Overview
overview
10Static
static
8ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
1ฺฺฺ�...�ฺ1m
windows10_x64
8ฺฺฺ�...�ฺ1m
windows10_x64
3ฺฺฺ�...�ฺ1m
windows10_x64
1ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
8ฺฺฺ�...�ฺ1m
windows10_x64
1ฺฺฺ�...�ฺ1m
windows10_x64
1ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
3ฺฺฺ�...�ฺ1m
windows10_x64
1ฺฺฺ�...�ฺ1m
windows10_x64
3ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
8ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
1ฺฺฺ�...�ฺ1m
windows10_x64
1ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
10ฺฺฺ�...�ฺ1m
windows10_x64
1ฺฺฺ�...�ฺ1m
windows10_x64
3Resubmissions
18-11-2020 14:18
201118-dj27sn3f52 1018-11-2020 13:42
201118-1arz86e7w6 1018-11-2020 13:38
201118-n8jh228ctn 10Analysis
-
max time kernel
30s -
max time network
75s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
18-11-2020 13:38
Static task
static1
Behavioral task
behavioral1
Sample
2019-09-02_22-41-10.bin.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
31.bin.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
3DMark 11 Advanced Edition.bin.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Archive.zip__ccacaxs2tbz2t6ob3e.bin.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
CVE-2018-15982_PoC.swf
Resource
win10v20201028
Behavioral task
behavioral6
Sample
DiskInternals_Uneraser_v5_keygen.bin.exe
Resource
win10v20201028
Behavioral task
behavioral7
Sample
ForceOp 2.8.7 - By RaiSence.bin.exe
Resource
win10v20201028
Behavioral task
behavioral8
Sample
HYDRA.bin.exe
Resource
win10v20201028
Behavioral task
behavioral9
Sample
Keygen.bin.exe
Resource
win10v20201028
Behavioral task
behavioral10
Sample
LtHv0O2KZDK4M637.bin.exe
Resource
win10v20201028
Behavioral task
behavioral11
Sample
OnlineInstaller.bin.exe
Resource
win10v20201028
Behavioral task
behavioral12
Sample
Remouse.Micro.Micro.v3.5.3.serial.maker.by.aaocg.bin.exe
Resource
win10v20201028
Behavioral task
behavioral13
Sample
Treasure.Vault.3D.Screensaver.keygen.by.Paradox.bin.exe
Resource
win10v20201028
Behavioral task
behavioral14
Sample
VyprVPN.exe
Resource
win10v20201028
Behavioral task
behavioral15
Sample
WSHSetup[1].bin.exe
Resource
win10v20201028
Behavioral task
behavioral16
Sample
api.exe
Resource
win10v20201028
Behavioral task
behavioral17
Sample
efd97b1038e063779fb32a3ab35adc481679a5c6c8e3f4f69c44987ff08b6ea4.js
Resource
win10v20201028
Behavioral task
behavioral18
Sample
good.bin.exe
Resource
win10v20201028
Behavioral task
behavioral19
Sample
infected dot net installer.bin.exe
Resource
win10v20201028
Behavioral task
behavioral20
Sample
update.bin.exe
Resource
win10v20201028
Behavioral task
behavioral21
Sample
vir1.xls
Resource
win10v20201028
Behavioral task
behavioral22
Sample
xNet.dll
Resource
win10v20201028
Behavioral task
behavioral23
Sample
1.bin.exe
Resource
win10v20201028
Behavioral task
behavioral24
Sample
VPN/VyprVPN.exe
Resource
win10v20201028
Behavioral task
behavioral25
Sample
VPN/xNet.dll
Resource
win10v20201028
Behavioral task
behavioral26
Sample
WSHSetup[1].bin.exe
Resource
win10v20201028
General
Malware Config
Extracted
formbook
4.0
http://www.worstig.com/w9z/
crazzysex.com
hanferd.com
gteesrd.com
bayfrontbabyplace.com
jicuiquan.net
relationshiplink.net
ohchacyberphoto.com
kauegimenes.com
powerful-seldom.com
ketotoken.com
make-money-online-success.com
redgoldcollection.com
hannan-football.com
hamptondc.com
vllii.com
aa8520.com
platform35markethall.com
larozeimmo.com
oligopoly.net
llhak.info
fisioservice.com
tesla-magnumopus.com
cocodrilodigital.com
pinegrovesg.com
traveladventureswithme.com
hebitaixin.com
golphysi.com
gayjeans.com
quickhire.expert
randomviews1.com
eatatnobu.com
topmabati.com
mediaupside.com
spillerakademi.com
thebowtie.store
sensomaticloadcell.com
turismodemadrid.net
yuhe89.com
wernerkrug.com
cdpogo.net
dannynhois.com
realestatestructureddata.com
matewhereareyou.net
laimeibei.ltd
sw328.com
lmwworks.net
xtremefish.com
