Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
18-05-2021 05:20
Static task
static1
Behavioral task
behavioral1
Sample
d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe
Resource
win10v20210410
General
-
Target
d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe
-
Size
300KB
-
MD5
34bb08ef3736dfb14f24a287b7842394
-
SHA1
d246bb89cd4969bb135d2b056a11dd8135830f55
-
SHA256
d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712
-
SHA512
d01a1eb74073d2c185fedff2af33b757c922622b684e57c0848d6f30ad0a3168df47d3cbcbb693971c6e6f872de737b5278b5fd43f39d6ee766573a899d8e67c
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\diuoxcnqsdo = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\vecaps.exe\"" d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exedescription ioc process File opened (read-only) \??\Q: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\T: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\U: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\F: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\G: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\J: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\N: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\O: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\W: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\P: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\R: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\X: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\H: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\I: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\K: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\L: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\M: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\Y: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\A: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\B: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\E: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\S: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\Z: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe File opened (read-only) \??\V: d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exepid process 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe -
Suspicious use of SetWindowsHookAW 64 IoCs
Processes:
d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exepid process 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exedescription pid process target process PID 4436 wrote to memory of 3212 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 3212 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 3212 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 3956 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 3956 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 3956 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4060 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4060 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4060 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4080 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4080 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4080 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4176 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4176 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4176 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4240 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4240 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4240 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4336 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4336 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4336 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4376 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4376 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4376 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 504 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 504 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 504 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 184 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 184 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 184 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 644 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 644 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 644 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 908 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 908 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 908 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 1192 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 1192 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 1192 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 1536 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 1536 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 1536 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 1976 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 1976 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 1976 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 2392 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 2392 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 2392 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 2676 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 2676 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 2676 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 3788 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 3788 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 3788 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4444 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4444 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4444 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 3844 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 3844 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 3844 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4656 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4656 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4656 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe PID 4436 wrote to memory of 4776 4436 d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe nslookup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe"C:\Users\Admin\AppData\Local\Temp\d98e60a3c34514b171fbd0e897786dbf41a13490ea9d5ea99d0c4e1bf1010712.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookAW
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/184-126-0x0000000000000000-mapping.dmp
-
memory/208-151-0x0000000000000000-mapping.dmp
-
memory/504-125-0x0000000000000000-mapping.dmp
-
memory/644-127-0x0000000000000000-mapping.dmp
-
memory/820-180-0x0000000000000000-mapping.dmp
-
memory/860-153-0x0000000000000000-mapping.dmp
-
memory/908-128-0x0000000000000000-mapping.dmp
-
memory/996-142-0x0000000000000000-mapping.dmp
-
memory/1064-154-0x0000000000000000-mapping.dmp
-
memory/1192-129-0x0000000000000000-mapping.dmp
-
memory/1236-155-0x0000000000000000-mapping.dmp
-
memory/1380-163-0x0000000000000000-mapping.dmp
-
memory/1536-130-0x0000000000000000-mapping.dmp
-
memory/1712-156-0x0000000000000000-mapping.dmp
-
memory/1976-131-0x0000000000000000-mapping.dmp
-
memory/2152-162-0x0000000000000000-mapping.dmp
-
memory/2156-167-0x0000000000000000-mapping.dmp
-
memory/2196-150-0x0000000000000000-mapping.dmp
-
memory/2236-157-0x0000000000000000-mapping.dmp
-
memory/2256-159-0x0000000000000000-mapping.dmp
-
memory/2392-132-0x0000000000000000-mapping.dmp
-
memory/2656-158-0x0000000000000000-mapping.dmp
-
memory/2664-176-0x0000000000000000-mapping.dmp
-
memory/2676-133-0x0000000000000000-mapping.dmp
-
memory/3212-117-0x0000000000000000-mapping.dmp
-
memory/3304-141-0x0000000000000000-mapping.dmp
-
memory/3336-177-0x0000000000000000-mapping.dmp
-
memory/3400-164-0x0000000000000000-mapping.dmp
-
memory/3556-160-0x0000000000000000-mapping.dmp
-
memory/3684-149-0x0000000000000000-mapping.dmp
-
memory/3784-168-0x0000000000000000-mapping.dmp
-
memory/3788-134-0x0000000000000000-mapping.dmp
-
memory/3844-136-0x0000000000000000-mapping.dmp
-
memory/3956-118-0x0000000000000000-mapping.dmp
-
memory/3976-145-0x0000000000000000-mapping.dmp
-
memory/3984-170-0x0000000000000000-mapping.dmp
-
memory/4004-144-0x0000000000000000-mapping.dmp
-
memory/4060-119-0x0000000000000000-mapping.dmp
-
memory/4080-120-0x0000000000000000-mapping.dmp
-
memory/4136-178-0x0000000000000000-mapping.dmp
-
memory/4156-171-0x0000000000000000-mapping.dmp
-
memory/4176-121-0x0000000000000000-mapping.dmp
-
memory/4180-179-0x0000000000000000-mapping.dmp
-
memory/4240-122-0x0000000000000000-mapping.dmp
-
memory/4244-174-0x0000000000000000-mapping.dmp
-
memory/4260-173-0x0000000000000000-mapping.dmp
-
memory/4292-146-0x0000000000000000-mapping.dmp
-
memory/4304-152-0x0000000000000000-mapping.dmp
-
memory/4308-147-0x0000000000000000-mapping.dmp
-
memory/4336-123-0x0000000000000000-mapping.dmp
-
memory/4372-175-0x0000000000000000-mapping.dmp
-
memory/4376-124-0x0000000000000000-mapping.dmp
-
memory/4392-148-0x0000000000000000-mapping.dmp
-
memory/4436-114-0x0000000003CA0000-0x0000000003DEA000-memory.dmpFilesize
1.3MB
-
memory/4436-115-0x0000000000400000-0x0000000003B9B000-memory.dmpFilesize
55.6MB
-
memory/4436-116-0x0000000003CA0000-0x0000000003DEA000-memory.dmpFilesize
1.3MB
-
memory/4440-139-0x0000000000000000-mapping.dmp
-
memory/4444-135-0x0000000000000000-mapping.dmp
-
memory/4484-172-0x0000000000000000-mapping.dmp
-
memory/4528-143-0x0000000000000000-mapping.dmp
-
memory/4536-169-0x0000000000000000-mapping.dmp
-
memory/4556-161-0x0000000000000000-mapping.dmp
-
memory/4656-137-0x0000000000000000-mapping.dmp
-
memory/4776-138-0x0000000000000000-mapping.dmp
-
memory/4904-165-0x0000000000000000-mapping.dmp
-
memory/4928-140-0x0000000000000000-mapping.dmp
-
memory/5076-166-0x0000000000000000-mapping.dmp