Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
98s -
max time network
99s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
7dd4fd6b6a5f45bee6b53e266b6cbf734a11814301a88d0d4dfa608fae6ed0b6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7dd4fd6b6a5f45bee6b53e266b6cbf734a11814301a88d0d4dfa608fae6ed0b6.exe
Resource
win10v2004-20220812-en
General
-
Target
7dd4fd6b6a5f45bee6b53e266b6cbf734a11814301a88d0d4dfa608fae6ed0b6.exe
-
Size
44KB
-
MD5
8ea6e59478ab79f1e499f2d37a7fa82a
-
SHA1
cac1b390cb01d4129c9a323597ed7f2cf044905a
-
SHA256
7dd4fd6b6a5f45bee6b53e266b6cbf734a11814301a88d0d4dfa608fae6ed0b6
-
SHA512
9b2b2df81daf23f4e236ffc33f78ea81ae82e220c231860076eb848b94263850da2b630e512a2733bd61e416c1ba5db88f426d5e497cb6a9962fd0a0af91c882
-
SSDEEP
768:D3rnGHcFIKtK3y89pXdqKIsG4qTDMqR7AtmqDgfj70319irrHoSpEYW:TrGmt2y8kLDMqNANgX031i1iYW
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1496 h4ckdn1234.exe 1896 h4ckdn1234.exe 964 h4ckdn1234.exe 2004 h4ckdn1234.exe 1752 h4ckdn1234.exe 1664 h4ckdn1234.exe 1812 h4ckdn1234.exe 1880 h4ckdn1234.exe 1276 h4ckdn1234.exe 1604 h4ckdn1234.exe 1224 h4ckdn1234.exe 1800 h4ckdn1234.exe 608 h4ckdn1234.exe 748 h4ckdn1234.exe 1564 h4ckdn1234.exe 1140 h4ckdn1234.exe 1384 h4ckdn1234.exe 292 h4ckdn1234.exe 924 h4ckdn1234.exe 1932 h4ckdn1234.exe 1928 h4ckdn1234.exe 2008 h4ckdn1234.exe 1984 h4ckdn1234.exe 1720 h4ckdn1234.exe 584 h4ckdn1234.exe 1744 h4ckdn1234.exe 604 h4ckdn1234.exe 1056 h4ckdn1234.exe 668 h4ckdn1234.exe 1152 h4ckdn1234.exe 976 h4ckdn1234.exe 1112 h4ckdn1234.exe 1908 h4ckdn1234.exe 1640 h4ckdn1234.exe 2044 h4ckdn1234.exe 1104 h4ckdn1234.exe 1180 h4ckdn1234.exe 1724 h4ckdn1234.exe 576 h4ckdn1234.exe 1440 h4ckdn1234.exe 1620 h4ckdn1234.exe 1828 h4ckdn1234.exe 1460 h4ckdn1234.exe 1704 h4ckdn1234.exe 2064 h4ckdn1234.exe 2088 h4ckdn1234.exe 2112 h4ckdn1234.exe 2136 h4ckdn1234.exe 2160 h4ckdn1234.exe 2184 h4ckdn1234.exe 2204 h4ckdn1234.exe 2228 h4ckdn1234.exe 2252 h4ckdn1234.exe 2276 h4ckdn1234.exe 2296 h4ckdn1234.exe 2320 h4ckdn1234.exe 2340 h4ckdn1234.exe 2360 h4ckdn1234.exe 2380 h4ckdn1234.exe 2404 h4ckdn1234.exe 2424 h4ckdn1234.exe 2448 h4ckdn1234.exe 2472 h4ckdn1234.exe 2496 h4ckdn1234.exe -
Loads dropped DLL 64 IoCs
pid Process 656 7dd4fd6b6a5f45bee6b53e266b6cbf734a11814301a88d0d4dfa608fae6ed0b6.exe 656 7dd4fd6b6a5f45bee6b53e266b6cbf734a11814301a88d0d4dfa608fae6ed0b6.exe 1496 h4ckdn1234.exe 1496 h4ckdn1234.exe 1896 h4ckdn1234.exe 1896 h4ckdn1234.exe 964 h4ckdn1234.exe 964 h4ckdn1234.exe 2004 h4ckdn1234.exe 2004 h4ckdn1234.exe 1752 h4ckdn1234.exe 1752 h4ckdn1234.exe 1664 h4ckdn1234.exe 1664 h4ckdn1234.exe 1812 h4ckdn1234.exe 1812 h4ckdn1234.exe 1880 h4ckdn1234.exe 1880 h4ckdn1234.exe 1276 h4ckdn1234.exe 1276 h4ckdn1234.exe 1604 h4ckdn1234.exe 1604 h4ckdn1234.exe 1224 h4ckdn1234.exe 1224 h4ckdn1234.exe 1800 h4ckdn1234.exe 1800 h4ckdn1234.exe 608 h4ckdn1234.exe 608 h4ckdn1234.exe 748 h4ckdn1234.exe 748 h4ckdn1234.exe 1564 h4ckdn1234.exe 1564 h4ckdn1234.exe 1140 h4ckdn1234.exe 1140 h4ckdn1234.exe 1384 h4ckdn1234.exe 1384 h4ckdn1234.exe 292 h4ckdn1234.exe 292 h4ckdn1234.exe 924 h4ckdn1234.exe 924 h4ckdn1234.exe 1932 h4ckdn1234.exe 1932 h4ckdn1234.exe 1928 h4ckdn1234.exe 1928 h4ckdn1234.exe 2008 h4ckdn1234.exe 2008 h4ckdn1234.exe 1984 h4ckdn1234.exe 1984 h4ckdn1234.exe 1720 h4ckdn1234.exe 1720 h4ckdn1234.exe 584 h4ckdn1234.exe 584 h4ckdn1234.exe 1744 h4ckdn1234.exe 1744 h4ckdn1234.exe 604 h4ckdn1234.exe 604 h4ckdn1234.exe 1056 h4ckdn1234.exe 1056 h4ckdn1234.exe 668 h4ckdn1234.exe 668 h4ckdn1234.exe 1152 h4ckdn1234.exe 1152 h4ckdn1234.exe 976 h4ckdn1234.exe 976 h4ckdn1234.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 7dd4fd6b6a5f45bee6b53e266b6cbf734a11814301a88d0d4dfa608fae6ed0b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\h4ckdn1234 = "C:\\Windows\\system32\\h4ckdn1234.exe" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run h4ckdn1234.exe -
