Analysis
-
max time kernel
64s -
max time network
89s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
05-07-2021 17:47
Static task
static1
Behavioral task
behavioral1
Sample
24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe
-
Size
1.9MB
-
MD5
abd35d575a95891bac53ec57e8d33ccd
-
SHA1
78078d9d1c867fca632ccac4fec5bfc65230f1ab
-
SHA256
24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42
-
SHA512
6036f6ad53f5b525f7ff2f48d1924d63fcac520dcfd57bba8288317e7bdd8c75470a2f050b16483e62143ac5090a7250e56b0030e89d7279d9b1998122429bd3
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 684 Tra.exe.com 2028 Tra.exe.com -
Loads dropped DLL 2 IoCs
pid Process 304 cmd.exe 684 Tra.exe.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Tra.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Tra.exe.com -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1500 PING.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1036 wrote to memory of 268 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 26 PID 1036 wrote to memory of 268 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 26 PID 1036 wrote to memory of 268 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 26 PID 1036 wrote to memory of 268 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 26 PID 1036 wrote to memory of 864 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 28 PID 1036 wrote to memory of 864 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 28 PID 1036 wrote to memory of 864 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 28 PID 1036 wrote to memory of 864 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 28 PID 1036 wrote to memory of 1656 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 30 PID 1036 wrote to memory of 1656 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 30 PID 1036 wrote to memory of 1656 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 30 PID 1036 wrote to memory of 1656 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 30 PID 1036 wrote to memory of 2032 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 32 PID 1036 wrote to memory of 2032 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 32 PID 1036 wrote to memory of 2032 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 32 PID 1036 wrote to memory of 2032 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 32 PID 1036 wrote to memory of 1788 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 34 PID 1036 wrote to memory of 1788 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 34 PID 1036 wrote to memory of 1788 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 34 PID 1036 wrote to memory of 1788 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 34 PID 1036 wrote to memory of 1072 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 36 PID 1036 wrote to memory of 1072 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 36 PID 1036 wrote to memory of 1072 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 36 PID 1036 wrote to memory of 1072 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 36 PID 1036 wrote to memory of 1248 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 38 PID 1036 wrote to memory of 1248 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 38 PID 1036 wrote to memory of 1248 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 38 PID 1036 wrote to memory of 1248 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 38 PID 1036 wrote to memory of 844 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 40 PID 1036 wrote to memory of 844 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 40 PID 1036 wrote to memory of 844 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 40 PID 1036 wrote to memory of 844 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 40 PID 1036 wrote to memory of 1336 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 42 PID 1036 wrote to memory of 1336 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 42 PID 1036 wrote to memory of 1336 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 42 PID 1036 wrote to memory of 1336 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 42 PID 1036 wrote to memory of 360 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 44 PID 1036 wrote to memory of 360 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 44 PID 1036 wrote to memory