Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 16:00
Static task
static1
Behavioral task
behavioral1
Sample
1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe
Resource
win10v2004-20220901-en
General
-
Target
1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe
-
Size
646KB
-
MD5
016cc5c921eb0d1101395025d7c0c505
-
SHA1
98b47c84aea06e1443c396eb1b7d33e331ca6749
-
SHA256
1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b
-
SHA512
31d4bdba2d2ca5c7ba12b8e4db1c9d8ba9bb4ce600aa1c84968f85186f0b44eea74f7c606e620f70137498c9f018102094a8f216eb9bb18b1040064a085aec5c
-
SSDEEP
12288:k/dr9yql7Xa+mO0FKUDTtMi1NzW/DaRMvNXx265syu4MrZ:kl8qNKyUdMONUzeosyu4M
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" g6NuH2.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tieepik.exe -
Executes dropped EXE 7 IoCs
pid Process 1760 g6NuH2.exe 4192 tieepik.exe 4596 adhost.exe 4804 adhost.exe 4384 bdhost.exe 1712 cdhost.exe 3788 ddhost.exe -
resource yara_rule behavioral2/memory/3008-133-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3008-134-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3008-137-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3008-138-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3008-141-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3008-157-0x0000000000400000-0x00000000004C4000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation g6NuH2.exe -
Adds Run key to start application 2 TTPs 42 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /x" g6NuH2.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /x" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /l" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /O" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /S" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /Y" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /y" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /R" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /p" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /b" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /T" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /k" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /a" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /L" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /w" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /Z" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /V" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /I" tieepik.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ g6NuH2.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /G" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /D" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /i" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /u" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /f" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /v" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /m" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /j" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /U" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /H" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /z" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /X" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /P" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /W" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /e" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /g" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /n" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /d" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /o" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /B" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /c" tieepik.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tieepik = "C:\\Users\\Admin\\tieepik.exe /M" tieepik.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3140 set thread context of 3008 3140 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 104 PID 4596 set thread context of 4804 4596 adhost.exe 111 PID 1712 set thread context of 1480 1712 cdhost.exe 117 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3992 4384 WerFault.exe 112 2692 1480 WerFault.exe 117 -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3292 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1760 g6NuH2.exe 1760 g6NuH2.exe 1760 g6NuH2.exe 1760 g6NuH2.