Analysis
-
max time kernel
97s -
max time network
128s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
12-04-2021 06:37
Static task
static1
Behavioral task
behavioral1
Sample
C++ Dropper.exe
Resource
win7v20201028
General
-
Target
C++ Dropper.exe
-
Size
18KB
-
MD5
356dc1680475998c7c23e199f2c2e9ca
-
SHA1
8eadece945d635093c04a9d871ea0ead59d8e89f
-
SHA256
e5990480cda6207bf008957ae5a3fa3debe6303fd19c3babc3f2223bf769479c
-
SHA512
ea11d80221f730b0517f80350b474eb790109add96aff70af618dec1d8ee270a5ab8d42f2cf12becf02dfdcbbdeb48c4d339151f055945b802e9f0d88179b7dc
Malware Config
Extracted
raccoon
f55f17175de492dccaffeb57cb41e8ca951c34c4
-
url4cnc
https://tttttt.me/umiumitfr3
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
svchost.exedescription pid process target process PID 2308 created 2832 2308 svchost.exe helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe -
Executes dropped EXE 13 IoCs
Processes:
helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exehelperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exehelperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exehelperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exehelper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exehelper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exehelper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exehelper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exehelperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exehelperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exehelper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exehelper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exehelperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exepid process 3240 helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe 940 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe 1404 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe 3436 helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe 1584 helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 2832 helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe 1576 helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe 1216 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe 3252 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe 4040 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 892 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 2888 helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe upx C:\Users\Admin\AppData\Local\Temp\helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe upx C:\Users\Admin\AppData\Local\Temp\helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe upx -
Loads dropped DLL 5 IoCs
Processes:
helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exepid process 2888 helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe 2888 helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe 2888 helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe 2888 helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe 2888 helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 39 api.ipify.org -
Suspicious use of SetThreadContext 4 IoCs
Processes:
helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exehelperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exehelper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exehelperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exedescription pid process target process PID 940 set thread context of 1216 940 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe PID 1404 set thread context of 3252 1404 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe PID 3552 set thread context of 892 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe PID 3436 set thread context of 2888 3436 helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4060 timeout.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 1576 taskkill.exe 2360 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe -
Processes:
helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exeC++ Dropper.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C++ Dropper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C++ Dropper.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exehelper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exehelper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exehelperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exehelperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exepid process 2832 helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe 2832 helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 892 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 892 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe 1216 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe 1216 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe 3252 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe 3252 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
taskkill.exetaskkill.exehelper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exesvchost.exehelper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exehelperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exehelperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exedescription pid process Token: SeDebugPrivilege 1576 taskkill.exe Token: SeDebugPrivilege 2360 taskkill.exe Token: SeDebugPrivilege 2832 helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Token: SeImpersonatePrivilege 2832 helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe Token: SeTcbPrivilege 2308 svchost.exe Token: SeTcbPrivilege 2308 svchost.exe Token: SeDebugPrivilege 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe Token: SeDebugPrivilege 1216 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe Token: SeDebugPrivilege 3252 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
C++ Dropper.exehelperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.execmd.exehelper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.execmd.exesvchost.exehelperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exehelperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exehelper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exedescription pid process target process PID 412 wrote to memory of 3240 412 C++ Dropper.exe helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe PID 412 wrote to memory of 3240 412 C++ Dropper.exe helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe PID 412 wrote to memory of 3240 412 C++ Dropper.exe helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe PID 412 wrote to memory of 940 412 C++ Dropper.exe helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe PID 412 wrote to memory of 940 412 C++ Dropper.exe helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe PID 412 wrote to memory of 940 412 C++ Dropper.exe helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe PID 412 wrote to memory of 1404 412 C++ Dropper.exe helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe PID 412 wrote to memory of 1404 412 C++ Dropper.exe helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe PID 412 wrote to memory of 1404 412 C++ Dropper.exe helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe PID 412 wrote to memory of 3436 412 C++ Dropper.exe helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe PID 412 wrote to memory of 3436 412 C++ Dropper.exe helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe PID 412 wrote to memory of 3436 412 C++ Dropper.exe helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe PID 412 wrote to memory of 1584 412 C++ Dropper.exe helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe PID 412 wrote to memory of 1584 412 C++ Dropper.exe helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe PID 412 wrote to memory of 1584 412 C++ Dropper.exe helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe PID 412 wrote to memory of 3552 412 C++ Dropper.exe helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe PID 412 wrote to memory of 3552 412 C++ Dropper.exe helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe PID 412 wrote to memory of 3552 412 C++ Dropper.exe helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe PID 412 wrote to memory of 2832 412 C++ Dropper.exe helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe PID 412 wrote to memory of 2832 412 C++ Dropper.exe helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe PID 412 wrote to memory of 2832 412 C++ Dropper.exe helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe PID 3240 wrote to memory of 3996 3240 helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe cmd.exe PID 3240 wrote to memory of 3996 3240 helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe cmd.exe PID 3240 wrote to memory of 3996 3240 helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe cmd.exe PID 3996 wrote to memory of 1576 3996 cmd.exe taskkill.exe PID 3996 wrote to memory of 1576 3996 cmd.exe taskkill.exe PID 3996 wrote to memory of 1576 3996 cmd.exe taskkill.exe PID 1584 wrote to memory of 4044 1584 helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe cmd.exe PID 1584 wrote to memory of 4044 1584 helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe cmd.exe PID 1584 wrote to memory of 4044 1584 helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe cmd.exe PID 4044 wrote to memory of 2360 4044 cmd.exe taskkill.exe PID 4044 wrote to memory of 2360 4044 cmd.exe taskkill.exe PID 4044 wrote to memory of 2360 4044 cmd.exe taskkill.exe PID 2308 wrote to memory of 1576 2308 svchost.exe helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe PID 2308 wrote to memory of 1576 2308 svchost.exe helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe PID 2308 wrote to memory of 1576 2308 svchost.exe helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe PID 940 wrote to memory of 1216 940 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe PID 940 wrote to memory of 1216 940 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe PID 940 wrote to memory of 1216 940 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe PID 940 wrote to memory of 1216 940 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe PID 940 wrote to memory of 1216 940 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe PID 940 wrote to memory of 1216 940 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe PID 940 wrote to memory of 1216 940 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe PID 940 wrote to memory of 1216 940 helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe PID 1404 wrote to memory of 3252 1404 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe PID 1404 wrote to memory of 3252 1404 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe PID 1404 wrote to memory of 3252 1404 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe PID 1404 wrote to memory of 3252 1404 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe PID 1404 wrote to memory of 3252 1404 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe PID 1404 wrote to memory of 3252 1404 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe PID 1404 wrote to memory of 3252 1404 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe PID 1404 wrote to memory of 3252 1404 helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe PID 3552 wrote to memory of 4040 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe PID 3552 wrote to memory of 4040 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe PID 3552 wrote to memory of 4040 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe PID 3552 wrote to memory of 892 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe PID 3552 wrote to memory of 892 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe PID 3552 wrote to memory of 892 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe PID 3552 wrote to memory of 892 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe PID 3552 wrote to memory of 892 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe PID 3552 wrote to memory of 892 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe PID 3552 wrote to memory of 892 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe PID 3552 wrote to memory of 892 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe PID 3552 wrote to memory of 892 3552 helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\C++ Dropper.exe"C:\Users\Admin\AppData\Local\Temp\C++ Dropper.exe"1⤵
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe"C:\Users\Admin\AppData\Local\Temp\helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe" & exit3⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "helperlGeku21yEAQznpjDO6g5xZNU3T0VRtwP.exe" /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe"C:\Users\Admin\AppData\Local\Temp\helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe"{path}"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe"C:\Users\Admin\AppData\Local\Temp\helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe"{path}"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe"C:\Users\Admin\AppData\Local\Temp\helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe"C:\Users\Admin\AppData\Local\Temp\helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2888 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\helperGRC8F4YTbQleU2S5vLrpgXo63HBhwzaP.exe"4⤵PID:1324
