Analysis

  • max time kernel
    152s
  • max time network
    177s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    20/12/2021, 14:05

General

  • Target

    c8b5b3ada57ad45e2907330003c5e0df0f5881dad8e0bffe7a048972d9bc817c.exe

  • Size

    6.4MB

  • MD5

    2a7590502178c2856cc9f14a257f2de8

  • SHA1

    76838b4358b814d5fb4048bc780356e95c612956

  • SHA256

    c8b5b3ada57ad45e2907330003c5e0df0f5881dad8e0bffe7a048972d9bc817c

  • SHA512

    39374d3957e277bb3ac67b40b5e07a43327256ba9d06efb86ab59e6ff1995c1bbd3e527a88527aaddf890b450e0c24e2325c2e9e3cce30e975867bfdb7e6c992

Malware Config

Extracted

Family

socelars

C2

http://www.biohazardgraphics.com/

Extracted

Family

smokeloader

Version

2020

C2

http://rcacademy.at/upload/

http://e-lanpengeonline.com/upload/

http://vjcmvz.cn/upload/

http://galala.ru/upload/

http://witra.ru/upload/

rc4.i32
rc4.i32

Extracted

Family

vidar

Version

49.1

Botnet

915

C2

https://noc.social/@sergeev46

https://c.im/@sergeev47

Attributes
  • profile_id

    915

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars Payload 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE GCleaner Downloader Activity M5

    suricata: ET MALWARE GCleaner Downloader Activity M5

  • suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)

    suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)

  • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

  • suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

    suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

  • suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin

    suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin

  • NirSoft WebBrowserPassView 2 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 2 IoCs
  • Vidar Stealer 2 IoCs
  • ASPack v2.12-2.42 6 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 33 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 58 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8b5b3ada57ad45e2907330003c5e0df0f5881dad8e0bffe7a048972d9bc817c.exe
    "C:\Users\Admin\AppData\Local\Temp\c8b5b3ada57ad45e2907330003c5e0df0f5881dad8e0bffe7a048972d9bc817c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:652
      • C:\Users\Admin\AppData\Local\Temp\7zSC826D226\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zSC826D226\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1460
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable
          4⤵
            PID:1828
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable
              5⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1696
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
            4⤵
              PID:1056
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
                5⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1376
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Sat00c34ad37732.exe
              4⤵
              • Loads dropped DLL
              PID:1532
              • C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat00c34ad37732.exe
                Sat00c34ad37732.exe
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Checks processor information in registry
                PID:1780
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c taskkill /im Sat00c34ad37732.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat00c34ad37732.exe" & del C:\ProgramData\*.dll & exit
                  6⤵
                    PID:2836
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /im Sat00c34ad37732.exe /f
                      7⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2996
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout /t 6
                      7⤵
                      • Delays execution with timeout.exe
                      PID:1848
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c Sat001aa7b2efac304.exe
                4⤵
                • Loads dropped DLL
                PID:1520
                • C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat001aa7b2efac304.exe
                  Sat001aa7b2efac304.exe
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:1592
                  • C:\Windows\SysWOW64\msiexec.exe
                    "C:\Windows\System32\msiexec.exe" /y .\O4ZWUyCC.BN
                    6⤵
                      PID:2364
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c Sat0017e38210d427.exe
                  4⤵
                    PID:988
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c Sat009e22e644.exe
                    4⤵
                    • Loads dropped DLL
                    PID:1904
                    • C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat009e22e644.exe
                      Sat009e22e644.exe
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      PID:1076
                      • C:\Users\Admin\AppData\Local\Temp\is-JPIDN.tmp\Sat009e22e644.tmp
                        "C:\Users\Admin\AppData\Local\Temp\is-JPIDN.tmp\Sat009e22e644.tmp" /SL5="$4011C,870426,780800,C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat009e22e644.exe"
                        6⤵
                        • Executes dropped EXE
                        PID:1920
                        • C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat009e22e644.exe
                          "C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat009e22e644.exe" /SILENT
                          7⤵
                          • Executes dropped EXE
                          PID:672
                          • C:\Users\Admin\AppData\Local\Temp\is-7STJH.tmp\Sat009e22e644.tmp
                            "C:\Users\Admin\AppData\Local\Temp\is-7STJH.tmp\Sat009e22e644.tmp" /SL5="$110156,870426,780800,C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat009e22e644.exe" /SILENT
                            8⤵
                            • Executes dropped EXE
                            • Suspicious behavior: GetForegroundWindowSpam
                            PID:2060
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c Sat00b30428872231f.exe
                    4⤵
                    • Loads dropped DLL
                    PID:1200
                    • C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat00b30428872231f.exe
                      Sat00b30428872231f.exe
                      5⤵
                      • Executes dropped EXE
                      PID:1912
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c Sat00d69b74c2.exe
                    4⤵
                    • Loads dropped DLL
                    PID:1536
                    • C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat00d69b74c2.exe
                      Sat00d69b74c2.exe
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Modifies system certificate store
                      • Suspicious use of AdjustPrivilegeToken
                      PID:440
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd.exe /c taskkill /f /im chrome.exe
                        6⤵
                          PID:2316
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /f /im chrome.exe
                            7⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2348
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c Sat009173a870063a0e.exe
                      4⤵
                      • Loads dropped DLL
                      PID:1752
                      • C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat009173a870063a0e.exe
                        Sat009173a870063a0e.exe
                        5⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        PID:1948
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c Sat00834bcc8317.exe
                      4⤵
                      • Loads dropped DLL
                      PID:880
                      • C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat00834bcc8317.exe
                        Sat00834bcc8317.exe
                        5⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetThreadContext
                        • Suspicious use of AdjustPrivilegeToken
                        PID:616
                        • C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat00834bcc8317.exe
                          C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat00834bcc8317.exe
                          6⤵
                          • Executes dropped EXE
                          PID:2644
                        • C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat00834bcc8317.exe
                          C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat00834bcc8317.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2720
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c Sat00d44aabf63254180.exe
                      4⤵
                      • Loads dropped DLL
                      PID:572
                      • C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat00d44aabf63254180.exe
                        Sat00d44aabf63254180.exe
                        5⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Checks SCSI registry key(s)
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: MapViewOfSection
                        PID:724
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c Sat0028b1660366.exe
                      4⤵
                      • Loads dropped DLL
                      PID:1884
                      • C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat0028b1660366.exe
                        Sat0028b1660366.exe
                        5⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        PID:1368
                        • C:\Users\Admin\AppData\Local\Temp\is-P0HNQ.tmp\Sat0028b1660366.tmp
                          "C:\Users\Admin\AppData\Local\Temp\is-P0HNQ.tmp\Sat0028b1660366.tmp" /SL5="$40122,140047,56320,C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat0028b1660366.exe"