tonerias.com
dsooneclinicianexpert.com
281clara.com
smmcommunity.net
dreamneeds.info
twocraft.com
yasasiite.salon
advk8qi.top
drabist.com
europartnersplus.com
saltbgone.com
teslaoceanic.info
bestmedicationstore.com
buynewcartab.live
prospect.money
viebrocks.com
transportationhappy.com
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
CoreEntity .NET Packer 1 IoCs
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
Processes:
resource yara_rule behavioral2/memory/3576-88-0x0000000005650000-0x0000000005652000-memory.dmp coreentity -
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\8.exe family_agenttesla C:\Users\Admin\AppData\Roaming\8.exe family_agenttesla -
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\6.exe cryptone C:\Users\Admin\AppData\Roaming\6.exe cryptone -
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3756-13-0x000000000041E2D0-mapping.dmp formbook behavioral2/memory/3756-12-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral2/memory/3984-52-0x0000000000000000-mapping.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral2/memory/3576-89-0x0000000008620000-0x0000000008673000-memory.dmp rezer0 -
Executes dropped EXE 16 IoCs
Processes:
2.exe3.exe2.exe4.exe5.exe6.exe7.exe8.exe9.exe10.exe11.exe12.exe13.exe14.exe15.exe16.exepid process 1924 2.exe 2896 3.exe 3756 2.exe 1308 4.exe 3696 5.exe 2224 6.exe 1200 7.exe 4000 8.exe 3576 9.exe 1644 10.exe 732 11.exe 992 12.exe 3992 13.exe 3560 14.exe 3968 15.exe 192 16.exe -
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
11.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 11.exe -
Checks QEMU agent file 2 TTPs 1 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
Processes:
3.exedescription ioc process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe 3.exe -
Drops startup file 1 IoCs
Processes:
16.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\16.exe 16.exe -
Loads dropped DLL 1 IoCs
Processes:
3.exepid process 3964 3.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral2/memory/4000-73-0x0000000001130000-0x000000000113F000-memory.dmp agile_net -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
3.exe16.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Dokumen4 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Dibromob\\PRECONCE.vbs" 3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\16.exe = "C:\\Windows\\System32\\16.exe" 16.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
11.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 11.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 11.exe -
Drops file in System32 directory 1 IoCs
Processes:
16.exedescription ioc process File created C:\Windows\System32\16.exe 16.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
3.exepid process 2896 3.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
2.exe2.exe3.exedescription pid process target process PID 1924 set thread context of 3756 1924 2.exe 2.exe PID 3756 set thread context of 1680 3756 2.exe Explorer.EXE PID 2896 set thread context of 3964 2896 3.exe 3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
2.exe2.exewlanext.exe8.exe16.exepid process 1924 2.exe 1924 2.exe 3756 2.exe 3756 2.exe 3756 2.exe 3756 2.exe 3984 wlanext.exe 3984 wlanext.exe 4000 8.exe 3984 wlanext.exe 3984 wlanext.exe 192 16.exe 192 16.exe 192 16.exe 192 16.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
2.exe2.exewlanext.exe3.exepid process 1924 2.exe 3756 2.exe 3756 2.exe 3756 2.exe 3984 wlanext.exe 2896 3.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
Processes:
