe cobalt_reflective_dll C:\Windows\System\bqehWUE.exe cobalt_reflective_dll C:\Windows\System\oAHBnKz.exe cobalt_reflective_dll C:\Windows\System\oAHBnKz.exe cobalt_reflective_dll C:\Windows\System\xwGZjVV.exe cobalt_reflective_dll C:\Windows\System\xwGZjVV.exe cobalt_reflective_dll C:\Windows\System\uMQOpiN.exe cobalt_reflective_dll C:\Windows\System\uMQOpiN.exe cobalt_reflective_dll C:\Windows\System\svXKIIv.exe cobalt_reflective_dll C:\Windows\System\ymLyzDh.exe cobalt_reflective_dll C:\Windows\System\lvrzMJA.exe cobalt_reflective_dll C:\Windows\System\ymLyzDh.exe cobalt_reflective_dll C:\Windows\System\lvrzMJA.exe cobalt_reflective_dll C:\Windows\System\svXKIIv.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Executes dropped EXE 21 IoCs
Processes:
LJpdYVv.execfYypij.exeyZqlRyk.exeiznTmTz.exekNXzBNz.exerxbtSQL.exerFcEwlh.exezNHhhaN.exeetYJRAu.exeiryHRYW.exeCfjRpQx.exenoDEwqT.exeLWshgaA.exeKpZkmEE.exebqehWUE.exeoAHBnKz.exexwGZjVV.exeuMQOpiN.exesvXKIIv.exeymLyzDh.exelvrzMJA.exepid process 2668 LJpdYVv.exe 2836 cfYypij.exe 500 yZqlRyk.exe 8 iznTmTz.exe 756 kNXzBNz.exe 2564 rxbtSQL.exe 1524 rFcEwlh.exe 3124 zNHhhaN.exe 3308 etYJRAu.exe 3704 iryHRYW.exe 3468 CfjRpQx.exe 3824 noDEwqT.exe 2868 LWshgaA.exe 1188 KpZkmEE.exe 2236 bqehWUE.exe 2132 oAHBnKz.exe 1504 xwGZjVV.exe 3768 uMQOpiN.exe 3160 svXKIIv.exe 1968 ymLyzDh.exe 2452 lvrzMJA.exe -
Processes:
resource yara_rule C:\Windows\System\LJpdYVv.exe upx C:\Windows\System\LJpdYVv.exe upx C:\Windows\System\cfYypij.exe upx C:\Windows\System\cfYypij.exe upx C:\Windows\System\yZqlRyk.exe upx C:\Windows\System\yZqlRyk.exe upx C:\Windows\System\iznTmTz.exe upx C:\Windows\System\iznTmTz.exe upx C:\Windows\System\kNXzBNz.exe upx C:\Windows\System\kNXzBNz.exe upx C:\Windows\System\rxbtSQL.exe upx C:\Windows\System\rxbtSQL.exe upx C:\Windows\System\rFcEwlh.exe upx C:\Windows\System\rFcEwlh.exe upx C:\Windows\System\zNHhhaN.exe upx C:\Windows\System\zNHhhaN.exe upx C:\Windows\System\etYJRAu.exe upx C:\Windows\System\etYJRAu.exe upx C:\Windows\System\iryHRYW.exe upx C:\Windows\System\iryHRYW.exe upx C:\Windows\System\CfjRpQx.exe upx C:\Windows\System\CfjRpQx.exe upx C:\Windows\System\noDEwqT.exe upx C:\Windows\System\noDEwqT.exe upx C:\Windows\System\LWshgaA.exe upx C:\Windows\System\LWshgaA.exe upx C:\Windows\System\KpZkmEE.exe upx C:\Windows\System\KpZkmEE.exe upx C:\Windows\System\bqehWUE.exe upx C:\Windows\System\bqehWUE.exe upx C:\Windows\System\oAHBnKz.exe upx C:\Windows\System\oAHBnKz.exe upx C:\Windows\System\xwGZjVV.exe upx C:\Windows\System\xwGZjVV.exe upx C:\Windows\System\uMQOpiN.exe upx C:\Windows\System\uMQOpiN.exe upx C:\Windows\System\svXKIIv.exe upx C:\Windows\System\ymLyzDh.exe upx C:\Windows\System\lvrzMJA.exe upx C:\Windows\System\ymLyzDh.exe upx C:\Windows\System\lvrzMJA.exe upx C:\Windows\System\svXKIIv.exe upx -
JavaScript code in executable 42 IoCs
Processes:
resource yara_rule C:\Windows\System\LJpdYVv.exe js C:\Windows\System\LJpdYVv.exe js C:\Windows\System\cfYypij.exe js C:\Windows\System\cfYypij.exe js C:\Windows\System\yZqlRyk.exe js C:\Windows\System\yZqlRyk.exe js C:\Windows\System\iznTmTz.exe js C:\Windows\System\iznTmTz.exe js C:\Windows\System\kNXzBNz.exe js C:\Windows\System\kNXzBNz.exe js C:\Windows\System\rxbtSQL.exe js C:\Windows\System\rxbtSQL.exe js C:\Windows\System\rFcEwlh.exe js C:\Windows\System\rFcEwlh.exe js C:\Windows\System\zNHhhaN.exe js C:\Windows\System\zNHhhaN.exe