Analysis
-
max time kernel
72s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
05-07-2021 17:47
Static task
static1
Behavioral task
behavioral1
Sample
24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe
Resource
win7v20210408
General
-
Target
24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe
-
Size
1.9MB
-
MD5
abd35d575a95891bac53ec57e8d33ccd
-
SHA1
78078d9d1c867fca632ccac4fec5bfc65230f1ab
-
SHA256
24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42
-
SHA512
6036f6ad53f5b525f7ff2f48d1924d63fcac520dcfd57bba8288317e7bdd8c75470a2f050b16483e62143ac5090a7250e56b0030e89d7279d9b1998122429bd3
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Tra.exe.comTra.exe.compid process 348 Tra.exe.com 2732 Tra.exe.com -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Tra.exe.comdescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Tra.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Tra.exe.com -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3032 timeout.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Tra.exe.compid process 2732 Tra.exe.com 2732 Tra.exe.com -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exedescription pid process target process PID 3944 wrote to memory of 2840 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 2840 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 2840 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 204 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 204 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 204 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 2192 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 2192 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 2192 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 2676 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 2676 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 2676 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3304 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3304 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3304 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3308 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3308 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3308 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 4080 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 4080 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 4080 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3948 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3948 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3948 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 2088 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 2088 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 2088 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3984 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3984 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3984 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 352 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 352 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 352 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 4044 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 4044 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 4044 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 60 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 60 