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe"C:\Users\Admin\AppData\Local\Temp\helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe" & exit3⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "helper0cVYrD98QSUz7fXTdMEG4bK2yBpPNva3.exe" /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe"C:\Users\Admin\AppData\Local\Temp\helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe"{path}"3⤵
- Executes dropped EXE
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\helper3E5SOGxNL69koIhvlWwqZgYDQatRJy2b.exe"{path}"3⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:892 -
C:\Users\Admin\AppData\Local\Temp\helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe"C:\Users\Admin\AppData\Local\Temp\helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe"C:\Users\Admin\AppData\Local\Temp\helper7zW5fZ0CmHXoiJLn2Ujr94uvY18QKa6s.exe"3⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Modifies system certificate store
PID:1576
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\helperRKnwAT9st2yhl1jO8cQ5zxbSqvBeNYUD.exe.log
MD50c2899d7c6746f42d5bbe088c777f94c
SHA1622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1
SHA2565b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458
SHA512ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\helperpJevQakfNY4X5i0x8dcHZU1yG3WuBPSA.exe.log
MD50c2899d7c6746f42d5bbe088c777f94c
SHA1622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1
SHA2565b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458
SHA512ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078
-
MD5
000e43fe0944da48d0e033d95a7cf1e0
SHA18bd058abdd9e9eccf66577e7df849099b864cd13
SHA2562b2b2b7bb20ce4a49a3e58b7177661c6dc19aa01d1550ea6a352ef92a3ee99b2
SHA5125476b49c89415fb1e4f3e41c6b4314c53c7d20863c26cc380781015a542d6e0942617e0a9b948ed7e26555d69f3a695d70eab1e52e8b3c32cc9967c6378941d1
-
MD5
000e43fe0944da48d0e033d95a7cf1e0
SHA18bd058abdd9e9eccf66577e7df849099b864cd13
SHA2562b2b2b7bb20ce4a49a3e58b7177661c6dc19aa01d1550ea6a352ef92a3ee99b2
SHA5125476b49c89415fb1e4f3e41c6b4314c53c7d20863c26cc380781015a542d6e0942617e0a9b948ed7e26555d69f3a695d70eab1e52e8b3c32cc9967c6378941d1
-
MD5
3a441719e8227b47c48b143a818fd9db
SHA1a86e0f25041c2fd53fe5c9b0ef562dfd465beea8
SHA2565264cba383d033b281e0d9c097225f350fa4cb4aa910621638e79c8659ac4035
SHA512521dec402204e331cdd338676a9b2a355f5dfd7cf331511e79ed9b5b31b0719c025cf6dfdcf437b73fec89ab9f327473de3770f6c248fc1aba4bcd74e0d0c136
-
MD5
3a441719e8227b47c48b143a818fd9db
SHA1a86e0f25041c2fd53fe5c9b0ef562dfd465beea8
SHA2565264cba383d033b281e0d9c097225f350fa4cb4aa910621638e79c8659ac4035
SHA512521dec402204e331cdd338676a9b2a355f5dfd7cf331511e79ed9b5b31b0719c025cf6dfdcf437b73fec89ab9f327473de3770f6c248fc1aba4bcd74e0d0c136
-
MD5
3a441719e8227b47c48b143a818fd9db
SHA1a86e0f25041c2fd53fe5c9b0ef562dfd465beea8
SHA2565264cba383d033b281e0d9c097225f350fa4cb4aa910621638e79c8659ac4035
SHA512521dec402204e331cdd338676a9b2a355f5dfd7cf331511e79ed9b5b31b0719c025cf6dfdcf437b73fec89ab9f327473de3770f6c248fc1aba4bcd74e0d0c136
-
MD5
3a441719e8227b47c48b143a818fd9db
SHA1a86e0f25041c2fd53fe5c9b0ef562dfd465beea8
SHA2565264cba383d033b281e0d9c097225f350fa4cb4aa910621638e79c8659ac4035
SHA512521dec402204e331cdd338676a9b2a355f5dfd7cf331511e79ed9b5b31b0719c025cf6dfdcf437b73fec89ab9f327473de3770f6c248fc1aba4bcd74e0d0c136
-
MD5
231f3c7bf2aeb3695ccf747f9869a96a
SHA177741eabfc205bff48231668c967a26ed6ba4f6c
SHA256f04e1fb40ef39c3b9fd38123e62b35b6d7fa1d1e685788833b3e028dd1700962
SHA5125a7da26d223ed07b619e951a177fcd8792644d28ee89486f8690a39c13db6cc4b8fad6bf8120aebdce4aa082c0c51728c12eb32d9a35fbe462df9fcb3c102916
-
MD5
231f3c7bf2aeb3695ccf747f9869a96a
SHA177741eabfc205bff48231668c967a26ed6ba4f6c
SHA256f04e1fb40ef39c3b9fd38123e62b35b6d7fa1d1e685788833b3e028dd1700962
SHA5125a7da26d223ed07b619e951a177fcd8792644d28ee89486f8690a39c13db6cc4b8fad6bf8120aebdce4aa082c0c51728c12eb32d9a35fbe462df9fcb3c102916
-
MD5
231f3c7bf2aeb3695ccf747f9869a96a
SHA177741eabfc205bff48231668c967a26ed6ba4f6c
SHA256f04e1fb40ef39c3b9fd38123e62b35b6d7fa1d1e685788833b3e028dd1700962