js C:\Windows\System\etYJRAu.exe js C:\Windows\System\etYJRAu.exe js C:\Windows\System\iryHRYW.exe js C:\Windows\System\iryHRYW.exe js C:\Windows\System\CfjRpQx.exe js C:\Windows\System\CfjRpQx.exe js C:\Windows\System\noDEwqT.exe js C:\Windows\System\noDEwqT.exe js C:\Windows\System\LWshgaA.exe js C:\Windows\System\LWshgaA.exe js C:\Windows\System\KpZkmEE.exe js C:\Windows\System\KpZkmEE.exe js C:\Windows\System\bqehWUE.exe js C:\Windows\System\bqehWUE.exe js C:\Windows\System\oAHBnKz.exe js C:\Windows\System\oAHBnKz.exe js C:\Windows\System\xwGZjVV.exe js C:\Windows\System\xwGZjVV.exe js C:\Windows\System\uMQOpiN.exe js C:\Windows\System\uMQOpiN.exe js C:\Windows\System\svXKIIv.exe js C:\Windows\System\ymLyzDh.exe js C:\Windows\System\lvrzMJA.exe js C:\Windows\System\ymLyzDh.exe js C:\Windows\System\lvrzMJA.exe js C:\Windows\System\svXKIIv.exe js -
Drops file in Windows directory 21 IoCs
Processes:
b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exedescription ioc process File created C:\Windows\System\cfYypij.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe File created C:\Windows\System\yZqlRyk.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe File created C:\Windows\System\xwGZjVV.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe File created C:\Windows\System\noDEwqT.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe File created C:\Windows\System\oAHBnKz.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe File created C:\Windows\System\svXKIIv.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe File created C:\Windows\System\ymLyzDh.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe File created C:\Windows\System\rFcEwlh.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe File created C:\Windows\System\zNHhhaN.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe File created C:\Windows\System\etYJRAu.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe File created C:\Windows\System\lvrzMJA.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe File created C:\Windows\System\LJpdYVv.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe File created C:\Windows\System\iznTmTz.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe File created C:\Windows\System\LWshgaA.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe File created C:\Windows\System\CfjRpQx.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe File created C:\Windows\System\KpZkmEE.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe File created C:\Windows\System\bqehWUE.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe File created C:\Windows\System\uMQOpiN.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe File created C:\Windows\System\kNXzBNz.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe File created C:\Windows\System\rxbtSQL.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe File created C:\Windows\System\iryHRYW.exe b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exedescription pid process Token: SeLockMemoryPrivilege 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe Token: SeLockMemoryPrivilege 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exedescription pid process target process PID 592 wrote to memory of 2668 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe LJpdYVv.exe PID 592 wrote to memory of 2668 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe LJpdYVv.exe PID 592 wrote to memory of 2836 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe cfYypij.exe PID 592 wrote to memory of 2836 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe cfYypij.exe PID 592 wrote to memory of 500 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe yZqlRyk.exe PID 592 wrote to memory of 500 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe yZqlRyk.exe PID 592 wrote to memory of 8 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe iznTmTz.exe PID 592 wrote to memory of 8 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe iznTmTz.exe PID 592 wrote to memory of 756 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe kNXzBNz.exe PID 592 wrote to memory of 756 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe kNXzBNz.exe PID 592 wrote to memory of 2564 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe rxbtSQL.exe PID 592 wrote to memory of 2564 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe rxbtSQL.exe PID 592 wrote to memory of 1524 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe rFcEwlh.exe PID 592 wrote to memory of 1524 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe rFcEwlh.exe PID 592 wrote to memory of 3124 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe zNHhhaN.exe PID 592 wrote to memory of 3124 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe zNHhhaN.exe PID 592 wrote to memory of 3308 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe etYJRAu.exe PID 592 wrote to memory of 3308 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe etYJRAu.exe PID 592 wrote to memory of 3704 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe iryHRYW.exe PID 592 wrote to memory of 3704 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe iryHRYW.exe PID 592 wrote to memory of 3468 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe CfjRpQx.exe PID 592 wrote to memory of 3468 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe CfjRpQx.exe PID 592 wrote to memory of 3824 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe noDEwqT.exe PID 592 wrote to memory of 3824 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe noDEwqT.exe PID 592 wrote to memory of 2868 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe LWshgaA.exe PID 592 wrote to memory of 2868 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe LWshgaA.exe PID 592 wrote to memory of 1188 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe KpZkmEE.exe PID 592 wrote to memory of 1188 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe KpZkmEE.exe PID 592 wrote to memory of 2236 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe bqehWUE.exe PID 592 wrote to memory of 2236 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe bqehWUE.exe PID 592 wrote to memory of 2132 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe oAHBnKz.exe PID 592 wrote to memory of 2132 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe oAHBnKz.exe PID 592 wrote to memory of 1504 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe xwGZjVV.exe PID 592 wrote to memory of 1504 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe xwGZjVV.exe PID 592 wrote to memory of 3768 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe uMQOpiN.exe PID 592 wrote to memory of 3768 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe uMQOpiN.exe PID 592 wrote to memory of 3160 