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 60 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 1552 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 1552 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 1552 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3672 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3672 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3672 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 732 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 732 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 732 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 4036 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 4036 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 4036 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3948 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3948 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3948 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 2756 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 2756 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 2756 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3860 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3860 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3860 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 768 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 768 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 768 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe PID 3944 wrote to memory of 3648 3944 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe"C:\Users\Admin\AppData\Local\Temp\24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c xVpguGGxyc2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bpEOnapciaOcVvMCGJUMWoiuIyTpAaGvJv2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c dcQZdSoMHFAgSxtqK2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c JjfenyanqUPLaLmzciPKETNcmAiRwPvsWkZpN2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WKGRShXWjOOnYXlZFQnTDXYBbknbPuMdGilttNqAnDgaeD2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c miWGoKTKZMtxGPAuyenRQMyVRPYxqIFmTcYfSADGMbkaZzxLYvodELZMwwOaMmKdiFAkQlhFmSyaBNWncjvDmfUicjhRLlThNUlxSoVOoDQMGGkgydXmeuQSKzPE2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vTgYRFHCBFjsIxWnoAOwZMchxlHraJmzsRMJCOPwDLDKKixLUzBSqCXJnwDGYDlSyTqQIjWxLNbhpKDhQVoYiHaOUekBlorZBKFQuErHbiihyJANbdQeckKnBjVFwcpCKbMnyMukSBBq2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tIkCbrUawEdqifUIbGeYFDIWwILpEpTKKYvEKrDsglISvnXbjDcUneUBZgAOaLNRKFdpSdXzeKJcUQAD2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c hXwOZkHrVEvDPZDvRiQoOFWFwSOamGpNWrtOLeLzIuWLBQhKuYeJJcWIqvMibgDgcIHLVOLPcvmIIlrkErjBDAtAucNffEWzCHdTpBOshhhhW2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c qPaBCxeeLVEuFAwcmRAuyqUlergVhdjRERcXXOwCsAWxfeWgd2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c OvMPpqUimmyuOxINBNyrbKPYPErmVZuZFvBQtPIxeQgCvlMBMCBppjzrGNqEXcjmayBaTRIMtKqHcjBFSBNznXQaenldOrbHEPlsIxIUTOtmjLHzkxMcHSwcfpfcHsX2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c jarGelWbSSm2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SdudQQtxswZLNOwmthhCQtjTIqdwbgDPzsCYeZEQjDJlzaTgpbzFEXTOrhIPmrWenlsckevyJvfjceAfueRqVYlvnOVPsOspHGLowneuwh2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c oHGawMaIbjWuAZVXbiGNUyuFOdsgIqKYIeeORcTeYyUXLAkpyAFZxmweBwELctqvBXnnWuywgDPPkpThtioocLEoqqhPRiHUybvOwMjZxDLQKjRaodGhVRqPadbWTdluWUJNNyjaVp2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c