Analysis
-
max time kernel
170s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
17-02-2022 07:48
Static task
static1
Behavioral task
behavioral1
Sample
Order-826141730-pdf.exe
Resource
win7-en-20211208
General
-
Target
Order-826141730-pdf.exe
-
Size
289KB
-
MD5
8a43982e93e888387968e03fafb14fd1
-
SHA1
6328f5db0bd9a28dcfb71b936c6835c375299551
-
SHA256
6cd98e5cee60f33ca33f4e49d5f230feb6152510230abd25f8b5beab47e2afec
-
SHA512
68e5b99a36934d0afc494c18607731b146e069b431c210684016b21c48db3b1c3c876084a3641a0a7a59b01fce1c28d9e9210a55666cb62a24170e45b204d113
Malware Config
Extracted
xloader
2.5
uar3
sgadvocats.com
mjscannabus.com
hilldaley.com
ksdollhouse.com
hotgiftboutique.com
purebloodsmeet.com
relaunched.info
cap-glove.com
productcollection.store
fulikyy.xyz
remoteaviationjobs.com
bestcleancrystal.com
virtualorganizationpartner.com
bookgocar.com
hattuafhv.quest
makonigroup.com
officecom-myaccount.com
malgorzata-lac.com
e-learningeducators.com
hygilaur.com
kgv-lachswehr.com
salazarcomunicacion.com
robopython.com
corporateequity.online
complianceservicegroup.com
aperza-ex.com
webflowusa.com
asesoriasfinancieras.xyz
missolivesbranches.com
numiquest.com
criskconsultancy.com
gotemup.com
themaptalk.com
lakebalboahalf.com
cateringfrenchcroissant.com
paddocklakerealestate.com
lojaquerosurprezza.store
courtneywhitearmusic.com
geovannimaquinadevendas.online
pricklypairjazz.com
engagedigi.com
conduitforthespirit.com
anaheimaletrail.com
wholesalemall.store
alertsbecu.com
gestion-kayfra.com
youcanstores.com
qsuo.net
formadv.info
dihesia.xyz
carrreir.com
twenteeminuteswithtee.com
realliferenewal.com
officialprokodsukses.icu
stanfordgrouploscabos.com
maxicashpromir.xyz
zysqshjs.com
trc-clicks.com
chsclbd.com
amdproduce.net
republicoflies.com
beaux-parents.com
lucrativeapp.com
milbombas.com
alexanderplaywear.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1220-134-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1220-138-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3820-143-0x00000000003C0000-0x00000000003E9000-memory.dmp xloader -
Executes dropped EXE 2 IoCs
Processes:
luficfbm.exeluficfbm.exepid process 640 luficfbm.exe 1220 luficfbm.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
luficfbm.exeluficfbm.execolorcpl.exedescription pid process target process PID 640 set thread context of 1220 640 luficfbm.exe luficfbm.exe PID 1220 set thread context of 2456 1220 luficfbm.exe Explorer.EXE PID 3820 set thread context of 2456 3820 colorcpl.exe Explorer.EXE -
Drops file in Windows directory 3 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotifyIcon.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Modifies data under HKEY_USERS 49 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4212" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132897343305656276" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "1.212278" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4104" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.000000" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "2.941262" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
luficfbm.execolorcpl.exepid process 1220 luficfbm.exe 1220 luficfbm.exe 1220 luficfbm.exe 1220 luficfbm.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe 3820 colorcpl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2456 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
luficfbm.execolorcpl.exepid process 1220 luficfbm.exe 1220 luficfbm.exe 1220 luficfbm.exe 3820 colorcpl.exe 3820 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
luficfbm.execolorcpl.exeTiWorker.exedescription pid process Token: SeDebugPrivilege 1220 luficfbm.exe Token: SeDebugPrivilege 3820 colorcpl.exe Token: SeSecurityPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe Token: SeSecurityPrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe Token: SeSecurityPrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe Token: SeSecurityPrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe Token: SeSecurityPrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe Token: SeSecurityPrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe Token: SeSecurityPrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe Token: SeSecurityPrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe Token: SeSecurityPrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe Token: SeSecurityPrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe Token: SeSecurityPrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe Token: SeSecurityPrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe Token: SeSecurityPrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe Token: SeSecurityPrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe Token: SeSecurityPrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe Token: SeSecurityPrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe Token: SeSecurityPrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe Token: SeSecurityPrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe Token: SeSecurityPrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe Token: SeSecurityPrivilege 2844 TiWorker.exe Token: SeBackupPrivilege 2844 TiWorker.exe Token: SeRestorePrivilege 2844 TiWorker.