Analysis
-
max time kernel
167s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 15:08
Static task
static1
Behavioral task
behavioral1
Sample
d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe
Resource
win10v2004-20220721-en
General
-
Target
d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe
-
Size
2.0MB
-
MD5
ebab50478bb4e87bb5549ee04ea68bed
-
SHA1
7cca4512fae384586c61ce4b7d55394a3b008bec
-
SHA256
d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d
-
SHA512
e16195276098a7798bb20adc55601a63994c7784bb5c52c644ae29ad21fb9222661145387d3e8fc966f253ede66da5aa2820356a2386c54cad364b7182ef9811
Malware Config
Extracted
hawkeye_reborn
10.0.0.0
Protocol: smtp- Host:
mail.omanipackaging.com - Port:
587 - Username:
[email protected] - Password:
Opcgm@1241234$$@#
082a0479-b2e8-4283-96ec-9bc10bdddac4
-
fields
map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:true _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:Opcgm@1241234$$@# _EmailPort:587 _EmailSSL:false _EmailServer:mail.omanipackaging.com _EmailUsername:[email protected] _ExecutionDelay:10 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:10 _MeltFile:false _Mutex:082a0479-b2e8-4283-96ec-9bc10bdddac4 _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:false _SystemInfo:true _Version:10.0.0.0 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]
-
name
HawkEye RebornX, Version=10.0.0.0, Culture=neutral, PublicKeyToken=null
Signatures
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mavinject.url d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe -
Looks up external IP address via web service 11 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 bot.whatismyipaddress.com 23 bot.whatismyipaddress.com 24 bot.whatismyipaddress.com 25 bot.whatismyipaddress.com 26 bot.whatismyipaddress.com 27 bot.whatismyipaddress.com 28 bot.whatismyipaddress.com 16 bot.whatismyipaddress.com 19 bot.whatismyipaddress.com 22 bot.whatismyipaddress.com 29 bot.whatismyipaddress.com -
Suspicious use of SetThreadContext 12 IoCs
description pid Process procid_target PID 2536 set thread context of 1956 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 80 PID 2536 set thread context of 2760 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 82 PID 2536 set thread context of 208 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 84 PID 2536 set thread context of 3820 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 85 PID 2536 set thread context of 1028 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 86 PID 2536 set thread context of 4204 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 87 PID 2536 set thread context of 4772 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 88 PID 2536 set thread context of 4088 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 89 PID 2536 set thread context of 1948 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 90 PID 2536 set thread context of 1016 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 91 PID 2536 set thread context of 1848 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 92 PID 2536 set thread context of 4468 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 93 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2536 wrote to memory of 1956 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 80 PID 2536 wrote to memory of 1956 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 80 PID 2536 wrote to memory of 1956 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 80 PID 2536 wrote to memory of 1956 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 80 PID 2536 wrote to memory of 1956 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 80 PID 2536 wrote to memory of 2760 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 82 PID 2536 wrote to memory of 2760 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 82 PID 2536 wrote to memory of 2760 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 82 PID 2536 wrote to memory of 2760 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 82 PID 2536 wrote to memory of 2760 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 82 PID 2536 wrote to memory of 208 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 84 PID 2536 wrote to memory of 208 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 84 PID 2536 wrote to memory of 208 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 84 PID 2536 wrote to memory of 208 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 84 PID 2536 wrote to memory of 208 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 84 PID 2536 wrote to memory of 3820 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 85 PID 2536 wrote to memory of 3820 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 85 PID 2536 wrote to memory of 3820 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 85 PID 2536 wrote to memory of 3820 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 85 PID 2536 wrote to memory of 3820 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 85 PID 2536 wrote to memory of 1028 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 86 PID 2536 wrote to memory of 1028 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 86 PID 2536 wrote to memory of 1028 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 86 PID 2536 wrote to memory of 1028 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 86 PID 2536 wrote to memory of 1028 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 86 PID 2536 wrote to memory of 4204 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 87 PID 2536 wrote to memory of 4204 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 87 PID 2536 wrote to memory of 4204 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 87 PID 2536 wrote to memory of 4204 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 87 PID 2536 wrote to memory of 4204 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 87 PID 2536 wrote to memory of 4772 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 88 PID 2536 wrote to memory of 4772 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 88 PID 2536 wrote to memory of 4772 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 88 PID 2536 wrote to memory of 4772 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 88 PID 2536 wrote to memory of 4772 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 88 PID 2536 wrote to memory of 4088 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 89 PID 2536 wrote to memory of 4088 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 89 PID 2536 wrote to memory of 4088 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 89 PID 2536 wrote to memory of 4088 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 89 PID 2536 wrote to memory of 4088 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 89 PID 2536 wrote to memory of 1948 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 90 PID 2536 wrote to memory of 1948 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 90 PID 2536 wrote to memory of 1948 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 90 PID 2536 wrote to memory of 1948 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 90 PID 2536 wrote to memory of 1948 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 90 PID 2536 wrote to memory of 1016 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 91 PID 2536 wrote to memory of 1016 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 91 PID 2536 wrote to memory of 1016 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 91 PID 2536 wrote to memory of 1016 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 91 PID 2536 wrote to memory of 1016 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 91 PID 2536 wrote to memory of 1848 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 92 PID 2536 wrote to memory of 1848 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 92 PID 2536 wrote to memory of 1848 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 92 PID 2536 wrote to memory of 1848 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 92 PID 2536 wrote to memory of 1848 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 92 PID 2536 wrote to memory of 4468 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 93 PID 2536 wrote to memory of 4468 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 93 PID 2536 wrote to memory of 4468 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 93 PID 2536 wrote to memory of 4468 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 93 PID 2536 wrote to memory of 4468 2536 d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe"C:\Users\Admin\AppData\Local\Temp\d9fde6f90d9dd6a34cb74ef36906db9a6d1d671a277cfb95f84cf1722fad443d.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:1956
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:2760
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:208
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:3820
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:1028
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:4204
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:4772
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:4088
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:1948
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:1016
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:1848
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:4468
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
680B
MD58faf48455ffc017246b08e89f6ba1956
SHA12f6c39d9828b3f95dc050f52a38cd7d3f543baf8
SHA2569a643ce75fdfe840ea158010f28f8520bea2a60220494b44a25039a2a318fc35
SHA512dafd4f1bf894ef1c61ff65dbcb8d5a151b33d8e39f3e354e6e433c8c7c0e8c2105615bffde8d796e361b77ccbe917a70ca4d03cc8cb6396f0495ff9e5b7010a9