Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 21:46
Static task
static1
Behavioral task
behavioral1
Sample
1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe
Resource
win10v2004-20220812-en
General
-
Target
1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe
-
Size
183KB
-
MD5
480b16b191b460e8aaa10cb016a7b570
-
SHA1
e3573271bde3d821697a6602caf720ef0bb0a1f8
-
SHA256
1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
-
SHA512
ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
SSDEEP
1536:6TkXCCqllEIdo0IhbA10JNjtE8n5HisKld7oWQXpiAF8J304aojs56tXsim0Qisw:FQ31GPREpnoWIpXF84oMgcbEV
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\sembako-dezjkkg.exe\"" 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\sembako-dezjkkg.exe\"" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\sembako-dezjkkg.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\sembako-dezjkkg.exe\"" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\sembako-dezjkkg.exe\"" lsass.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lsass.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lsass.exe -
Disables RegEdit via registry modification 10 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsass.exe -
Disables cmd.exe use via registry modification 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" lsass.exe -
Executes dropped EXE 4 IoCs
pid Process 2416 smss.exe 212 winlogon.exe 4384 services.exe 3644 lsass.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Empty.pif smss.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Empty.pif smss.exe -
Adds Run key to start application 2 TTPs 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus-degkknry = "\"C:\\Windows\\ShellNew\\bbm-yrnkkged.exe\"" services.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus services.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus-degkknry = "\"C:\\Windows\\ShellNew\\bbm-yrnkkged.exe\"" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus-1464 = "\"C:\\Users\\Admin\\AppData\\Local\\br3951on.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus-degkknry = "\"C:\\Windows\\ShellNew\\bbm-yrnkkged.exe\"" lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus-degkknry = "\"C:\\Windows\\ShellNew\\bbm-yrnkkged.exe\"" 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus-1464 = "\"C:\\Users\\Admin\\AppData\\Local\\br3951on.exe\"" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus-1464 = "\"C:\\Users\\Admin\\AppData\\Local\\br3951on.exe\"" services.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus-1464 = "\"C:\\Users\\Admin\\AppData\\Local\\br3951on.exe\"" lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus-1464 = "\"C:\\Users\\Admin\\AppData\\Local\\br3951on.exe\"" 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus-degkknry = "\"C:\\Windows\\ShellNew\\bbm-yrnkkged.exe\"" smss.exe -
Drops file in System32 directory 17 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msvbvm60.dll winlogon.exe File created C:\Windows\SysWOW64\Admin's Setting.scr smss.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll services.exe File opened for modification C:\Windows\SysWOW64\sistem.sys 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe File opened for modification C:\Windows\SysWOW64\cmd-bro-kkx.exe 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll smss.exe File opened for modification C:\Windows\SysWOW64\cmd-bro-kkx.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\DXBLBM.exe smss.exe File created C:\Windows\SysWOW64\cmd-bro-kkx.exe 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll lsass.exe File created C:\Windows\SysWOW64\DXBLBM.exe smss.exe File opened for modification C:\Windows\SysWOW64\cmd-bro-kkx.exe services.exe File opened for modification C:\Windows\SysWOW64\cmd-bro-kkx.exe lsass.exe File created C:\Windows\SysWOW64\sistem.sys 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe File opened for modification C:\Windows\SysWOW64\cmd-bro-kkx.exe smss.exe File opened for modification C:\Windows\SysWOW64\Admin's Setting.scr smss.