Modifies WinLogon 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Impersonate = "0" h4ckdn1234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Impersonate = "0" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Shutdown = "WLEShutdown" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234 h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Logon = "WLELogon" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234 h4ckdn1234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Impersonate = "0" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234 h4ckdn1234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Asynchronous = "0" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Logon = "WLELogon" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Logoff = "WLELogoff" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Unlock = "WLEUnlock" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\DllName = "h4ckdn1234.dll" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Logon = "WLELogon" h4ckdn1234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Impersonate = "0" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\StopScreenSaver = "WLEStopScreenSaver" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify h4ckdn1234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Impersonate = "0" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\DllName = "h4ckdn1234.dll" h4ckdn1234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Asynchronous = "0" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Shutdown = "WLEShutdown" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Logon = "WLELogon" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Shutdown = "WLEShutdown" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\DllName = "h4ckdn1234.dll" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Shutdown = "WLEShutdown" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Shutdown = "WLEShutdown" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Logon = "WLELogon" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Unlock = "WLEUnlock" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\DllName = "h4ckdn1234.dll" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Logon = "WLELogon" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Lock = "WLELock" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Shutdown = "WLEShutdown" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Shutdown = "WLEShutdown" h4ckdn1234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Impersonate = "0" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\StartScreenSaver = "WLEStartScreenSaver" h4ckdn1234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Impersonate = "0" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Lock = "WLELock" h4ckdn1234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Asynchronous = "0" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Unlock = "WLEUnlock" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Lock = "WLELock" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\StartScreenSaver = "WLEStartScreenSaver" h4ckdn1234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Asynchronous = "0" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Logoff = "WLELogoff" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\StartScreenSaver = "WLEStartScreenSaver" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234 h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\DllName = "h4ckdn1234.dll" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Logoff = "WLELogoff" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234 h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\StartScreenSaver = "WLEStartScreenSaver" h4ckdn1234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Asynchronous = "0" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Logoff = "WLELogoff" h4ckdn1234.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Asynchronous = "0" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\StartScreenSaver = "WLEStartScreenSaver" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Lock = "WLELock" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Startup = "WLEStartup" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Startup = "WLEStartup" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Shutdown = "WLEShutdown" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Shutdown = "WLEShutdown" h4ckdn1234.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\Unlock = "WLEUnlock" h4ckdn1234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\h4ckdn1234\DllName = "h4ckdn1234.dll" h4ckdn1234.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe File created C:\Windows\SysWOW64\h4ckdn1234.exe h4ckdn1234.