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe 4192 tieepik.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3292 tasklist.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3008 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 1760 g6NuH2.exe 4192 tieepik.exe 3788 ddhost.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 3140 wrote to memory of 3008 3140 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 104 PID 3140 wrote to memory of 3008 3140 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 104 PID 3140 wrote to memory of 3008 3140 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 104 PID 3140 wrote to memory of 3008 3140 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 104 PID 3140 wrote to memory of 3008 3140 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 104 PID 3140 wrote to memory of 3008 3140 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 104 PID 3140 wrote to memory of 3008 3140 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 104 PID 3140 wrote to memory of 3008 3140 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 104 PID 3008 wrote to memory of 1760 3008 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 105 PID 3008 wrote to memory of 1760 3008 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 105 PID 3008 wrote to memory of 1760 3008 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 105 PID 1760 wrote to memory of 4192 1760 g6NuH2.exe 106 PID 1760 wrote to memory of 4192 1760 g6NuH2.exe 106 PID 1760 wrote to memory of 4192 1760 g6NuH2.exe 106 PID 1760 wrote to memory of 1156 1760 g6NuH2.exe 107 PID 1760 wrote to memory of 1156 1760 g6NuH2.exe 107 PID 1760 wrote to memory of 1156 1760 g6NuH2.exe 107 PID 1156 wrote to memory of 3292 1156 cmd.exe 109 PID 1156 wrote to memory of 3292 1156 cmd.exe 109 PID 1156 wrote to memory of 3292 1156 cmd.exe 109 PID 3008 wrote to memory of 4596 3008 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 110 PID 3008 wrote to memory of 4596 3008 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 110 PID 3008 wrote to memory of 4596 3008 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 110 PID 4596 wrote to memory of 4804 4596 adhost.exe 111 PID 4596 wrote to memory of 4804 4596 adhost.exe 111 PID 4596 wrote to memory of 4804 4596 adhost.exe 111 PID 4596 wrote to memory of 4804 4596 adhost.exe 111 PID 4596 wrote to memory of 4804 4596 adhost.exe 111 PID 4596 wrote to memory of 4804 4596 adhost.exe 111 PID 4596 wrote to memory of 4804 4596 adhost.exe 111 PID 4596 wrote to memory of 4804 4596 adhost.exe 111 PID 4596 wrote to memory of 4804 4596 adhost.exe 111 PID 4596 wrote to memory of 4804 4596 adhost.exe 111 PID 3008 wrote to memory of 4384 3008 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 112 PID 3008 wrote to memory of 4384 3008 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 112 PID 3008 wrote to memory of 4384 3008 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 112 PID 3008 wrote to memory of 1712 3008 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 116 PID 3008 wrote to memory of 1712 3008 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 116 PID 3008 wrote to memory of 1712 3008 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 116 PID 1712 wrote to memory of 1480 1712 cdhost.exe 117 PID 1712 wrote to memory of 1480 1712 cdhost.exe 117 PID 1712 wrote to memory of 1480 1712 cdhost.exe 117 PID 3008 wrote to memory of 3788 3008 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 120 PID 3008 wrote to memory of 3788 3008 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 120 PID 3008 wrote to memory of 3788 3008 1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe"C:\Users\Admin\AppData\Local\Temp\1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe1d84e8f21ed6460ddd8a69811d481eed48d27c5dc934c63d22f5f6d8167c130b.exe2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\g6NuH2.exeC:\Users\Admin\g6NuH2.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\tieepik.exe"C:\Users\Admin\tieepik.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4192