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe svXKIIv.exe PID 592 wrote to memory of 3160 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe svXKIIv.exe PID 592 wrote to memory of 1968 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe ymLyzDh.exe PID 592 wrote to memory of 1968 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe ymLyzDh.exe PID 592 wrote to memory of 2452 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe lvrzMJA.exe PID 592 wrote to memory of 2452 592 b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe lvrzMJA.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe"C:\Users\Admin\AppData\Local\Temp\b78aebd69f6444370d4d6e4ac99b48355153ea01e88e4c65534cfdceda91fcc4.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\LJpdYVv.exeC:\Windows\System\LJpdYVv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cfYypij.exeC:\Windows\System\cfYypij.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\yZqlRyk.exeC:\Windows\System\yZqlRyk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\iznTmTz.exeC:\Windows\System\iznTmTz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kNXzBNz.exeC:\Windows\System\kNXzBNz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\rxbtSQL.exeC:\Windows\System\rxbtSQL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\rFcEwlh.exeC:\Windows\System\rFcEwlh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zNHhhaN.exeC:\Windows\System\zNHhhaN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\etYJRAu.exeC:\Windows\System\etYJRAu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\iryHRYW.exeC:\Windows\System\iryHRYW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CfjRpQx.exeC:\Windows\System\CfjRpQx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\noDEwqT.exeC:\Windows\System\noDEwqT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\LWshgaA.exeC:\Windows\System\LWshgaA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\KpZkmEE.exeC:\Windows\System\KpZkmEE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bqehWUE.exeC:\Windows\System\bqehWUE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\oAHBnKz.exeC:\Windows\System\oAHBnKz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xwGZjVV.exeC:\Windows\System\xwGZjVV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uMQOpiN.exeC:\Windows\System\uMQOpiN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\svXKIIv.exeC:\Windows\System\svXKIIv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ymLyzDh.exeC:\Windows\System\ymLyzDh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lvrzMJA.exeC:\Windows\System\lvrzMJA.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System\CfjRpQx.exeMD5
727fa8f5300259c5ead545f20498df24
SHA1cee48a4e2cd2d844deedee770e1663ab8736a4af
SHA25639a9c1b92a2a7c07ba888c4821d9ef61f104bcf3f6fe26c45ed644deb6912858
SHA5127879f329652a9cbc9bd0bdacc0deb095c28cf958a3600941e53839c20461a26892a2a0c667a4933cb5c3bbda1642277007d74d71cc72103e6c05bb7a0c7746e0
-
C:\Windows\System\CfjRpQx.exeMD5
727fa8f5300259c5ead545f20498df24
SHA1cee48a4e2cd2d844deedee770e1663ab8736a4af
SHA25639a9c1b92a2a7c07ba888c4821d9ef61f104bcf3f6fe26c45ed644deb6912858
SHA5127879f329652a9cbc9bd0bdacc0deb095c28cf958a3600941e53839c20461a26892a2a0c667a4933cb5c3bbda1642277007d74d71cc72103e6c05bb7a0c7746e0
-
C:\Windows\System\KpZkmEE.exeMD5
c692c52a066d34bb7f208a58e3ab0933
SHA1f720ba59757f313275b39dd7495b457558c942f0