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 656 wrote to memory of 1496 656 7dd4fd6b6a5f45bee6b53e266b6cbf734a11814301a88d0d4dfa608fae6ed0b6.exe 27 PID 656 wrote to memory of 1496 656 7dd4fd6b6a5f45bee6b53e266b6cbf734a11814301a88d0d4dfa608fae6ed0b6.exe 27 PID 656 wrote to memory of 1496 656 7dd4fd6b6a5f45bee6b53e266b6cbf734a11814301a88d0d4dfa608fae6ed0b6.exe 27 PID 656 wrote to memory of 1496 656 7dd4fd6b6a5f45bee6b53e266b6cbf734a11814301a88d0d4dfa608fae6ed0b6.exe 27 PID 1496 wrote to memory of 1896 1496 h4ckdn1234.exe 28 PID 1496 wrote to memory of 1896 1496 h4ckdn1234.exe 28 PID 1496 wrote to memory of 1896 1496 h4ckdn1234.exe 28 PID 1496 wrote to memory of 1896 1496 h4ckdn1234.exe 28 PID 1896 wrote to memory of 964 1896 h4ckdn1234.exe 29 PID 1896 wrote to memory of 964 1896 h4ckdn1234.exe 29 PID 1896 wrote to memory of 964 1896 h4ckdn1234.exe 29 PID 1896 wrote to memory of 964 1896 h4ckdn1234.exe 29 PID 964 wrote to memory of 2004 964 h4ckdn1234.exe 30 PID 964 wrote to memory of 2004 964 h4ckdn1234.exe 30 PID 964 wrote to memory of 2004 964 h4ckdn1234.exe 30 PID 964 wrote to memory of 2004 964 h4ckdn1234.exe 30 PID 2004 wrote to memory of 1752 2004 h4ckdn1234.exe 31 PID 2004 wrote to memory of 1752 2004 h4ckdn1234.exe 31 PID 2004 wrote to memory of 1752 2004 h4ckdn1234.exe 31 PID 2004 wrote to memory of 1752 2004 h4ckdn1234.exe 31 PID 1752 wrote to memory of 1664 1752 h4ckdn1234.exe 32 PID 1752 wrote to memory of 1664 1752 h4ckdn1234.exe 32 PID 1752 wrote to memory of 1664 1752 h4ckdn1234.exe 32 PID 1752 wrote to memory of 1664 1752 h4ckdn1234.exe 32 PID 1664 wrote to memory of 1812 1664 h4ckdn1234.exe 33 PID 1664 wrote to memory of 1812 1664 h4ckdn1234.exe 33 PID 1664 wrote to memory of 1812 1664 h4ckdn1234.exe 33 PID 1664 wrote to memory of 1812 1664 h4ckdn1234.exe 33 PID 1812 wrote to memory of 1880 1812 h4ckdn1234.exe 34 PID 1812 wrote to memory of 1880 1812 h4ckdn1234.exe 34 PID 1812 wrote to memory of 1880 1812 h4ckdn1234.exe 34 PID 1812 wrote to memory of 1880 1812 h4ckdn1234.exe 34 PID 1880 wrote to memory of 1276 1880 h4ckdn1234.exe 35 PID 1880 wrote to memory of 1276 1880 h4ckdn1234.exe 35 PID 1880 wrote to memory of 1276 1880 h4ckdn1234.exe 35 PID 1880 wrote to memory of 1276 1880 h4ckdn1234.exe 35 PID 1276 wrote to memory of 1604 1276 h4ckdn1234.exe 36 PID 1276 wrote to memory of 1604 1276 h4ckdn1234.exe 36 PID 1276 wrote to memory of 1604 1276 h4ckdn1234.exe 36 PID 1276 wrote to memory of 1604 1276 h4ckdn1234.exe 36 PID 1604 wrote to memory of 1224 1604 h4ckdn1234.exe 37 PID 1604 wrote to memory of 1224 1604 h4ckdn1234.exe 37 PID 1604 wrote to memory of 1224 1604 h4ckdn1234.exe 37 PID 1604 wrote to memory of 1224 1604 h4ckdn1234.exe 37 PID 1224 wrote to memory of 1800 1224 h4ckdn1234.exe 38 PID 1224 wrote to memory of 1800 1224 h4ckdn1234.exe 38 PID 1224 wrote to memory of 1800 1224 h4ckdn1234.exe 38 PID 1224 wrote to memory of 1800 1224 h4ckdn1234.exe 38 PID 1800 wrote to memory of 608 1800 h4ckdn1234.exe 39 PID 1800 wrote to memory of 608 1800 h4ckdn1234.exe 39 PID 1800 wrote to memory of 608 1800 h4ckdn1234.exe 39 PID 1800 wrote to memory of 608 1800 h4ckdn1234.exe 39 PID 608 wrote to memory of 748 608 h4ckdn1234.exe 40 PID 608 wrote to memory of 748 608 h4ckdn1234.exe 40 PID 608 wrote to memory of 748 608 h4ckdn1234.exe 40 PID 608 wrote to memory of 748 608 h4ckdn1234.exe 40 PID 748 wrote to memory of 1564 748 h4ckdn1234.exe 41 PID 748 wrote to memory of 1564 748 h4ckdn1234.exe 41 PID 748 wrote to memory of 1564 748 h4ckdn1234.exe 41 PID 748 wrote to memory of 1564 748 h4ckdn1234.exe 41 PID 1564 wrote to memory of 1140 1564 h4ckdn1234.exe 42 PID 1564 wrote to memory of 1140 1564 h4ckdn1234.exe 42 PID 1564 wrote to memory of 1140 1564 h4ckdn1234.exe 42 PID 1564 wrote to memory of 1140 1564 h4ckdn1234.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dd4fd6b6a5f45bee6b53e266b6cbf734a11814301a88d0d4dfa608fae6ed0b6.exe"C:\Users\Admin\AppData\Local\Temp\7dd4fd6b6a5f45bee6b53e266b6cbf734a11814301a88d0d4dfa608fae6ed0b6.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1140 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
PID:1384 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:292 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
PID:924 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
PID:1932 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies WinLogon
- Drops file in System32 directory
PID:1928 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
PID:2008 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
PID:1984 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1720 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:584 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1744 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:604 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1056 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:668 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1152 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