                          6⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          PID:1060
                          • C:\Users\Admin\AppData\Local\Temp\is-EGJFE.tmp\Tougay.exe
                            "C:\Users\Admin\AppData\Local\Temp\is-EGJFE.tmp\Tougay.exe" /S /UID=91
                            7⤵
                            • Drops file in Drivers directory
                            • Executes dropped EXE
                            • Adds Run key to start application
                            • Drops file in Program Files directory
                            PID:2412
                            • C:\Users\Admin\AppData\Local\Temp\10-3e756-d50-aebb3-9674c1901db63\Litaenilaesha.exe
                              "C:\Users\Admin\AppData\Local\Temp\10-3e756-d50-aebb3-9674c1901db63\Litaenilaesha.exe"
                              8⤵
                              • Executes dropped EXE
                              PID:1292
                            • C:\Users\Admin\AppData\Local\Temp\54-82e84-0c6-1d8b3-12fc9e29c330c\Nuvefaetura.exe
                              "C:\Users\Admin\AppData\Local\Temp\54-82e84-0c6-1d8b3-12fc9e29c330c\Nuvefaetura.exe"
                              8⤵
                              • Executes dropped EXE
                              PID:2876
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c Sat002529dc82e.exe
                      4⤵
                      • Loads dropped DLL
                      PID:1260
                      • C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat002529dc82e.exe
                        Sat002529dc82e.exe
                        5⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of AdjustPrivilegeToken
                        PID:968
                        • C:\Users\Admin\AppData\Local\1e4f6f40-bf4d-49f1-b2c7-84d8768591f3.exe
                          "C:\Users\Admin\AppData\Local\1e4f6f40-bf4d-49f1-b2c7-84d8768591f3.exe"
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2776
                        • C:\Users\Admin\AppData\Local\03a65446-e97e-4978-9271-1f71341c0d24.exe
                          "C:\Users\Admin\AppData\Local\03a65446-e97e-4978-9271-1f71341c0d24.exe"
                          6⤵
                          • Executes dropped EXE
                          • Adds Run key to start application
                          PID:2816
                          • C:\Users\Admin\AppData\Roaming\23963189\4296601542966015.exe
                            "C:\Users\Admin\AppData\Roaming\23963189\4296601542966015.exe"
                            7⤵
                              PID:2140
                          • C:\Users\Admin\AppData\Local\4084e902-84f4-44a9-8be8-515d8d1a3c53.exe
                            "C:\Users\Admin\AppData\Local\4084e902-84f4-44a9-8be8-515d8d1a3c53.exe"
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            PID:2864
                            • C:\Program Files\Internet Explorer\iexplore.exe
                              "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=4084e902-84f4-44a9-8be8-515d8d1a3c53.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
                              7⤵
                                PID:1828
                            • C:\Users\Admin\AppData\Local\d4037f37-288e-430e-bc01-f71a3fa4d923.exe
                              "C:\Users\Admin\AppData\Local\d4037f37-288e-430e-bc01-f71a3fa4d923.exe"
                              6⤵
                              • Executes dropped EXE
                              PID:2880
                            • C:\Users\Admin\AppData\Local\90275538-c7a4-413b-ac3d-12e60595d73a.exe
                              "C:\Users\Admin\AppData\Local\90275538-c7a4-413b-ac3d-12e60595d73a.exe"
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2912
                              • C:\Users\Admin\AppData\Roaming\4333438.exe
                                "C:\Users\Admin\AppData\Roaming\4333438.exe"
                                7⤵
                                • Executes dropped EXE
                                PID:1112
                                • C:\Windows\SysWOW64\control.exe
                                  "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\5wSR6.cPL",
                                  8⤵
                                    PID:572
                                    • C:\Windows\SysWOW64\rundll32.exe
                                      "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\5wSR6.cPL",
                                      9⤵
                                        PID:852
                                        • C:\Windows\system32\RunDll32.exe
                                          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\5wSR6.cPL",
                                          10⤵
                                            PID:1336
                                            • C:\Windows\SysWOW64\rundll32.exe
                                              "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\5wSR6.cPL",
                                              11⤵
                                                PID:956
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c Sat005ba53214084.exe
                                  4⤵
                                  • Loads dropped DLL
                                  PID:1336
                                  • C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat005ba53214084.exe
                                    Sat005ba53214084.exe
                                    5⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetThreadContext
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1596
                                    • C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat005ba53214084.exe
                                      C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat005ba53214084.exe
                                      6⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2652
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c Sat00cf1b178aa9919.exe
                                  4⤵
                                  • Loads dropped DLL
                                  PID:884
                                  • C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat00cf1b178aa9919.exe
                                    Sat00cf1b178aa9919.exe
                                    5⤵
                                    • Executes dropped EXE
                                    • Checks computer location settings
                                    • Loads dropped DLL
                                    PID:1516
                                    • C:\Users\Admin\Pictures\Adobe Films\R_n9pz_alIW_4mE9Gg_SBFvj.exe
                                      "C:\Users\Admin\Pictures\Adobe Films\R_n9pz_alIW_4mE9Gg_SBFvj.exe"
                                      6⤵
                                      • Executes dropped EXE
                                      PID:440
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 768
                                      6⤵
                                      • Program crash
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1260
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c Sat00341fe3c5fb.exe /mixtwo
                                  4⤵
                                  • Loads dropped DLL
                                  PID:1112
                                  • C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat00341fe3c5fb.exe
                                    Sat00341fe3c5fb.exe /mixtwo
                                    5⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetThreadContext
                                    PID:1000
                                    • C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat00341fe3c5fb.exe
                                      Sat00341fe3c5fb.exe /mixtwo
                                      6⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:1600
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c taskkill /im "Sat00341fe3c5fb.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zSC826D226\Sat00341fe3c5fb.exe" & exit
                                        7⤵
                                          PID:1296
                                          • C:\Windows\SysWOW64\taskkill.exe
                                            taskkill /im "Sat00341fe3c5fb.exe" /f
                                            8⤵
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1848