SHA256bf61a53ddbcbeedecaa7aed2263de1b8dec1d1a633e4ff393ea6187d7e196ea8
SHA5122dcb7fe686bcbdcfcfe41e3a7537228affe65e1103894e3dc761b2e904dc47599e8b9ed93d7fa471cf17898c96fe68e4d5f7a106e00799199c40755f7054ff5f
-
C:\Windows\System\KpZkmEE.exeMD5
c692c52a066d34bb7f208a58e3ab0933
SHA1f720ba59757f313275b39dd7495b457558c942f0
SHA256bf61a53ddbcbeedecaa7aed2263de1b8dec1d1a633e4ff393ea6187d7e196ea8
SHA5122dcb7fe686bcbdcfcfe41e3a7537228affe65e1103894e3dc761b2e904dc47599e8b9ed93d7fa471cf17898c96fe68e4d5f7a106e00799199c40755f7054ff5f
-
C:\Windows\System\LJpdYVv.exeMD5
0a31a326cffcb8605d9cab881291c9ad
SHA1bea06e424e30f27d9ed8bcc9f6f257e77c1967de
SHA2562b960b5a7ea227d98efa35161201e7c6a1411ac6b16158a36de3b5d9986f6105
SHA512b430d6f23778280637ea533e8d3b481968d25617c4311212209ccc6f0473d0c6d348c830cf52ac51309b8c4798a46c437349711550853eee6fac5168502e1ac3
-
C:\Windows\System\LJpdYVv.exeMD5
0a31a326cffcb8605d9cab881291c9ad
SHA1bea06e424e30f27d9ed8bcc9f6f257e77c1967de
SHA2562b960b5a7ea227d98efa35161201e7c6a1411ac6b16158a36de3b5d9986f6105
SHA512b430d6f23778280637ea533e8d3b481968d25617c4311212209ccc6f0473d0c6d348c830cf52ac51309b8c4798a46c437349711550853eee6fac5168502e1ac3
-
C:\Windows\System\LWshgaA.exeMD5
d96014a56cea7cc260d12bbd2b87fc84
SHA18edfd0d6469ed869290530a4f0ddb1e450651076
SHA2565f48c216dc4ee13f577a3aecefadb84e773045c450abdac3ad983a6a9b511b6c
SHA512a854b96d231d8aa5778889855a3f26c844e53f1143ea8ffe965b029f60e8e8d203784839db54dfaa688b55cea074e7b351e70e199212de8852b6e890e01ef148
-
C:\Windows\System\LWshgaA.exeMD5
d96014a56cea7cc260d12bbd2b87fc84
SHA18edfd0d6469ed869290530a4f0ddb1e450651076
SHA2565f48c216dc4ee13f577a3aecefadb84e773045c450abdac3ad983a6a9b511b6c
SHA512a854b96d231d8aa5778889855a3f26c844e53f1143ea8ffe965b029f60e8e8d203784839db54dfaa688b55cea074e7b351e70e199212de8852b6e890e01ef148
-
C:\Windows\System\bqehWUE.exeMD5
781195d08d076ff5d3bb473c7fa296fb
SHA11987882f5f8f3994cd2b389cf5ef057d2f9dca9f
SHA25626fd467bbf6f385cf596a28175a46683c269d6620bfa939181c97ddc1a48f90b
SHA512806ba145a3886616ec1f76abaafb2e09bc7f13a6fcf69bf63ddf32e1331bbcbe85eb66baea85265cf62f4bb8012f11aabd9ea73aa6eb9e5e04e92d272a8b47e9
-
C:\Windows\System\bqehWUE.exeMD5
781195d08d076ff5d3bb473c7fa296fb
SHA11987882f5f8f3994cd2b389cf5ef057d2f9dca9f
SHA25626fd467bbf6f385cf596a28175a46683c269d6620bfa939181c97ddc1a48f90b
SHA512806ba145a3886616ec1f76abaafb2e09bc7f13a6fcf69bf63ddf32e1331bbcbe85eb66baea85265cf62f4bb8012f11aabd9ea73aa6eb9e5e04e92d272a8b47e9
-
C:\Windows\System\cfYypij.exeMD5
9f8658ed3696dd89911f74b328eafdc2
SHA1307f26704a6d4575722df94815089d0a056407ab
SHA256303086a293d02f8954aeb43d533578ac0017a82cb79954e45040dcdb97095295
SHA5120ee8e5c83efee86cf7c60ace75b9cc0b2fc5fdf4ce60ac15b47af7c16c9da04f3c5cc3a2b0d3eec39b1f37ebb6e3e9de7d075b50f14ba2b0d9dd0f5a1531219c
-
C:\Windows\System\cfYypij.exeMD5
9f8658ed3696dd89911f74b328eafdc2
SHA1307f26704a6d4575722df94815089d0a056407ab
SHA256303086a293d02f8954aeb43d533578ac0017a82cb79954e45040dcdb97095295
SHA5120ee8e5c83efee86cf7c60ace75b9cc0b2fc5fdf4ce60ac15b47af7c16c9da04f3c5cc3a2b0d3eec39b1f37ebb6e3e9de7d075b50f14ba2b0d9dd0f5a1531219c
-
C:\Windows\System\etYJRAu.exeMD5
8333ce06e8dfa57309ed120bd517df1b
SHA105778b3388d737fa3b5296cb6c766a355f163fe2
SHA2567be4f388363589f7ea9bd62f9ceb4dc931e365f38e0e18f195342dc19e6ce6fe
SHA5129568289b6c4a171844d19b93e087964086f4174874f12bf4ff3779edafcfd89300220ae68c7a4d6ccb49249d34ce58de8669951520beffbc82afdbca82f8a9af
-
C:\Windows\System\etYJRAu.exeMD5