RqObOoUHAAxZhbGcLgfutzETQCrFetgaMtpOESINYIJFCUvduJBrFrIbcUGjyfFckwhogRRSGCivJYsVuMmzDkMJvLzJjvIJrgzAHhegRIbrVkOvDLu2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c QjSqfEMCnoGpTnzcFQgSJlBUOJNlXWuBfgTRvzkrBmPJehpbSaRMvhJFLXkGQ2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c FCwyTFECZkFlspcRRBmdaEtxteFhyniFjZTjHXzESfaGujWmlTyKuAownHqRZsvBrqXsdopUoVbrkbhSuur2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c abnMRSOqWBEBTRCygEpwKkCkeyPqxoLThloGCkAbxpX2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c dWpxViEBWwCuVhJLrNGOPLhJIWDetMHAgVUuVcyjElWjHeKgCOzGDoQEIALYDBblzwRqaCQIIzpFOwwGjfAfawXytdbxJuIeMM2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c GlKWZYLYpZlQHmyMgwiSarMVeycYBKiTepxcBzBsGrOuTmQVExzwFUmCnOTTCMvnRsNntJlVAPkffFwCfAxudygoJRXMmHPUGfgCMsQUpnAPJphSNdEwsfiMrFOjLnvTq2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c JZdmQXKmXSFnmmEtZoeNCdoCnuCDpLeHOaAgCgAGsRafuEugIGnhQh2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c aRNqJxidkQXKuZfCLHcvKXScUqgUCjORBEibOhRjlBunpUZfztNFxRrxYsuIujOYwuoBSSObQpkpRxjZqYBbmpvKBMnvioyXMibeMbbAddOlFTDEyuIiL2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c mRKnqyzsfItgvJWphCBqipxktIoUdwAXjcHGahbsiYquusvUIVTyGKp2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bnzaWmqgiuwwwdRZypToohtNkgjcocsBjsoUUyxHXMZqfcSstTZvRqo2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c zFuIjFyMPAOKiWyZPklcgtnQcUdfcVJkoZA2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ZMcaGhkOGoliNZHGPMVgifjsgQdTQDBovRqePSPqTJlhKpBv2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rcvrjuJArtPXsXrHeLWZEQXXUxnyZHtfUFNiytlLdCMOZrC2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c kETsrwWgoFbppHflMfdhiWcwUqCqE & fOcmzeiuplOoPmFQLQeLIkymZgpRbrmVJjdJNKhjrGyynYiWvrfLXThrJVAyTfIuKTmDoWewCPHwyZwqihxxNNXQYhZSpozNYZcFmENAqgpokjXJUmXGUgaWVJEUWlRzvTruEcBDmUzm & PEMdfYJkNTJHnKQZSEQvQLapRymYxuZUSayySEGjioJqznyKKEGdDeNrjDnlnLRGTOOyEKugXDfIeaPaZOhPmJsPEwT & yvNvdeuEJZuqnaaZNywUNulKbwulbYBCRQoBPTsZkkIZHhsidsem & ZCZkeYfVWu & nDoHpRpTNwICblepJZTyWwCShpfNUwtgtXBtyKYnipLYdqBwqPFWeqObqfzZBvYMXzbAJYtZqcYMfDChIgNycijrorrPdYXKlZqWCwswLGVHe & ivNudhJSdQixsFU & JenhCfDFKHWLxPkFquWGwlHJqsJlPoJMivXTpPmRTocJdYnA & CzkJhjmxOjlGaPBXlDXSackGtMTOYzeTpGhPnrTlnmxCgkBzTLucAIjuiEFAaKcclsbMBMmiJNzSqJaSkAUjjGaAziHU & aRNrZsWOPRijZLNgzynkMfSQooDZWaxtFJdVGOwsctcIMqhVFkZepILrYXVQOXRvbeGfxRIFti & IUlroVIzKaaVXYhXJTlDbjYkJxXAODxYwRroOTMVyEutyuJsuTZLTEacVYzNYiFiXzUyUtoQugbTyUuCLFxUEItbmHhPmZXYYZuLjDbwLpFEunfwSQeaNLDffvGh & adismVuNcdioapxemdqajXIWElhvRcQXplaSnhHDohvAUlxBojQyGUExIlNgHKWZmlYiQCEjIvpZBiwzQLhEFKdfFXlhAzWndvwKjjLGHDblLFTApznVvsxPUJCTas & gmLItusiDqHWwhuDqtJtuVqwYwkPDKRhdRoKqWOxRjUVPczCNyBPIjFzmJKeUBESozGptvDtfgjUqyjDIJeboeFrjPkdjLAfHeMcOpbsBbmxZLaz & uzlmuJyOCXfkjRDOXjYaQOmjLWLDktAvRTysfQBzHHjkiugFVFenxwGsUYNlYCDnvTzzMjnu & FKpCgtFHyHFweePhNbsrdxttNOgMVTJuWNPdbPFToDSVXvxQEuZOirxlGyOmQTLjXnyghnPYRnVNBpudzboPUVZTaEKsqyefRGXmsuDydqWIoG & vYnuzKWaenjVINnXLcGWVjHZhTemTYdKMVgaCZJEVgUqylUsSelhBKNlsmSmHbnriBpMmycMLwwGsGTrYLHQNrpworwrulWnPRSEqoS & HnCAJuTKFPAWQIdtaoEctaFByDRAOfrQTUofBJawldbsJZIuBOjSDvIgTqxufzWdMKrVmqDJPClNVhRyVKYqrljvkUcAgkLRxiFZWMGAlCeqkVzFog & FxWhBbGKFErxDRazNHSpornPAikkfBQsZqubnUtB & wwViompTBFXdyeCVuMzkcxtOLxDKUVTDsTiwDIsIwaNVSwUYECsiK & UGXuvNWmYGMxYjUAancKprHoWKAEuaDMTwYBtvjEMCzipneHrrl & MZyRZOlLhsaFeZBWhzvVkQXHJmZnHSBroKZTWuCfjAsclOtpXyzKHgHVenomOLtxPfbaqHqiRuJLmCvVcQBBnRcUetRbYrAAcWFUdLpftjSBEWcmwjrYlCVYTDdVQDoOFpfD & BEKGjvkYUfuIscLZCdTqHwNxhnBttVcGSDmIzsYyJqZhljnivOrTvCfAQfzNViTYUAQOVrGlsNsGwmlqZxIdSBpdhZRtYllCuqaKvKkaoSBIlIndtaNBmDuadAAWjBjiDOmwiAEfofiZ & ByEAAZFbIeD & C:\Windows\system32\cmd < Naso.avi2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd3⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^JMwsfVERnDBURqxHDYhNCuTSPfHILUaLUPRAorBOUkHipfETBjTFiEaDSpBZhWuDkQqeoTmmbmSdnMIALOunwMEdvgIYBBAYytWzgBKINziHMeyuAwgmPHCmjKFUlAYWYUlzQfkprnLIEW$" Pensato.avi4⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tra.exe.comTra.exe.com C4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tra.exe.com C5⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\NHMpeZEWBd & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tra.exe.com"6⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 37⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\CMD5
ce0e2e7cec34bdb45b1715e27ff4392a
SHA17f712fd73116ffe23e8635ab1b21bd3c913ebd16
SHA2561840e6cb99ff48323d6e6e6e7c935ac55dfd4ee37af64a7d62653cb6452ec81c
SHA512539e844c04ee015109afed8430a4e18a94b16ad7f6a6f08680e983d8a6617e411db7cd397a135f6085833d9e6a1ad2c53c1a0a69489e3aa0dcc35af33091e801
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Naso.aviMD5
6313a65137cd6d5556d34d7f39056267
SHA167e6bf4a7811c19013dfd1cfb6a951d847958e52
SHA256c76dec1dac1bce06c1f4a423ee2d209160ed88c354362cb3f2901113ac8789c9
SHA5124cb3f6b92cc738dd1708fc9e09ee91f59006ca703a61f66d1bcd1ad7e8eb8e85f59768f9df655a2350de8bb28f1fe08209f6796451726c76b77ce5d9ee0163b0
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Pensato.aviMD5
804d284eb436d7768f234856024a1d8e
SHA177a298187c07a1b5b3b0b4be325a8aa707c6a8c3
SHA2564f9f80eab693f9b936970b837ab5483fc0b2957361b6cd41f8169e754aca48a2
SHA5122aae472eac3d2ee5dde24cf127dc786f8c051b24ad5dc7c70c99e8658ad3cb7241e8db2268ea16e74d0d798eec19786c1042c06c2d4c1a079741f190bfba3e4a
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Piacerebbe.aviMD5
ce0e2e7cec34bdb45b1715e27ff4392a
SHA17f712fd73116ffe23e8635ab1b21bd3c913ebd16
SHA2561840e6cb99ff48323d6e6e6e7c935ac55dfd4ee37af64a7d62653cb6452ec81c
SHA512539e844c04ee015109afed8430a4e18a94b16ad7f6a6f08680e983d8a6617e411db7cd397a135f6085833d9e6a1ad2c53c1a0a69489e3aa0dcc35af33091e801
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sento.aviMD5
ed90fd784c10d5f09d290c5d72bd88e9
SHA11542c0abf6a35616088a69401a011ac0a1efd668
SHA25661443aa4846103c65c23e0267e5ebd88f9e78c29c2d1ddff02a2ce0555d66d3c
SHA512504c4436097da5e227cd9f076b2a7da48c8a48fcfaf498231894439841c4fa253cb22bc9ee257d33b6f52638010e7658dbcfc10c5d8d6da694b968ebe1fb3d3d
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tra.exe.comMD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tra.exe.comMD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tra.exe.comMD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
C:\Users\Admin\AppData\Local\Temp\NHMpeZEWBd\GZQHNJ~1.ZIPMD5
f1fbf0851db60dcee75e426031f2efcf
SHA116bee86648eaf1ba90184fe57baaf71bff251a3d
SHA2567318a9846f75b28df544a95cf36385074dc264b771880d6c3b1da06e8b03499b
SHA5125b9c69a9547dda9533e36ae5cadcf8390418ef75d5f3b8db3ebfae71f0f9c915015696415d9ccc352bc97dec2649be3941f638b43432332f6822a6e90e7e64c1
-
C:\Users\Admin\AppData\Local\Temp\NHMpeZEWBd\VETRPU~1.ZIPMD5
a54c3b620d032f650a023b5235f146a8
SHA107a16746a6df308e647db6387828bdddd1f9eab5