SHA5125a7da26d223ed07b619e951a177fcd8792644d28ee89486f8690a39c13db6cc4b8fad6bf8120aebdce4aa082c0c51728c12eb32d9a35fbe462df9fcb3c102916
-
MD5
6f23faff2a32f16a2a3cfb3dfe4d2e38
SHA1d52ded952a66428f282811dafb651d124b7b05ea
SHA2568e9d0e52d976ff21f930c8c032b94b394738fb652db616eebaa18fb0ab5fcde7
SHA512bf4c7f8db3f743b2f4f75588425eb3922e926704b2e9b0474389369e95d3f9247a48e7b99e8754862db3f8d6cc65bbd74a7745abc6e16683bfd0f47e622f0fd0
-
MD5
6f23faff2a32f16a2a3cfb3dfe4d2e38
SHA1d52ded952a66428f282811dafb651d124b7b05ea
SHA2568e9d0e52d976ff21f930c8c032b94b394738fb652db616eebaa18fb0ab5fcde7
SHA512bf4c7f8db3f743b2f4f75588425eb3922e926704b2e9b0474389369e95d3f9247a48e7b99e8754862db3f8d6cc65bbd74a7745abc6e16683bfd0f47e622f0fd0
-
MD5
6f23faff2a32f16a2a3cfb3dfe4d2e38
SHA1d52ded952a66428f282811dafb651d124b7b05ea
SHA2568e9d0e52d976ff21f930c8c032b94b394738fb652db616eebaa18fb0ab5fcde7
SHA512bf4c7f8db3f743b2f4f75588425eb3922e926704b2e9b0474389369e95d3f9247a48e7b99e8754862db3f8d6cc65bbd74a7745abc6e16683bfd0f47e622f0fd0
-
MD5
680db8071c092a79396fa2a44e710d70
SHA14f16d9dae64d87dcb25a9a4521930e055df4042e
SHA256e221a9a50a4c2492f5fbd710cddc97c63ea9247f6e6c0ba1893e12a9ca608395
SHA512d91bd6268a75c2d0435786d406dee95c5585ac94207d66fe019d506391a98af400a26548d7a24593864e46f646054881e65e10662d07960e41bd3e8fa6ed6fcf
-
MD5
680db8071c092a79396fa2a44e710d70
SHA14f16d9dae64d87dcb25a9a4521930e055df4042e
SHA256e221a9a50a4c2492f5fbd710cddc97c63ea9247f6e6c0ba1893e12a9ca608395
SHA512d91bd6268a75c2d0435786d406dee95c5585ac94207d66fe019d506391a98af400a26548d7a24593864e46f646054881e65e10662d07960e41bd3e8fa6ed6fcf
-
MD5
680db8071c092a79396fa2a44e710d70
SHA14f16d9dae64d87dcb25a9a4521930e055df4042e
SHA256e221a9a50a4c2492f5fbd710cddc97c63ea9247f6e6c0ba1893e12a9ca608395
SHA512d91bd6268a75c2d0435786d406dee95c5585ac94207d66fe019d506391a98af400a26548d7a24593864e46f646054881e65e10662d07960e41bd3e8fa6ed6fcf
-
MD5
dcd1e195ad1945389bc4d87dae82a164
SHA17c1aed93371a31888752afd9bfc7d76379940732
SHA256ac2c2e2b67deca31d1f61ff956ef8b676fa733da9c682f26fbda28b46c6e6f63
SHA51252f2de83f7286655a1cb964fa76704ede980d875571d424689253757c6ec9491d25402ce9124ec825f15e3e62f4bb1b43b2675c49757b1c00e179d69a03e345b
-
MD5
dcd1e195ad1945389bc4d87dae82a164
SHA17c1aed93371a31888752afd9bfc7d76379940732
SHA256ac2c2e2b67deca31d1f61ff956ef8b676fa733da9c682f26fbda28b46c6e6f63
SHA51252f2de83f7286655a1cb964fa76704ede980d875571d424689253757c6ec9491d25402ce9124ec825f15e3e62f4bb1b43b2675c49757b1c00e179d69a03e345b
-
MD5
840e844757113c05dc8618397202f357
SHA1da645fea1df7fd2cb07f9e8bd388bdc6e04c4750
SHA25628fbc35964c5a137d5e4bb2c770fbc6674d26fe478e18a0759e0647a44cb0d54
SHA5124f8a30151fa0706df66c8d66cfa3c12f82a4dc08478fdc936c59552a962273c46f26ed823f5cd6c73ba078b95ed94e1dab762c932d97f73d6dca8669b9949018
-
MD5
840e844757113c05dc8618397202f357
SHA1da645fea1df7fd2cb07f9e8bd388bdc6e04c4750
SHA25628fbc35964c5a137d5e4bb2c770fbc6674d26fe478e18a0759e0647a44cb0d54
SHA5124f8a30151fa0706df66c8d66cfa3c12f82a4dc08478fdc936c59552a962273c46f26ed823f5cd6c73ba078b95ed94e1dab762c932d97f73d6dca8669b9949018
-
MD5
840e844757113c05dc8618397202f357
SHA1da645fea1df7fd2cb07f9e8bd388bdc6e04c4750
SHA25628fbc35964c5a137d5e4bb2c770fbc6674d26fe478e18a0759e0647a44cb0d54
SHA5124f8a30151fa0706df66c8d66cfa3c12f82a4dc08478fdc936c59552a962273c46f26ed823f5cd6c73ba078b95ed94e1dab762c932d97f73d6dca8669b9949018
-
MD5
60acd24430204ad2dc7f148b8cfe9bdc
SHA1989f377b9117d7cb21cbe92a4117f88f9c7693d9
SHA2569876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97
SHA512626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01
-
MD5
eae9273f8cdcf9321c6c37c244773139
SHA18378e2a2f3635574c106eea8419b5eb00b8489b0
SHA256a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc
SHA51206e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097
-
MD5
02cc7b8ee30056d5912de54f1bdfc219
SHA1a6923da95705fb81e368ae48f93d28522ef552fb
SHA2561989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5
SHA5120d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5
-
MD5
4e8df049f3459fa94ab6ad387f3561ac
SHA106ed392bc29ad9d5fc05ee254c2625fd65925114
SHA25625a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871
SHA5123dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6
-
MD5
f964811b68f9f1487c2b41e1aef576ce
SHA1b423959793f14b1416bc3b7051bed58a1034025f
SHA25683bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7
SHA512565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4