8333ce06e8dfa57309ed120bd517df1b
SHA105778b3388d737fa3b5296cb6c766a355f163fe2
SHA2567be4f388363589f7ea9bd62f9ceb4dc931e365f38e0e18f195342dc19e6ce6fe
SHA5129568289b6c4a171844d19b93e087964086f4174874f12bf4ff3779edafcfd89300220ae68c7a4d6ccb49249d34ce58de8669951520beffbc82afdbca82f8a9af
-
C:\Windows\System\iryHRYW.exeMD5
65387d61db677dcedf61d6429cb97458
SHA1f69363488cddc743df7bb5c2f39ead50af38deaf
SHA256ff61f07ce548fc39b8b6f38706c58e99fcdbea1e7cb1d5d43337dc00935be398
SHA512d299b8e02d918871fb4b91deb22633ea8417257bd6b004ea1e70190df964f85fa3dee0ee5a3c4c89fcd4668f061b6b8c5e47fa6d0573c671b462f7405d169bc6
-
C:\Windows\System\iryHRYW.exeMD5
65387d61db677dcedf61d6429cb97458
SHA1f69363488cddc743df7bb5c2f39ead50af38deaf
SHA256ff61f07ce548fc39b8b6f38706c58e99fcdbea1e7cb1d5d43337dc00935be398
SHA512d299b8e02d918871fb4b91deb22633ea8417257bd6b004ea1e70190df964f85fa3dee0ee5a3c4c89fcd4668f061b6b8c5e47fa6d0573c671b462f7405d169bc6
-
C:\Windows\System\iznTmTz.exeMD5
03f034b4503782f30814b9dca498fd6f
SHA190a7db2e829b70329af7f611d755d6172df326e4
SHA25637ba8c108f9da209496f7c94f44763cf2ef66da4f58700d8a4db0102989cc94b
SHA51225a8fbd58c3a4ca3307196c665b8753f355837e7fc3f633cae676d6ab451751299c6eeb78011e21ee9380b3bce35ae8323e204b127b6e0f99518b79e1a9e64be
-
C:\Windows\System\iznTmTz.exeMD5
03f034b4503782f30814b9dca498fd6f
SHA190a7db2e829b70329af7f611d755d6172df326e4
SHA25637ba8c108f9da209496f7c94f44763cf2ef66da4f58700d8a4db0102989cc94b
SHA51225a8fbd58c3a4ca3307196c665b8753f355837e7fc3f633cae676d6ab451751299c6eeb78011e21ee9380b3bce35ae8323e204b127b6e0f99518b79e1a9e64be
-
C:\Windows\System\kNXzBNz.exeMD5
98d08f2cd5eacb8e0397df9daaf9ad7a
SHA1686335e740c203277d1d437a02a864edd649e6a4
SHA256a9bbd870d6c859178f4217c4470cb1f88d57401475a24149820ccc37dc0a03b7
SHA51241e0543cbf5866cd7e6e6d51eab9f3b0b93ee0a80555760fcb63a042ebf3c0e41ab636ea6e23c033f37191ec55c85178b6b28199887cd964218587fdc0f6bbd1
-
C:\Windows\System\kNXzBNz.exeMD5
98d08f2cd5eacb8e0397df9daaf9ad7a
SHA1686335e740c203277d1d437a02a864edd649e6a4
SHA256a9bbd870d6c859178f4217c4470cb1f88d57401475a24149820ccc37dc0a03b7
SHA51241e0543cbf5866cd7e6e6d51eab9f3b0b93ee0a80555760fcb63a042ebf3c0e41ab636ea6e23c033f37191ec55c85178b6b28199887cd964218587fdc0f6bbd1
-
C:\Windows\System\lvrzMJA.exeMD5
9666b975f72d152982256d0acc3ec0c2
SHA1bfa53911a16572d2f05a17a4264492793f1bbf15
SHA25614969333337598f05ebb4d66a9a532f2d13f6cd9b23f4b86a65f6f4cc5081b17
SHA5123e65a75d5e0d0fe2c538a8dfb11dcada3c59a465e886a256c4e508336391ebbd0737ce0a6810583f9ba96d4f98b82fd6c2cbce76c56221e4e46305c1c760cec1
-
C:\Windows\System\lvrzMJA.exeMD5
9666b975f72d152982256d0acc3ec0c2
SHA1bfa53911a16572d2f05a17a4264492793f1bbf15
SHA25614969333337598f05ebb4d66a9a532f2d13f6cd9b23f4b86a65f6f4cc5081b17
SHA5123e65a75d5e0d0fe2c538a8dfb11dcada3c59a465e886a256c4e508336391ebbd0737ce0a6810583f9ba96d4f98b82fd6c2cbce76c56221e4e46305c1c760cec1
-
C:\Windows\System\noDEwqT.exeMD5
1e5a5f5e8215851a4e581bb54f1f31fe
SHA1e1d4a8e348eaa98f0dcafd4a5fd3d974709f6cdc
SHA2567084b6e252178c02ab7e1ba1119ff53b3356e9311d5c0b7bd32f0c80a4965e69
SHA512b3036a9e10aa8d5bd3a974a61e12db0c02e402dff149fda9c07237fe62477182859d95189e64517289b283ca7d72d5acc384f93a80505e91bf1185252795bb3e
-
C:\Windows\System\noDEwqT.exeMD5
1e5a5f5e8215851a4e581bb54f1f31fe
SHA1e1d4a8e348eaa98f0dcafd4a5fd3d974709f6cdc
SHA2567084b6e252178c02ab7e1ba1119ff53b3356e9311d5c0b7bd32f0c80a4965e69