of 360 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 44 PID 1036 wrote to memory of 360 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 44 PID 1036 wrote to memory of 568 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 46 PID 1036 wrote to memory of 568 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 46 PID 1036 wrote to memory of 568 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 46 PID 1036 wrote to memory of 568 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 46 PID 1036 wrote to memory of 880 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 48 PID 1036 wrote to memory of 880 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 48 PID 1036 wrote to memory of 880 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 48 PID 1036 wrote to memory of 880 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 48 PID 1036 wrote to memory of 1152 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 50 PID 1036 wrote to memory of 1152 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 50 PID 1036 wrote to memory of 1152 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 50 PID 1036 wrote to memory of 1152 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 50 PID 1036 wrote to memory of 684 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 52 PID 1036 wrote to memory of 684 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 52 PID 1036 wrote to memory of 684 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 52 PID 1036 wrote to memory of 684 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 52 PID 1036 wrote to memory of 1652 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 54 PID 1036 wrote to memory of 1652 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 54 PID 1036 wrote to memory of 1652 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 54 PID 1036 wrote to memory of 1652 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 54 PID 1036 wrote to memory of 1692 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 56 PID 1036 wrote to memory of 1692 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 56 PID 1036 wrote to memory of 1692 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 56 PID 1036 wrote to memory of 1692 1036 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe"C:\Users\Admin\AppData\Local\Temp\24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c xVpguGGxyc2⤵PID:268
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bpEOnapciaOcVvMCGJUMWoiuIyTpAaGvJv2⤵PID:864
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c dcQZdSoMHFAgSxtqK2⤵PID:1656
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c JjfenyanqUPLaLmzciPKETNcmAiRwPvsWkZpN2⤵PID:2032
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WKGRShXWjOOnYXlZFQnTDXYBbknbPuMdGilttNqAnDgaeD2⤵PID:1788
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c miWGoKTKZMtxGPAuyenRQMyVRPYxqIFmTcYfSADGMbkaZzxLYvodELZMwwOaMmKdiFAkQlhFmSyaBNWncjvDmfUicjhRLlThNUlxSoVOoDQMGGkgydXmeuQSKzPE2⤵PID:1072
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vTgYRFHCBFjsIxWnoAOwZMchxlHraJmzsRMJCOPwDLDKKixLUzBSqCXJnwDGYDlSyTqQIjWxLNbhpKDhQVoYiHaOUekBlorZBKFQuErHbiihyJANbdQeckKnBjVFwcpCKbMnyMukSBBq2⤵PID:1248
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tIkCbrUawEdqifUIbGeYFDIWwILpEpTKKYvEKrDsglISvnXbjDcUneUBZgAOaLNRKFdpSdXzeKJcUQAD2⤵PID:844
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c hXwOZkHrVEvDPZDvRiQoOFWFwSOamGpNWrtOLeLzIuWLBQhKuYeJJcWIqvMibgDgcIHLVOLPcvmIIlrkErjBDAtAucNffEWzCHdTpBOshhhhW2⤵PID:1336
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c qPaBCxeeLVEuFAwcmRAuyqUlergVhdjRERcXXOwCsAWxfeWgd2⤵PID:360
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c OvMPpqUimmyuOxINBNyrbKPYPErmVZuZFvBQtPIxeQgCvlMBMCBppjzrGNqEXcjmayBaTRIMtKqHcjBFSBNznXQaenldOrbHEPlsIxIUTOtmjLHzkxMcHSwcfpfcHsX2⤵PID:568
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c jarGelWbSSm2⤵PID:880
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SdudQQtxswZLNOwmthhCQtjTIqdwbgDPzsCYeZEQjDJlzaTgpbzFEXTOrhIPmrWenlsckevyJvfjceAfueRqVYlvnOVPsOspHGLowneuwh2⤵PID:1152
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c oHGawMaIbjWuAZVXbiGNUyuFOdsgIqKYIeeORcTeYyUXLAkpyAFZxmweBwELctqvBXnnWuywgDPPkpThtioocLEoqqhPRiHUybvOwMjZxDLQKjRaodGhVRqPadbWTdluWUJNNyjaVp2⤵PID:684
