Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-07-2022 03:42
Static task
static1
Behavioral task
behavioral1
Sample
be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe
Resource
win10v2004-20220414-en
General
-
Target
be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe
-
Size
1.7MB
-
MD5
1bf3dfb666cc4335c040b425e6c3d01a
-
SHA1
a92cc67625b720d5ded99817d32d6e775a5480e2
-
SHA256
be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129
-
SHA512
1064a3bcad22b3e9fd281d8fec02f08c72f8564510657caeba50c06173c4ecc73f712f5b2be47aa2e8ba7109b59be249038399313fbc99b31ea9829980f5100e
Malware Config
Signatures
-
BazarBackdoor
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
-
Bazar/Team9 Backdoor payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1812-130-0x0000000140000000-0x00000001404B5000-memory.dmp BazarBackdoorVar3 behavioral2/memory/1812-135-0x0000000140000000-0x00000001404B5000-memory.dmp BazarBackdoorVar3 -
Loads dropped DLL 2 IoCs
Processes:
be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exepid process 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exedescription ioc process File opened (read-only) \??\Y: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\A: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\M: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\O: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\S: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\T: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\W: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\X: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\E: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\F: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\G: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\I: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\J: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\Z: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\H: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\K: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\N: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\Q: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\U: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\V: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\B: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\L: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\P: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe File opened (read-only) \??\R: be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exepid process 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exedescription pid process Token: SeDebugPrivilege 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe Token: 33 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe Token: SeIncBasePriorityPrivilege 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exepid process 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exepid process 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exepid process 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe 1812 be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe"C:\Users\Admin\AppData\Local\Temp\be022464fe5b3a190e5554d7cf974faa2622c0b13ed6551b9c9e83a28c6b8129.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\RimeToolData\x64\sqlite3.dllFilesize
1.9MB
MD57bc084895c61622dfc86e9b9904db093
SHA1f421313979ddfaeb951bc8f7d6a0d89c63d2bb3c
SHA25675d6bdc2ce9e0e718f99897910bfadeaac3d8d7cf2f08ddc4129f7441a525079
SHA5126e4cfdae9e4d1f88e5b6d82c8e658cdfdcefdde47d6834c9dc18b7ba9499aca1a868c58ec4e36efb1856ba65f0fd8cc1ace1662d235cec6dfa7c0e0b5251de67
-
C:\Users\Admin\AppData\Roaming\RimeToolData\x64\sqlite3.dllFilesize
1.9MB
MD57bc084895c61622dfc86e9b9904db093
SHA1f421313979ddfaeb951bc8f7d6a0d89c63d2bb3c
SHA25675d6bdc2ce9e0e718f99897910bfadeaac3d8d7cf2f08ddc4129f7441a525079
SHA5126e4cfdae9e4d1f88e5b6d82c8e658cdfdcefdde47d6834c9dc18b7ba9499aca1a868c58ec4e36efb1856ba65f0fd8cc1ace1662d235cec6dfa7c0e0b5251de67
-
memory/1812-130-0x0000000140000000-0x00000001404B5000-memory.dmpFilesize
4.7MB
-
memory/1812-134-0x0000000006BD0000-0x0000000006DB2000-memory.dmpFilesize
1.9MB
-
memory/1812-135-0x0000000140000000-0x00000001404B5000-memory.dmpFilesize
4.7MB