2.exewlanext.exe5.exe8.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 3756 2.exe Token: SeDebugPrivilege 3984 wlanext.exe Token: SeDebugPrivilege 3696 5.exe Token: SeDebugPrivilege 4000 8.exe Token: SeShutdownPrivilege 1680 Explorer.EXE Token: SeCreatePagefilePrivilege 1680 Explorer.EXE Token: SeShutdownPrivilege 1680 Explorer.EXE Token: SeCreatePagefilePrivilege 1680 Explorer.EXE Token: SeShutdownPrivilege 1680 Explorer.EXE Token: SeCreatePagefilePrivilege 1680 Explorer.EXE Token: SeShutdownPrivilege 1680 Explorer.EXE Token: SeCreatePagefilePrivilege 1680 Explorer.EXE Token: SeShutdownPrivilege 1680 Explorer.EXE Token: SeCreatePagefilePrivilege 1680 Explorer.EXE Token: SeShutdownPrivilege 1680 Explorer.EXE Token: SeCreatePagefilePrivilege 1680 Explorer.EXE Token: SeShutdownPrivilege 1680 Explorer.EXE Token: SeCreatePagefilePrivilege 1680 Explorer.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
3.exe7.exe5.exe13.exe15.exepid process 2896 3.exe 1200 7.exe 3696 5.exe 3992 13.exe 3968 15.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
31.bin.execmd.exe2.exeExplorer.EXEwlanext.exe8.exe3.exedescription pid process target process PID 2432 wrote to memory of 2128 2432 31.bin.exe cmd.exe PID 2432 wrote to memory of 2128 2432 31.bin.exe cmd.exe PID 2128 wrote to memory of 212 2128 cmd.exe javaw.exe PID 2128 wrote to memory of 212 2128 cmd.exe javaw.exe PID 2128 wrote to memory of 1924 2128 cmd.exe 2.exe PID 2128 wrote to memory of 1924 2128 cmd.exe 2.exe PID 2128 wrote to memory of 1924 2128 cmd.exe 2.exe PID 2128 wrote to memory of 2896 2128 cmd.exe 3.exe PID 2128 wrote to memory of 2896 2128 cmd.exe 3.exe PID 2128 wrote to memory of 2896 2128 cmd.exe 3.exe PID 1924 wrote to memory of 3756 1924 2.exe 2.exe PID 1924 wrote to memory of 3756 1924 2.exe 2.exe PID 1924 wrote to memory of 3756 1924 2.exe 2.exe PID 2128 wrote to memory of 1308 2128 cmd.exe 4.exe PID 2128 wrote to memory of 1308 2128 cmd.exe 4.exe PID 2128 wrote to memory of 1308 2128 cmd.exe 4.exe PID 2128 wrote to memory of 3696 2128 cmd.exe 5.exe PID 2128 wrote to memory of 3696 2128 cmd.exe 5.exe PID 2128 wrote to memory of 3696 2128 cmd.exe 5.exe PID 2128 wrote to memory of 2224 2128 cmd.exe 6.exe PID 2128 wrote to memory of 2224 2128 cmd.exe 6.exe PID 2128 wrote to memory of 2224 2128 cmd.exe 6.exe PID 2128 wrote to memory of 1200 2128 cmd.exe 7.exe PID 2128 wrote to memory of 1200 2128 cmd.exe 7.exe PID 2128 wrote to memory of 1200 2128 cmd.exe 7.exe PID 1680 wrote to memory of 3984 1680 Explorer.EXE wlanext.exe PID 1680 wrote to memory of 3984 1680 Explorer.EXE wlanext.exe PID 1680 wrote to memory of 3984 1680 Explorer.EXE wlanext.exe PID 2128 wrote to memory of 4000 2128 cmd.exe 8.exe PID 2128 wrote to memory of 4000 2128 cmd.exe 8.exe PID 2128 wrote to memory of 4000 2128 cmd.exe 8.exe PID 2128 wrote to memory of 3576 2128 cmd.exe 9.exe PID 2128 wrote to memory of 3576 2128 cmd.exe 9.exe PID 2128 wrote to memory of 3576 2128 cmd.exe 9.exe PID 2128 wrote to memory of 1644 2128 cmd.exe 10.exe PID 2128 wrote to memory of 1644 2128 cmd.exe 10.exe PID 2128 wrote to memory of 1644 2128 cmd.exe 10.exe PID 2128 wrote to memory of 732 2128 cmd.exe 11.exe PID 2128 wrote to memory of 732 2128 cmd.exe 11.exe PID 2128 wrote to memory of 732 2128 cmd.exe 11.exe PID 3984 wrote to memory of 1520 3984 wlanext.exe cmd.exe PID 3984 wrote to memory of 1520 3984 wlanext.exe cmd.exe PID 3984 wrote to memory of 1520 3984 wlanext.exe cmd.exe PID 2128 wrote to memory of 992 2128 cmd.exe 12.exe PID 2128 wrote to memory of 992 2128 cmd.exe 12.exe PID 2128 wrote to memory of 992 2128 cmd.exe 12.exe PID 2128 wrote to memory of 3992 2128 cmd.exe 13.exe PID 2128 wrote to memory of 3992 2128 cmd.exe 13.exe PID 2128 wrote to memory of 3992 2128 cmd.exe 13.exe PID 2128 wrote to memory of 3560 2128 cmd.exe 14.exe PID 2128 wrote to memory of 3560 2128 cmd.exe 14.exe PID 2128 wrote to memory of 3560 2128 cmd.exe 14.exe PID 2128 wrote to memory of 3968 2128 cmd.exe 15.exe PID 2128 wrote to memory of 3968 2128 cmd.exe 15.exe PID 2128 wrote to memory of 3968 2128 cmd.exe 15.exe PID 4000 wrote to memory of 3340 4000 8.exe cmd.exe PID 4000 wrote to memory of 3340 4000 8.exe cmd.exe PID 4000 wrote to memory of 3340 4000 8.exe cmd.exe PID 2896 wrote to memory of 3964 2896 3.exe 3.exe PID 2896 wrote to memory of 3964 2896 3.exe 3.exe PID 2896 wrote to memory of 3964 2896 3.exe 3.exe PID 2896 wrote to memory of 3964 2896 3.exe 3.exe PID 2128 wrote to memory of 192 2128 cmd.exe 16.exe PID 2128 wrote to memory of 192 2128 cmd.exe 16.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\31.bin.exe"C:\Users\Admin\AppData\Local\Temp\31.bin.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B963.tmp\B983.tmp\B984.bat C:\Users\Admin\AppData\Local\Temp\31.bin.exe"3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\1.jar"4⤵PID:212