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Order-826141730-pdf.exeluficfbm.exeExplorer.EXEcolorcpl.exedescription pid process target process PID 3808 wrote to memory of 640 3808 Order-826141730-pdf.exe luficfbm.exe PID 3808 wrote to memory of 640 3808 Order-826141730-pdf.exe luficfbm.exe PID 3808 wrote to memory of 640 3808 Order-826141730-pdf.exe luficfbm.exe PID 640 wrote to memory of 1220 640 luficfbm.exe luficfbm.exe PID 640 wrote to memory of 1220 640 luficfbm.exe luficfbm.exe PID 640 wrote to memory of 1220 640 luficfbm.exe luficfbm.exe PID 640 wrote to memory of 1220 640 luficfbm.exe luficfbm.exe PID 640 wrote to memory of 1220 640 luficfbm.exe luficfbm.exe PID 640 wrote to memory of 1220 640 luficfbm.exe luficfbm.exe PID 2456 wrote to memory of 3820 2456 Explorer.EXE colorcpl.exe PID 2456 wrote to memory of 3820 2456 Explorer.EXE colorcpl.exe PID 2456 wrote to memory of 3820 2456 Explorer.EXE colorcpl.exe PID 3820 wrote to memory of 3900 3820 colorcpl.exe cmd.exe PID 3820 wrote to memory of 3900 3820 colorcpl.exe cmd.exe PID 3820 wrote to memory of 3900 3820 colorcpl.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Order-826141730-pdf.exe"C:\Users\Admin\AppData\Local\Temp\Order-826141730-pdf.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\luficfbm.exeC:\Users\Admin\AppData\Local\Temp\luficfbm.exe C:\Users\Admin\AppData\Local\Temp\mtuwtwg3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\luficfbm.exeC:\Users\Admin\AppData\Local\Temp\luficfbm.exe C:\Users\Admin\AppData\Local\Temp\mtuwtwg4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\luficfbm.exe"3⤵
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\luficfbm.exeMD5
4af5b3b1cd041ab843382f93ad6c2789
SHA19759a4fce91218ff80001013c7cf9e30d4314f39
SHA25616c24c9af6ea42b6922724eeaf4041f828d873385c5311487038c3717fc299e2
SHA512a0ea24ed5ee97c33b46158986120c053b0fecda7b06585c4d3a77aebbf784af3d2f17a3a0e1675654c94d5684cd9efb8fbb207dd8e8cc4b71765c409e0262f94
-
C:\Users\Admin\AppData\Local\Temp\luficfbm.exeMD5
4af5b3b1cd041ab843382f93ad6c2789
SHA19759a4fce91218ff80001013c7cf9e30d4314f39
SHA25616c24c9af6ea42b6922724eeaf4041f828d873385c5311487038c3717fc299e2
SHA512a0ea24ed5ee97c33b46158986120c053b0fecda7b06585c4d3a77aebbf784af3d2f17a3a0e1675654c94d5684cd9efb8fbb207dd8e8cc4b71765c409e0262f94
-
C:\Users\Admin\AppData\Local\Temp\luficfbm.exeMD5
4af5b3b1cd041ab843382f93ad6c2789
SHA19759a4fce91218ff80001013c7cf9e30d4314f39
SHA25616c24c9af6ea42b6922724eeaf4041f828d873385c5311487038c3717fc299e2
SHA512a0ea24ed5ee97c33b46158986120c053b0fecda7b06585c4d3a77aebbf784af3d2f17a3a0e1675654c94d5684cd9efb8fbb207dd8e8cc4b71765c409e0262f94
-
C:\Users\Admin\AppData\Local\Temp\mtuwtwgMD5
931fd4faa392ee85e6ed59c5e06f7f8b
SHA1ab429dd4705545aa185c4df3dfce804dd7dcb70c
SHA256d0a32dc4668f9040fea078eb8a193bddf98eae674432cbaeb6815a9c84002c97
SHA5120c31e3ccdc4c9a9ce4b6e1478a6d2c162a6973a622efbd750d1986b54502299d54562582660975872ef1388361230194dc5270f9c2e0d32192dca2ac92c52e69
-
C:\Users\Admin\AppData\Local\Temp\yib77mookzpru4zy99d3MD5
9f97f3b2bc9603438f9ba0151c38c7b3
SHA1ea9b86f66c0d796ddb8cb02077855e06a749d07c
SHA256e26b5dbc7d4d377e67c7bcf76e36cca9d3e40c38c72682b939ef79532200b385
SHA512b480ec729c98ebe9274651e04bd6444a09b7e5307450532e66e51884a0436970e702161aa922ad0e2c05a03aa7c1209abbbebe721b75388d1f075a4a847b675c
-
memory/1220-138-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1220-137-0x00000000009B0000-0x0000000000CFA000-memory.dmpFilesize
3.3MB
-
memory/1220-139-0x000000000041D000-0x000000000041E000-memory.dmpFilesize
4KB
-
memory/1220-134-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1220-140-0x00000000006D0000-0x00000000006E1000-memory.dmpFilesize
68KB
-
memory/2456-141-0x0000000008BF0000-0x0000000008D09000-memory.dmpFilesize
1.1MB
-
memory/2456-146-0x0000000008DF0000-0x0000000008EF5000-memory.dmpFilesize
1.0MB
-
memory/3820-142-0x0000000000B20000-0x0000000000B39000-memory.dmpFilesize
100KB
-
memory/3820-143-0x00000000003C0000-0x00000000003E9000-memory.dmpFilesize
164KB
-
memory/3820-144-0x00000000044F0000-0x000000000483A000-memory.dmpFilesize
3.3MB
-
memory/3820-145-0x00000000043C0000-0x0000000004450000-memory.dmpFilesize
576KB