Analysis
-
max time kernel
126s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-07-2022 03:56
Static task
static1
Behavioral task
behavioral1
Sample
3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe
Resource
win10v2004-20220414-en
General
-
Target
3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe
-
Size
813KB
-
MD5
be04d13e880984969b6d7eb4faf58a50
-
SHA1
815223967c0f594e4834dd58abf4ec87a57c53ec
-
SHA256
3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92
-
SHA512
bb19f6a902d68fbcae1a21394b10b9cc159fe6c87874b7fe8f8577197f86fd14a2f8f6a6938870e65063b199a320f7648bb3fd6f3cd9e8812c0c63be11b0e8c4
Malware Config
Extracted
hawkeye_reborn
- fields
- name
Signatures
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
resource yara_rule behavioral1/memory/956-82-0x0000000000400000-0x000000000053C000-memory.dmp m00nd3v_logger behavioral1/memory/956-83-0x000000000048B1CE-mapping.dmp m00nd3v_logger behavioral1/memory/956-86-0x0000000000400000-0x000000000053C000-memory.dmp m00nd3v_logger behavioral1/memory/956-87-0x0000000000400000-0x000000000053C000-memory.dmp m00nd3v_logger behavioral1/memory/956-88-0x0000000000400000-0x000000000053C000-memory.dmp m00nd3v_logger behavioral1/memory/956-90-0x0000000000402000-0x000000000048B200-memory.dmp m00nd3v_logger behavioral1/memory/956-89-0x0000000000402000-0x000000000048B200-memory.dmp m00nd3v_logger behavioral1/memory/956-91-0x0000000000400000-0x000000000053C000-memory.dmp m00nd3v_logger behavioral1/memory/956-94-0x0000000000400000-0x000000000053C000-memory.dmp m00nd3v_logger -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbamscheduler.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hijackthis.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgnt.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbampt.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avcenter.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avconfig.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avscan.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccuac.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgui.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgidsagent.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bdagent.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastSvc.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbamgui.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgnt.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrsx.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrsx.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgwdsvc.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bdagent.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ComboFix.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbamservice.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgidsagent.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zlclient.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\instup.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ComboFix.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbamservice.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbamscheduler.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcsrvx.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastUI.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avcenter.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avguard.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\keyscrambler.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastUI.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avguard.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgui.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbam.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbamgui.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hijackthis.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgwdsvc.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zlclient.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wireshark.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastSvc.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avscan.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spybotsd.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccuac.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcsrvx.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\keyscrambler.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avconfig.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wireshark.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\instup.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbam.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spybotsd.exe\Debugger = "rundll32.exe" 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe -
Loads dropped DLL 4 IoCs
pid Process 1464 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 1464 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 1464 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 1464 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 bot.whatismyipaddress.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1464 set thread context of 1368 1464 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 28 PID 1368 set thread context of 956 1368 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1464 wrote to memory of 1368 1464 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 28 PID 1464 wrote to memory of 1368 1464 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 28 PID 1464 wrote to memory of 1368 1464 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 28 PID 1464 wrote to memory of 1368 1464 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 28 PID 1464 wrote to memory of 1368 1464 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 28 PID 1464 wrote to memory of 1368 1464 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 28 PID 1464 wrote to memory of 1368 1464 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 28 PID 1464 wrote to memory of 1368 1464 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 28 PID 1464 wrote to memory of 1368 1464 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 28 PID 1464 wrote to memory of 1368 1464 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 28 PID 1368 wrote to memory of 956 1368 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 29 PID 1368 wrote to memory of 956 1368 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 29 PID 1368 wrote to memory of 956 1368 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 29 PID 1368 wrote to memory of 956 1368 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 29 PID 1368 wrote to memory of 956 1368 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 29 PID 1368 wrote to memory of 956 1368 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 29 PID 1368 wrote to memory of 956 1368 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 29 PID 1368 wrote to memory of 956 1368 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 29 PID 1368 wrote to memory of 956 1368 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 29 PID 1368 wrote to memory of 956 1368 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 29 PID 1368 wrote to memory of 956 1368 3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe"C:\Users\Admin\AppData\Local\Temp\3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe"C:\Users\Admin\AppData\Local\Temp\3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe"C:\Users\Admin\AppData\Local\Temp\3d308772c193701b7f16aa6386469d4cd3aa61368818095e19cd88e3f16abe92.exe"3⤵
- Sets file execution options in registry
PID:956
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5ac90321d9947dd1e4fd41e1a5e5c9f7d
SHA1d21e1af8e984633c543e6ba3158316765872497b
SHA256698ed66ab1863eb859cf79a9077468a1f0f1df46ccbdd7d006eb41ca7a9d3880
SHA51268cba99ae7740a35a87d7bca3d03155de932cee8cb3144e12c6a028f87cc01ee7d9ce746c6739260cde3b396a2cc3adc7384e822efa8c8777bc6c9ebc0dbb640
-
Filesize
11KB
MD53f176d1ee13b0d7d6bd92e1c7a0b9bae
SHA1fe582246792774c2c9dd15639ffa0aca90d6fd0b
SHA256fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e
SHA5120a69124819b7568d0dea4e9e85ce8fe61c7ba697c934e3a95e2dcfb9f252b1d9da7faf8774b6e8efd614885507acc94987733eba09a2f5e7098b774dfc8524b6
-
Filesize
11KB
MD53f176d1ee13b0d7d6bd92e1c7a0b9bae
SHA1fe582246792774c2c9dd15639ffa0aca90d6fd0b
SHA256fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e
SHA5120a69124819b7568d0dea4e9e85ce8fe61c7ba697c934e3a95e2dcfb9f252b1d9da7faf8774b6e8efd614885507acc94987733eba09a2f5e7098b774dfc8524b6
-
Filesize
11KB
MD53f176d1ee13b0d7d6bd92e1c7a0b9bae
SHA1fe582246792774c2c9dd15639ffa0aca90d6fd0b
SHA256fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e
SHA5120a69124819b7568d0dea4e9e85ce8fe61c7ba697c934e3a95e2dcfb9f252b1d9da7faf8774b6e8efd614885507acc94987733eba09a2f5e7098b774dfc8524b6