SHA512b3036a9e10aa8d5bd3a974a61e12db0c02e402dff149fda9c07237fe62477182859d95189e64517289b283ca7d72d5acc384f93a80505e91bf1185252795bb3e
-
C:\Windows\System\oAHBnKz.exeMD5
aeea8d50a10e6295f48942c472f9dfac
SHA1a2a5810dd98b4d0189a688885717123f552791b7
SHA256706f50645ac9edb5ede66e39bc3c89f28172b2318b9b7e01e032f9b257cf3008
SHA512145f31eaeea9d69b5be72517bcd1e49434d3bd000a04be14d8d9352be5c46b1389ed766f70966b6843bc22a03407bcccb21605f5a54c89e17a7eaa8a17cc1539
-
C:\Windows\System\oAHBnKz.exeMD5
aeea8d50a10e6295f48942c472f9dfac
SHA1a2a5810dd98b4d0189a688885717123f552791b7
SHA256706f50645ac9edb5ede66e39bc3c89f28172b2318b9b7e01e032f9b257cf3008
SHA512145f31eaeea9d69b5be72517bcd1e49434d3bd000a04be14d8d9352be5c46b1389ed766f70966b6843bc22a03407bcccb21605f5a54c89e17a7eaa8a17cc1539
-
C:\Windows\System\rFcEwlh.exeMD5
62fc37cb8ae3a8eccdf973f297a7607d
SHA11672abaec2a640991a6be3971a90474c817fb7ab
SHA25625004a211f17f1c787015d2cebaba1b687124348916eeebb2bab16b91b256a38
SHA512a2acf442e77fc846914b87abc5c0ec4116402d8a6c26d1bf472846cbce8b1513c0d5542b11c2d7eb88da99619754381c08a1d5d1830200606b5415a26e95f6c8
-
C:\Windows\System\rFcEwlh.exeMD5
62fc37cb8ae3a8eccdf973f297a7607d
SHA11672abaec2a640991a6be3971a90474c817fb7ab
SHA25625004a211f17f1c787015d2cebaba1b687124348916eeebb2bab16b91b256a38
SHA512a2acf442e77fc846914b87abc5c0ec4116402d8a6c26d1bf472846cbce8b1513c0d5542b11c2d7eb88da99619754381c08a1d5d1830200606b5415a26e95f6c8
-
C:\Windows\System\rxbtSQL.exeMD5
20012f3549a56d43879eb33f2fc83e89
SHA19ceb018b628e440d40020cca2370bffc2605fbca
SHA25652004f07600a7ecacd367a466a03eea85f26a4e1883a8ebf975ee32564f845cc
SHA512529f8f5a52a28c772526f4200cc4f2600aca18b35648c128b4744e9aa0a95fb1284918275061eed475430e4d60ae57c108205ce6c36f45c4f6d510b12df98afe
-
C:\Windows\System\rxbtSQL.exeMD5
20012f3549a56d43879eb33f2fc83e89
SHA19ceb018b628e440d40020cca2370bffc2605fbca
SHA25652004f07600a7ecacd367a466a03eea85f26a4e1883a8ebf975ee32564f845cc
SHA512529f8f5a52a28c772526f4200cc4f2600aca18b35648c128b4744e9aa0a95fb1284918275061eed475430e4d60ae57c108205ce6c36f45c4f6d510b12df98afe
-
C:\Windows\System\svXKIIv.exeMD5
1104b3a276f09522bf712b610e10741a
SHA164cfeeacec4d01b0cb9e65f0ea56e60f5681286d
SHA25642e228a4a45efd2d91642b9fb7d1cf0d4be2aa1f1c164bceb84f7fee81b774d1
SHA512eb32c227e96f5cb7a27ce5d50240e4ccb41fe34e8c38edb1873d3079091ac5277853444b2c5131cc3b4362a7605f08d068608ee59f1cbc2dfd12945b87aea5a1
-
C:\Windows\System\svXKIIv.exeMD5
1104b3a276f09522bf712b610e10741a
SHA164cfeeacec4d01b0cb9e65f0ea56e60f5681286d
SHA25642e228a4a45efd2d91642b9fb7d1cf0d4be2aa1f1c164bceb84f7fee81b774d1
SHA512eb32c227e96f5cb7a27ce5d50240e4ccb41fe34e8c38edb1873d3079091ac5277853444b2c5131cc3b4362a7605f08d068608ee59f1cbc2dfd12945b87aea5a1
-
C:\Windows\System\uMQOpiN.exeMD5
9fe33575a66a40a87728d288dc8c5385
SHA12697b5cc58dbbe9f071db72171184474ba83294a
SHA25609dd64367a31484f0c1dfa8a70b9248f930713115ed7b0f0e19fbb391bb6f2ee
SHA51256cedfec1c0b7e3ba546b45c1dfdc910efc4380a6e92c41109e65f1c465b9657d384b51acd8ab09edbfc38d48725bd29d26e55461530122c76e94f748543e256
-
C:\Windows\System\uMQOpiN.exeMD5
9fe33575a66a40a87728d288dc8c5385
SHA12697b5cc58dbbe9f071db72171184474ba83294a
SHA25609dd64367a31484f0c1dfa8a70b9248f930713115ed7b0f0e19fbb391bb6f2ee
SHA51256cedfec1c0b7e3ba546b45c1dfdc910efc4380a6e92c41109e65f1c465b9657d384b51acd8ab09edbfc38d48725bd29d26e55461530122c76e94f748543e256
-
C:\Windows\System\xwGZjVV.exeMD5
04b9ae1468069d23e248a8fa6da9e1b0
SHA1abd9f637a84dd2a54fd799398007ceed9a929fba