SHA256ad67c00de299fc2792a03587e5b8f2419b0bb130707854e45937dcec3d2c79ff
SHA512a1c59899360c020265ae2fd0fa31730c22f65962881197da12c06e535b3575a20d97a22b0a38556e47d158cbb601ea54f00bca519bcbb214e47fc6b4aff4195b
-
C:\Users\Admin\AppData\Local\Temp\NHMpeZEWBd\_Files\_INFOR~1.TXTMD5
9422f15f2a5fb2cd5f51688cbb5b0b65
SHA178ad6c3e027fb54bea7e5cab2d7fe3de0f0a3ad9
SHA2561cfcf61dc7208f758174b6db85b3bd4f4310df6b92854c2dcaa83b3f879ee99d
SHA512a3c1c2100eaf87959f69cd0dde9cab67cadbafb8b5600faf47ce6d40787f24ab159265b5e1819f948b0fd91bdead1cbf19b8836497788afca2faa040a3cefd5e
-
C:\Users\Admin\AppData\Local\Temp\NHMpeZEWBd\_Files\_SCREE~1.JPEMD5
c6710fdf0ff0abeff43eb6f1aa7ae4f5
SHA1add1584a4ee16317c537abfa843f31608717d3ec
SHA25617c2b4d5e30c931d6770de9e347279ee07402d71bd440fe92d9f36849378c715
SHA5125afe062795edaa81fcc5fe082b29254930443368b5e9bac0ceade84217370d394ad99d32ccf6bfec4f7f52b704c632f836be27b1c949b31ecfefc342e39b80d8
-
C:\Users\Admin\AppData\Local\Temp\NHMpeZEWBd\files_\SCREEN~1.JPGMD5
c6710fdf0ff0abeff43eb6f1aa7ae4f5
SHA1add1584a4ee16317c537abfa843f31608717d3ec
SHA25617c2b4d5e30c931d6770de9e347279ee07402d71bd440fe92d9f36849378c715
SHA5125afe062795edaa81fcc5fe082b29254930443368b5e9bac0ceade84217370d394ad99d32ccf6bfec4f7f52b704c632f836be27b1c949b31ecfefc342e39b80d8
-
C:\Users\Admin\AppData\Local\Temp\NHMpeZEWBd\files_\SYSTEM~1.TXTMD5
2b51c792c3ff61fd62f0ddee106a5375
SHA111871136b12642f561ee325c466fe91d24c783d5
SHA25637a4a755278eeab0bd1cfde1927cdcc1f0925bceb60dde101b66f2e2feb449fc
SHA5124569e69bbfaee330cd703cea60a00992909536de705919d4393ee64990feb2c1be89fe9ec694846611d56f21c56a8f6218c4ce32bf723f13564e92fcda306fc1
-
memory/60-126-0x0000000000000000-mapping.dmp
-
memory/204-115-0x0000000000000000-mapping.dmp
-
memory/348-147-0x0000000000000000-mapping.dmp
-
memory/352-124-0x0000000000000000-mapping.dmp
-
memory/732-129-0x0000000000000000-mapping.dmp
-
memory/768-134-0x0000000000000000-mapping.dmp
-
memory/1052-143-0x0000000000000000-mapping.dmp
-
memory/1180-155-0x0000000000000000-mapping.dmp
-
memory/1552-127-0x0000000000000000-mapping.dmp
-
memory/1900-141-0x0000000000000000-mapping.dmp
-
memory/2088-122-0x0000000000000000-mapping.dmp
-
memory/2140-139-0x0000000000000000-mapping.dmp
-
memory/2192-116-0x0000000000000000-mapping.dmp
-
memory/2332-144-0x0000000000000000-mapping.dmp
-
memory/2676-136-0x0000000000000000-mapping.dmp
-
memory/2676-117-0x0000000000000000-mapping.dmp
-
memory/2732-154-0x0000000000C90000-0x0000000000C91000-memory.dmpFilesize
4KB
-
memory/2732-151-0x0000000000000000-mapping.dmp
-
memory/2736-140-0x0000000000000000-mapping.dmp
-
memory/2756-132-0x0000000000000000-mapping.dmp
-
memory/2840-114-0x0000000000000000-mapping.dmp
-
memory/3032-162-0x0000000000000000-mapping.dmp
-
memory/3304-118-0x0000000000000000-mapping.dmp
-
memory/3308-138-0x0000000000000000-mapping.dmp
-
memory/3308-119-0x0000000000000000-mapping.dmp
-
memory/3496-137-0x0000000000000000-mapping.dmp
-
memory/3648-135-0x0000000000000000-mapping.dmp
-
memory/3672-128-0x0000000000000000-mapping.dmp
-
memory/3836-149-0x0000000000000000-mapping.dmp
-
memory/3860-133-0x0000000000000000-mapping.dmp
-
memory/3948-121-0x0000000000000000-mapping.dmp
-
memory/3948-131-0x0000000000000000-mapping.dmp
-
memory/3984-123-0x0000000000000000-mapping.dmp
-
memory/4036-130-0x0000000000000000-mapping.dmp
-
memory/4044-125-0x0000000000000000-mapping.dmp
-
memory/4080-120-0x0000000000000000-mapping.dmp