PID:976 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe33⤵
- Executes dropped EXE
- Modifies WinLogon
PID:1112 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe34⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1908 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe35⤵
- Executes dropped EXE
- Modifies WinLogon
PID:1640 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe36⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe37⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1104 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe38⤵
- Executes dropped EXE
PID:1180 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe39⤵
- Executes dropped EXE
- Modifies WinLogon
- Drops file in System32 directory
PID:1724 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe40⤵
- Executes dropped EXE
PID:576 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe41⤵
- Executes dropped EXE
PID:1440 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe42⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe43⤵
- Executes dropped EXE
PID:1828 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe44⤵
- Executes dropped EXE
PID:1460 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe45⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1704 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe46⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe47⤵
- Executes dropped EXE
PID:2088 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe48⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2112 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2136 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe50⤵
- Executes dropped EXE
PID:2160 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe51⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2184 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe52⤵
- Executes dropped EXE
- Modifies WinLogon
- Drops file in System32 directory
PID:2204 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe53⤵
- Executes dropped EXE
PID:2228 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe54⤵
- Executes dropped EXE
PID:2252 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe55⤵
- Executes dropped EXE
- Modifies WinLogon
PID:2276 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe56⤵
- Executes dropped EXE
- Modifies WinLogon
- Drops file in System32 directory
PID:2296 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe57⤵
- Executes dropped EXE
PID:2320 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe58⤵
- Executes dropped EXE
- Modifies WinLogon
PID:2340 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2360 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe60⤵
- Executes dropped EXE
PID:2380 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe61⤵
- Executes dropped EXE
- Modifies WinLogon
PID:2404 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe62⤵
- Executes dropped EXE
PID:2424 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe63⤵
- Executes dropped EXE
- Modifies WinLogon
- Drops file in System32 directory
PID:2448 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2472 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe65⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2496 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe66⤵PID:2520
-
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe67⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2540 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe68⤵PID:2560
-
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe69⤵
- Adds Run key to start application
PID:2580 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe70⤵
- Adds Run key to start application
PID:2600 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe71⤵
- Modifies WinLogon
PID:2616 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe72⤵
- Drops file in System32 directory
PID:2640 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe73⤵PID:2660
-
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe74⤵
- Modifies WinLogon
- Drops file in System32 directory
PID:2680 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe75⤵PID:2700
-
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe76⤵
- Adds Run key to start application