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c RqObOoUHAAxZhbGcLgfutzETQCrFetgaMtpOESINYIJFCUvduJBrFrIbcUGjyfFckwhogRRSGCivJYsVuMmzDkMJvLzJjvIJrgzAHhegRIbrVkOvDLu2⤵PID:1652
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c QjSqfEMCnoGpTnzcFQgSJlBUOJNlXWuBfgTRvzkrBmPJehpbSaRMvhJFLXkGQ2⤵PID:1692
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c FCwyTFECZkFlspcRRBmdaEtxteFhyniFjZTjHXzESfaGujWmlTyKuAownHqRZsvBrqXsdopUoVbrkbhSuur2⤵PID:1796
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c abnMRSOqWBEBTRCygEpwKkCkeyPqxoLThloGCkAbxpX2⤵PID:916
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c dWpxViEBWwCuVhJLrNGOPLhJIWDetMHAgVUuVcyjElWjHeKgCOzGDoQEIALYDBblzwRqaCQIIzpFOwwGjfAfawXytdbxJuIeMM2⤵PID:1944
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c GlKWZYLYpZlQHmyMgwiSarMVeycYBKiTepxcBzBsGrOuTmQVExzwFUmCnOTTCMvnRsNntJlVAPkffFwCfAxudygoJRXMmHPUGfgCMsQUpnAPJphSNdEwsfiMrFOjLnvTq2⤵PID:948
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c JZdmQXKmXSFnmmEtZoeNCdoCnuCDpLeHOaAgCgAGsRafuEugIGnhQh2⤵PID:780
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c aRNqJxidkQXKuZfCLHcvKXScUqgUCjORBEibOhRjlBunpUZfztNFxRrxYsuIujOYwuoBSSObQpkpRxjZqYBbmpvKBMnvioyXMibeMbbAddOlFTDEyuIiL2⤵PID:1048
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c mRKnqyzsfItgvJWphCBqipxktIoUdwAXjcHGahbsiYquusvUIVTyGKp2⤵PID:552
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bnzaWmqgiuwwwdRZypToohtNkgjcocsBjsoUUyxHXMZqfcSstTZvRqo2⤵PID:1748
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c zFuIjFyMPAOKiWyZPklcgtnQcUdfcVJkoZA2⤵PID:1716
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ZMcaGhkOGoliNZHGPMVgifjsgQdTQDBovRqePSPqTJlhKpBv2⤵PID:1416
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rcvrjuJArtPXsXrHeLWZEQXXUxnyZHtfUFNiytlLdCMOZrC2⤵PID:1896
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c kETsrwWgoFbppHflMfdhiWcwUqCqE & fOcmzeiuplOoPmFQLQeLIkymZgpRbrmVJjdJNKhjrGyynYiWvrfLXThrJVAyTfIuKTmDoWewCPHwyZwqihxxNNXQYhZSpozNYZcFmENAqgpokjXJUmXGUgaWVJEUWlRzvTruEcBDmUzm & PEMdfYJkNTJHnKQZSEQvQLapRymYxuZUSayySEGjioJqznyKKEGdDeNrjDnlnLRGTOOyEKugXDfIeaPaZOhPmJsPEwT & yvNvdeuEJZuqnaaZNywUNulKbwulbYBCRQoBPTsZkkIZHhsidsem & ZCZkeYfVWu & nDoHpRpTNwICblepJZTyWwCShpfNUwtgtXBtyKYnipLYdqBwqPFWeqObqfzZBvYMXzbAJYtZqcYMfDChIgNycijrorrPdYXKlZqWCwswLGVHe & ivNudhJSdQixsFU & JenhCfDFKHWLxPkFquWGwlHJqsJlPoJMivXTpPmRTocJdYnA & CzkJhjmxOjlGaPBXlDXSackGtMTOYzeTpGhPnrTlnmxCgkBzTLucAIjuiEFAaKcclsbMBMmiJNzSqJaSkAUjjGaAziHU & aRNrZsWOPRijZLNgzynkMfSQooDZWaxtFJdVGOwsctcIMqhVFkZepILrYXVQOXRvbeGfxRIFti & IUlroVIzKaaVXYhXJTlDbjYkJxXAODxYwRroOTMVyEutyuJsuTZLTEacVYzNYiFiXzUyUtoQugbTyUuCLFxUEItbmHhPmZXYYZuLjDbwLpFEunfwSQeaNLDffvGh & adismVuNcdioapxemdqajXIWElhvRcQXplaSnhHDohvAUlxBojQyGUExIlNgHKWZmlYiQCEjIvpZBiwzQLhEFKdfFXlhAzWndvwKjjLGHDblLFTApznVvsxPUJCTas & gmLItusiDqHWwhuDqtJtuVqwYwkPDKRhdRoKqWOxRjUVPczCNyBPIjFzmJKeUBESozGptvDtfgjUqyjDIJeboeFrjPkdjLAfHeMcOpbsBbmxZLaz & uzlmuJyOCXfkjRDOXjYaQOmjLWLDktAvRTysfQBzHHjkiugFVFenxwGsUYNlYCDnvTzzMjnu & FKpCgtFHyHFweePhNbsrdxttNOgMVTJuWNPdbPFToDSVXvxQEuZOirxlGyOmQTLjXnyghnPYRnVNBpudzboPUVZTaEKsqyefRGXmsuDydqWIoG & vYnuzKWaenjVINnXLcGWVjHZhTemTYdKMVgaCZJEVgUqylUsSelhBKNlsmSmHbnriBpMmycMLwwGsGTrYLHQNrpworwrulWnPRSEqoS & HnCAJuTKFPAWQIdtaoEctaFByDRAOfrQTUofBJawldbsJZIuBOjSDvIgTqxufzWdMKrVmqDJPClNVhRyVKYqrljvkUcAgkLRxiFZWMGAlCeqkVzFog & FxWhBbGKFErxDRazNHSpornPAikkfBQsZqubnUtB & wwViompTBFXdyeCVuMzkcxtOLxDKUVTDsTiwDIsIwaNVSwUYECsiK & UGXuvNWmYGMxYjUAancKprHoWKAEuaDMTwYBtvjEMCzipneHrrl & MZyRZOlLhsaFeZBWhzvVkQXHJmZnHSBroKZTWuCfjAsclOtpXyzKHgHVenomOLtxPfbaqHqiRuJLmCvVcQBBnRcUetRbYrAAcWFUdLpftjSBEWcmwjrYlCVYTDdVQDoOFpfD & BEKGjvkYUfuIscLZCdTqHwNxhnBttVcGSDmIzsYyJqZhljnivOrTvCfAQfzNViTYUAQOVrGlsNsGwmlqZxIdSBpdhZRtYllCuqaKvKkaoSBIlIndtaNBmDuadAAWjBjiDOmwiAEfofiZ & ByEAAZFbIeD & C:\Windows\system32\cmd < Naso.avi2⤵PID:1476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd3⤵
- Loads dropped DLL
PID:304 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^JMwsfVERnDBURqxHDYhNCuTSPfHILUaLUPRAorBOUkHipfETBjTFiEaDSpBZhWuDkQqeoTmmbmSdnMIALOunwMEdvgIYBBAYytWzgBKINziHMeyuAwgmPHCmjKFUlAYWYUlzQfkprnLIEW$" Pensato.avi4⤵PID:768
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tra.exe.comTra.exe.com C4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:684 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tra.exe.com C5⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2028
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
PID:1500
-
-
-