                            Network

                                  MITRE ATT&CK Enterprise v6

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • memory/616-254-0x0000000000CD0000-0x0000000000CD1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/616-256-0x0000000000200000-0x0000000000201000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/616-229-0x00000000012C0000-0x00000000012C1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/672-238-0x0000000000400000-0x00000000004CC000-memory.dmp

                                    Filesize

                                    816KB

                                  • memory/724-212-0x0000000000240000-0x0000000000249000-memory.dmp

                                    Filesize

                                    36KB

                                  • memory/724-211-0x00000000006B0000-0x00000000006C1000-memory.dmp

                                    Filesize

                                    68KB

                                  • memory/724-213-0x0000000000400000-0x00000000004CC000-memory.dmp

                                    Filesize

                                    816KB

                                  • memory/852-334-0x000000002D8B0000-0x000000002D965000-memory.dmp

                                    Filesize

                                    724KB

                                  • memory/852-333-0x00000000020D0000-0x0000000002187000-memory.dmp

                                    Filesize

                                    732KB

                                  • memory/852-332-0x00000000000D0000-0x00000000000D1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/956-350-0x0000000000190000-0x0000000000191000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/968-235-0x0000000000850000-0x0000000000851000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/968-258-0x00000000009E0000-0x00000000009E1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1060-223-0x0000000000320000-0x0000000000321000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1076-209-0x0000000000400000-0x00000000004CC000-memory.dmp

                                    Filesize

                                    816KB

                                  • memory/1260-359-0x0000000000540000-0x0000000000541000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1292-346-0x0000000000AC0000-0x0000000000AC2000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1300-217-0x0000000002AE0000-0x0000000002AF6000-memory.dmp

                                    Filesize

                                    88KB

                                  • memory/1368-201-0x0000000000400000-0x0000000000414000-memory.dmp

                                    Filesize

                                    80KB

                                  • memory/1376-260-0x0000000002130000-0x0000000002D7A000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/1376-244-0x0000000002130000-0x0000000002D7A000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/1376-263-0x0000000002130000-0x0000000002D7A000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/1460-91-0x0000000064940000-0x0000000064959000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1460-103-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                    Filesize

                                    1.5MB

                                  • memory/1460-86-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                    Filesize

                                    1.5MB

                                  • memory/1460-89-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                    Filesize

                                    1.5MB

                                  • memory/1460-88-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                    Filesize

                                    1.5MB

                                  • memory/1460-85-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                    Filesize

                                    572KB

                                  • memory/1460-92-0x0000000064940000-0x0000000064959000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1460-94-0x0000000064940000-0x0000000064959000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1460-84-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                    Filesize

                                    572KB

                                  • memory/1460-87-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                    Filesize

                                    1.5MB

                                  • memory/1460-95-0x0000000064940000-0x0000000064959000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/1460-97-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                    Filesize

                                    572KB

                                  • memory/1460-90-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                    Filesize

                                    152KB

                                  • memory/1460-107-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                    Filesize

                                    152KB

                                  • memory/1460-83-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                    Filesize

                                    572KB

                                  • memory/1516-252-0x0000000003FB0000-0x00000000040FE000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/1596-227-0x0000000000280000-0x0000000000281000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1596-255-0x0000000000310000-0x0000000000311000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1596-253-0x0000000004EC0000-0x0000000004EC1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1600-192-0x0000000000400000-0x0000000000450000-memory.dmp

                                    Filesize

                                    320KB

                                  • memory/1600-204-0x0000000000400000-0x0000000000450000-memory.dmp

                                    Filesize

                                    320KB

                                  • memory/1600-210-0x0000000000400000-0x0000000000450000-memory.dmp

                                    Filesize

                                    320KB

                                  • memory/1600-191-0x0000000000400000-0x0000000000450000-memory.dmp

                                    Filesize

                                    320KB

                                  • memory/1616-54-0x0000000075D11000-0x0000000075D13000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1696-262-0x0000000001F80000-0x0000000002BCA000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/1696-261-0x0000000001F80000-0x0000000002BCA000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/1696-243-0x0000000001F80000-0x0000000002BCA000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/1780-220-0x0000000001E40000-0x0000000001F19000-memory.dmp

                                    Filesize

                                    868KB

                                  • memory/1780-218-0x00000000002C0000-0x000000000033D000-memory.dmp

                                    Filesize

                                    500KB

                                  • memory/1780-222-0x0000000000400000-0x0000000000539000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1920-226-0x0000000000260000-0x0000000000261000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/2060-242-0x0000000000270000-0x0000000000271000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/2412-251-0x0000000002170000-0x0000000002172000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/2652-322-0x0000000000B90000-0x0000000000B91000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/2720-323-0x0000000000B50000-0x0000000000B51000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/2776-314-0x0000000000E00000-0x0000000000E01000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/2864-287-0x0000000000380000-0x00000000003C5000-memory.dmp

                                    Filesize

                                    276KB

                                  • memory/2876-349-0x0000000002250000-0x0000000002252000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/2880-288-0x00000000003E0000-0x0000000000425000-memory.dmp

                                    Filesize

                                    276KB

                                  • memory/2912-317-0x0000000004B70000-0x0000000004B71000-memory.dmp

                                    Filesize

                                    4KB