PID:2720 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe77⤵
- Adds Run key to start application
- Modifies WinLogon
PID:2740 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe78⤵
- Modifies WinLogon
PID:2756 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe79⤵PID:2776
-
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe80⤵PID:2796
-
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe81⤵PID:2812
-
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe82⤵PID:2832
-
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe83⤵
- Adds Run key to start application
- Modifies WinLogon
PID:2852 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe84⤵
- Modifies WinLogon
PID:2872 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe85⤵
- Drops file in System32 directory
PID:2892 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe86⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2912 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe87⤵
- Drops file in System32 directory
PID:2932 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe88⤵
- Adds Run key to start application
PID:2952 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe89⤵
- Adds Run key to start application
- Modifies WinLogon
PID:2972 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe90⤵PID:2992
-
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe91⤵PID:3012
-
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe92⤵
- Modifies WinLogon
PID:3028 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe93⤵PID:3048
-
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe94⤵PID:3068
-
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe95⤵PID:2108
-
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe96⤵
- Modifies WinLogon
PID:2120 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe97⤵
- Drops file in System32 directory
PID:2168 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe98⤵
- Adds Run key to start application
PID:2216 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe99⤵
- Modifies WinLogon
PID:2284 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe100⤵
- Drops file in System32 directory
PID:2356 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe101⤵
- Adds Run key to start application
PID:2388 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe102⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2436 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe103⤵PID:2504
-
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe104⤵
- Modifies WinLogon
PID:2632 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe105⤵PID:2752
-
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe106⤵
- Drops file in System32 directory
PID:2828 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe107⤵
- Modifies WinLogon
- Drops file in System32 directory
PID:2928 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe108⤵
- Drops file in System32 directory
PID:3024 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe109⤵
- Drops file in System32 directory
PID:2200 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe110⤵
- Modifies WinLogon
PID:2468 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe111⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2904 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe112⤵
- Modifies WinLogon
PID:3076 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe113⤵
- Drops file in System32 directory
PID:3096 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe114⤵
- Adds Run key to start application
- Modifies WinLogon
PID:3116 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe115⤵
- Adds Run key to start application
- Modifies WinLogon
PID:3136 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe116⤵
- Modifies WinLogon
PID:3156 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe117⤵PID:3176
-
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe118⤵
- Adds Run key to start application
- Modifies WinLogon
- Drops file in System32 directory
PID:3196 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe119⤵
- Adds Run key to start application
- Modifies WinLogon
PID:3220 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe120⤵PID:3240
-
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe121⤵
- Modifies WinLogon
- Drops file in System32 directory
PID:3260 -
C:\Windows\SysWOW64\h4ckdn1234.exeC:\Windows\system32\h4ckdn1234.exe122⤵
- Drops file in System32 directory
PID:3280
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-