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3756 -
C:\Users\Admin\AppData\Roaming\3.exeC:\Users\Admin\AppData\Roaming\3.exe4⤵
- Executes dropped EXE
- Checks QEMU agent file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Roaming\3.exeC:\Users\Admin\AppData\Roaming\3.exe5⤵
- Loads dropped DLL
PID:3964 -
C:\Users\Admin\AppData\Roaming\4.exeC:\Users\Admin\AppData\Roaming\4.exe4⤵
- Executes dropped EXE
PID:1308 -
C:\Users\Admin\AppData\Roaming\5.exeC:\Users\Admin\AppData\Roaming\5.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3696 -
C:\Users\Admin\AppData\Roaming\6.exeC:\Users\Admin\AppData\Roaming\6.exe4⤵
- Executes dropped EXE
PID:2224 -
C:\Users\Admin\AppData\Roaming\7.exeC:\Users\Admin\AppData\Roaming\7.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1200 -
C:\Users\Admin\AppData\Roaming\8.exeC:\Users\Admin\AppData\Roaming\8.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v feeed /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\feeed.exe"5⤵PID:3340
-
C:\Users\Admin\AppData\Roaming\9.exeC:\Users\Admin\AppData\Roaming\9.exe4⤵
- Executes dropped EXE
PID:3576 -
C:\Users\Admin\AppData\Roaming\10.exeC:\Users\Admin\AppData\Roaming\10.exe4⤵
- Executes dropped EXE
PID:1644 -
C:\Users\Admin\AppData\Roaming\11.exeC:\Users\Admin\AppData\Roaming\11.exe4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Maps connected drives based on registry
PID:732 -
C:\Users\Admin\AppData\Roaming\12.exeC:\Users\Admin\AppData\Roaming\12.exe4⤵
- Executes dropped EXE
PID:992 -
C:\Users\Admin\AppData\Roaming\13.exeC:\Users\Admin\AppData\Roaming\13.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3992 -
C:\Users\Admin\AppData\Roaming\14.exeC:\Users\Admin\AppData\Roaming\14.exe4⤵
- Executes dropped EXE
PID:3560 -
C:\Users\Admin\AppData\Roaming\15.exeC:\Users\Admin\AppData\Roaming\15.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3968 -
C:\Users\Admin\AppData\Roaming\16.exeC:\Users\Admin\AppData\Roaming\16.exe4⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:192 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:2220
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:3592
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Roaming\2.exe"3⤵PID:1520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
cf04c482d91c7174616fb8e83288065a
SHA16444eb10ec9092826d712c1efad73e74c2adae14
SHA2567b01d36ac9a77abfa6a0ddbf27d630effae555aac9ae75b051c6eedaf18d1dcf
SHA5123eca1e17e698c427bc916465526f61caee356d7586836b022f573c33a6533ce4b4b0f3fbd05cc2b7b44568e814121854fdf82480757f02d925e293f7d92a2af6
-
MD5
cf04c482d91c7174616fb8e83288065a
SHA16444eb10ec9092826d712c1efad73e74c2adae14
SHA2567b01d36ac9a77abfa6a0ddbf27d630effae555aac9ae75b051c6eedaf18d1dcf
SHA5123eca1e17e698c427bc916465526f61caee356d7586836b022f573c33a6533ce4b4b0f3fbd05cc2b7b44568e814121854fdf82480757f02d925e293f7d92a2af6
-
MD5
dea5598aaf3e9dcc3073ba73d972ab17
SHA151da8356e81c5acff3c876dffbf52195fe87d97f
SHA2568ec9516ac0a765c28adfe04c132619170e986df07b1ea541426be124fb7cfd2c
SHA512a6c674ba3d510120a1d163be7e7638f616eedb15af5653b0952e63b7fd4c2672fafc9638ab7795e76b7f07d995196437d6c35e5b8814e9ad866ea903f620e81e
-
MD5
dea5598aaf3e9dcc3073ba73d972ab17
SHA151da8356e81c5acff3c876dffbf52195fe87d97f
SHA2568ec9516ac0a765c28adfe04c132619170e986df07b1ea541426be124fb7cfd2c
SHA512a6c674ba3d510120a1d163be7e7638f616eedb15af5653b0952e63b7fd4c2672fafc9638ab7795e76b7f07d995196437d6c35e5b8814e9ad866ea903f620e81e