SHA256651feaa75278ca6963c805017e01f03520378f82ea67a4eb2980f230a7a294e1
SHA5129df682c713544eed3f8f49d66ff4494c24e488af5669d110b65c154bb59849d3ac972a7e55469dd119fc65075bde2797c4a86c1a0e6e6041986300e3e4721cd6
-
C:\Windows\System\xwGZjVV.exeMD5
04b9ae1468069d23e248a8fa6da9e1b0
SHA1abd9f637a84dd2a54fd799398007ceed9a929fba
SHA256651feaa75278ca6963c805017e01f03520378f82ea67a4eb2980f230a7a294e1
SHA5129df682c713544eed3f8f49d66ff4494c24e488af5669d110b65c154bb59849d3ac972a7e55469dd119fc65075bde2797c4a86c1a0e6e6041986300e3e4721cd6
-
C:\Windows\System\yZqlRyk.exeMD5
2bb6be6b236b6b450e02c3b92639a6c5
SHA1ea86ce673ca5844d0e396353380f7bf04d8fb8b3
SHA25640d6b2f3c7cceee36e7968f707af1a83e8fea6acec3f30d6aa4a6ab2680636b1
SHA51247041a0fb2b80a4f976af23ff24b722a01461ceb18d9035c7e4c2366e297ce903586f6bb921c5b4173810e9c3ecf9d7cdec95ed219c4e6b038f2520d0756da53
-
C:\Windows\System\yZqlRyk.exeMD5
2bb6be6b236b6b450e02c3b92639a6c5
SHA1ea86ce673ca5844d0e396353380f7bf04d8fb8b3
SHA25640d6b2f3c7cceee36e7968f707af1a83e8fea6acec3f30d6aa4a6ab2680636b1
SHA51247041a0fb2b80a4f976af23ff24b722a01461ceb18d9035c7e4c2366e297ce903586f6bb921c5b4173810e9c3ecf9d7cdec95ed219c4e6b038f2520d0756da53
-
C:\Windows\System\ymLyzDh.exeMD5
db1fce3590bc62c8647614c8361cc065
SHA1293024af1a77379a026f38286812afdf9a843f94
SHA256f19c30272704286fd8763f8145affa7f0a3ead285701846670f14a6252e3f25e
SHA5126c3445fb05b43c33f36c911e9cb2e85d7fa1a8a17e42c18a60d475bbbaea6c0ae010e94de3ee0ce44224a95269eb13e15ed643d2f8d4634130cbc2a3df34a192
-
C:\Windows\System\ymLyzDh.exeMD5
db1fce3590bc62c8647614c8361cc065
SHA1293024af1a77379a026f38286812afdf9a843f94
SHA256f19c30272704286fd8763f8145affa7f0a3ead285701846670f14a6252e3f25e
SHA5126c3445fb05b43c33f36c911e9cb2e85d7fa1a8a17e42c18a60d475bbbaea6c0ae010e94de3ee0ce44224a95269eb13e15ed643d2f8d4634130cbc2a3df34a192
-
C:\Windows\System\zNHhhaN.exeMD5
7ff773935090e6afd0d20a063c8a499b
SHA157bebaa463a6023e654ce52135cc5c0d39a485d5
SHA2567c841b548ead5d2f08d022408eacaa0fa57f494b919b888094ccb734944926bc
SHA51256dab45fe86435abd3194ac9859a7384494f83c6aa65e1f0c39574acbc103e6c315cf9f792b89760f9f37ede11deadf112e69d6f6f7d9883a288e1ecdb9dc2d6
-
C:\Windows\System\zNHhhaN.exeMD5
7ff773935090e6afd0d20a063c8a499b
SHA157bebaa463a6023e654ce52135cc5c0d39a485d5
SHA2567c841b548ead5d2f08d022408eacaa0fa57f494b919b888094ccb734944926bc
SHA51256dab45fe86435abd3194ac9859a7384494f83c6aa65e1f0c39574acbc103e6c315cf9f792b89760f9f37ede11deadf112e69d6f6f7d9883a288e1ecdb9dc2d6
-
memory/8-9-0x0000000000000000-mapping.dmp
-
memory/500-6-0x0000000000000000-mapping.dmp
-
memory/756-12-0x0000000000000000-mapping.dmp
-
memory/1188-39-0x0000000000000000-mapping.dmp
-
memory/1504-48-0x0000000000000000-mapping.dmp
-
memory/1524-18-0x0000000000000000-mapping.dmp
-
memory/1968-56-0x0000000000000000-mapping.dmp
-
memory/2132-44-0x0000000000000000-mapping.dmp
-
memory/2236-42-0x0000000000000000-mapping.dmp
-
memory/2452-59-0x0000000000000000-mapping.dmp
-
memory/2564-15-0x0000000000000000-mapping.dmp
-
memory/2668-0-0x0000000000000000-mapping.dmp
-
memory/2836-3-0x0000000000000000-mapping.dmp
-
memory/2868-36-0x0000000000000000-mapping.dmp
-
memory/3124-20-0x0000000000000000-mapping.dmp
-
memory/3160-54-0x0000000000000000-mapping.dmp
-
memory/3308-23-0x0000000000000000-mapping.dmp
-
memory/3468-30-0x0000000000000000-mapping.dmp
-
memory/3704-27-0x0000000000000000-mapping.dmp
-
memory/3768-51-0x0000000000000000-mapping.dmp
-
memory/3824-33-0x0000000000000000-mapping.dmp