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\sembako-dezjkkg.exe smss.exe File opened for modification C:\Windows\ShellNew\bbm-yrnkkged.exe winlogon.exe File opened for modification C:\Windows\ShellNew\bbm-yrnkkged.exe services.exe File opened for modification C:\Windows\ShellNew\bbm-yrnkkged.exe 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe File created C:\Windows\sembako-dezjkkg.exe 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe File opened for modification C:\Windows\sembako-dezjkkg.exe 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe File opened for modification C:\Windows\sembako-dezjkkg.exe services.exe File opened for modification C:\Windows\ShellNew\bbm-yrnkkged.exe lsass.exe File opened for modification C:\Windows\sembako-dezjkkg.exe lsass.exe File created C:\Windows\ShellNew\bbm-yrnkkged.exe 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe File opened for modification C:\Windows\ShellNew\bbm-yrnkkged.exe smss.exe File opened for modification C:\Windows\sembako-dezjkkg.exe winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings explorer.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4196 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe 2416 smss.exe 212 winlogon.exe 4384 services.exe 3644 lsass.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4196 wrote to memory of 4480 4196 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe 83 PID 4196 wrote to memory of 4480 4196 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe 83 PID 4196 wrote to memory of 4480 4196 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe 83 PID 4196 wrote to memory of 2416 4196 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe 84 PID 4196 wrote to memory of 2416 4196 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe 84 PID 4196 wrote to memory of 2416 4196 1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe 84 PID 2416 wrote to memory of 212 2416 smss.exe 85 PID 2416 wrote to memory of 212 2416 smss.exe 85 PID 2416 wrote to memory of 212 2416 smss.exe 85 PID 2416 wrote to memory of 3708 2416 smss.exe 86 PID 2416 wrote to memory of 3708 2416 smss.exe 86 PID 2416 wrote to memory of 3708 2416 smss.exe 86 PID 2416 wrote to memory of 3556 2416 smss.exe 87 PID 2416 wrote to memory of 3556 2416 smss.exe 87 PID 2416 wrote to memory of 3556 2416 smss.exe 87 PID 2416 wrote to memory of 4060 2416 smss.exe 90 PID 2416 wrote to memory of 4060 2416 smss.exe 90 PID 2416 wrote to memory of 4060 2416 smss.exe 90 PID 2416 wrote to memory of 4384 2416 smss.exe 92 PID 2416 wrote to memory of 4384 2416 smss.exe 92 PID 2416 wrote to memory of 4384 2416 smss.exe 92 PID 2416 wrote to memory of 3644 2416 smss.exe 94 PID 2416 wrote to memory of 3644 2416 smss.exe 94 PID 2416 wrote to memory of 3644 2416 smss.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe"C:\Users\Admin\AppData\Local\Temp\1785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
- Modifies registry class
PID:4480
-
-
C:\Users\Admin\AppData\Local\smss.exeC:\Users\Admin\AppData\Local\smss.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\winlogon.exeC:\Users\Admin\AppData\Local\winlogon.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:212
-
-
C:\Windows\SysWOW64\at.exeat /delete /y3⤵PID:3708
-
-
C:\Windows\SysWOW64\at.exeat 17:08 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\6084-NendangBro.com"3⤵PID:3556
-
-
C:\Windows\SysWOW64\at.exeat 11:03 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\6084-NendangBro.com"3⤵PID:4060
-
-
C:\Users\Admin\AppData\Local\services.exeC:\Users\Admin\AppData\Local\services.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4384
-
-
C:\Users\Admin\AppData\Local\lsass.exeC:\Users\Admin\AppData\Local\lsass.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:3644
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
10B
MD53086ff2c841dddb640deeb78b506526f
SHA1182593ce0e949c25efcd6761fb87107c97b0632d
SHA256a8027503af9dd1f818c95aa8e961e44e4bb6ecbeaeb1b5bf04269aa806de0857
SHA5120424e0d4ee0e123708ef4f3862eb8a171b6a188a8c02b31e778597f8f900e9a7d231443a8008301e96b662f18b0a67d2da4d6c53020a445653bd3e93c60058a2
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44
-
Filesize
183KB
MD5480b16b191b460e8aaa10cb016a7b570
SHA1e3573271bde3d821697a6602caf720ef0bb0a1f8
SHA2561785a83cac260a165351dc1580cbb67a926411f0fe3688730350464cf04b73a4
SHA512ebc54b85a07d08b5206cac6ef596327c27fb0704b363463fbe181d7bc4dd91e4c55bcb14d3f927271469908bc4df6c5d79901088f31fbb472bcd045ee0d11e44