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del g6NuH2.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3292
-
-
-
-
C:\Users\Admin\adhost.exeC:\Users\Admin\adhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\adhost.exeadhost.exe4⤵
- Executes dropped EXE
PID:4804
-
-
-
C:\Users\Admin\bdhost.exeC:\Users\Admin\bdhost.exe3⤵
- Executes dropped EXE
PID:4384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 3324⤵
- Program crash
PID:3992
-
-
-
C:\Users\Admin\cdhost.exeC:\Users\Admin\cdhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\explorer.exe00000120*4⤵PID:1480
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1480 -s 1245⤵
- Program crash
PID:2692
-
-
-
-
C:\Users\Admin\ddhost.exeC:\Users\Admin\ddhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3788
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4384 -ip 43841⤵PID:4288
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 460 -p 1480 -ip 14801⤵PID:2444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD536fa3dbb1702552896cc677b5bda52dc
SHA1c87f2707913047dcd2a896896fe2905b08c33985
SHA256e8a3a99554c8aea64d2afa291655795896fbc14d053d3d29178c3536eee39f74
SHA5129ace90bd8e81b507d2db75a493554b4a676730271883976033e4025dc6d19250070b6fd8825905e2aeea213bfc271e5d2c43a2eeca86bce0b3db497801731c53
-
Filesize
172KB
MD536fa3dbb1702552896cc677b5bda52dc
SHA1c87f2707913047dcd2a896896fe2905b08c33985
SHA256e8a3a99554c8aea64d2afa291655795896fbc14d053d3d29178c3536eee39f74
SHA5129ace90bd8e81b507d2db75a493554b4a676730271883976033e4025dc6d19250070b6fd8825905e2aeea213bfc271e5d2c43a2eeca86bce0b3db497801731c53
-
Filesize
172KB
MD536fa3dbb1702552896cc677b5bda52dc
SHA1c87f2707913047dcd2a896896fe2905b08c33985
SHA256e8a3a99554c8aea64d2afa291655795896fbc14d053d3d29178c3536eee39f74
SHA5129ace90bd8e81b507d2db75a493554b4a676730271883976033e4025dc6d19250070b6fd8825905e2aeea213bfc271e5d2c43a2eeca86bce0b3db497801731c53
-
Filesize
174KB
MD5f3e286f3fc9467d3b9e56d41038b17d5
SHA13653c381586b01016a56de58d59300e431368162
SHA256ec735fb26d310b803d6c4370b7cdd2a4e0f100dc442d0545f3742b3b48da5f3f
SHA5120ba3b50c8dbce8da4f3a312a8f57375b102dcc7348485300b1d65fec3b6f55f62eb54e8252ddd4d73620442813731f7bfceb84c122c07a778afde76d8a642e2d
-
Filesize
174KB
MD5f3e286f3fc9467d3b9e56d41038b17d5
SHA13653c381586b01016a56de58d59300e431368162
SHA256ec735fb26d310b803d6c4370b7cdd2a4e0f100dc442d0545f3742b3b48da5f3f
SHA5120ba3b50c8dbce8da4f3a312a8f57375b102dcc7348485300b1d65fec3b6f55f62eb54e8252ddd4d73620442813731f7bfceb84c122c07a778afde76d8a642e2d
-
Filesize
118KB
MD54abe6afa1ff995b70ef6511c1f0567ae
SHA180935a41582e0fb168c37d2960dce974cab5f0ab
SHA256fba532bcf20eaba48015c06e52efd121a46dffad4a293d47d1ccc6529e0beae8
SHA512bd8521102317e02b91025d8f3b5976e3ea6a93b82d8ca76bc05f43ca845d92d1a206d1a2710c194a018504a1578004f154d83c26243ffa2336a19610ee51c565
-
Filesize
118KB
MD54abe6afa1ff995b70ef6511c1f0567ae
SHA180935a41582e0fb168c37d2960dce974cab5f0ab
SHA256fba532bcf20eaba48015c06e52efd121a46dffad4a293d47d1ccc6529e0beae8
SHA512bd8521102317e02b91025d8f3b5976e3ea6a93b82d8ca76bc05f43ca845d92d1a206d1a2710c194a018504a1578004f154d83c26243ffa2336a19610ee51c565
-
Filesize
24KB
MD571aecf19a1aec54e3d2c63f945cc6956
SHA112213f95739e45881458a7bbb429a0b7b363ccbf
SHA256c98cd0c456aa393a80d81d259dc8077edaf44d833e0691054291a9ba285f74cf
SHA512a8634acb97730db9415fd5cb93cb23e1adea0d19c182cf3daf423a73d76dbf7cd3ae1829a3a24fefaab8ffa3fb5e3b93662559067590c7a6779ead71b8f145e4
-
Filesize
24KB
MD571aecf19a1aec54e3d2c63f945cc6956
SHA112213f95739e45881458a7bbb429a0b7b363ccbf
SHA256c98cd0c456aa393a80d81d259dc8077edaf44d833e0691054291a9ba285f74cf
SHA512a8634acb97730db9415fd5cb93cb23e1adea0d19c182cf3daf423a73d76dbf7cd3ae1829a3a24fefaab8ffa3fb5e3b93662559067590c7a6779ead71b8f145e4
-
Filesize
256KB
MD5be8379280ac23f08b8b091e1bc345eae
SHA1bb432b69277aec39e5566ec120d6fd8fe4e0097b
SHA256caf1a47f843337e61a31e6faf6745bd9fd70e14af77f171c8764ea9d2fbe9dc5
SHA512d5a26da6a5ded9961cc995a8f6e53b9a97d95330654a1e1e588ddcabcf4d058fe527b1d68de057b8b73be49f4bcb64b58db229a2007c9eb5858a7f1d81ddd215
-
Filesize
256KB
MD5be8379280ac23f08b8b091e1bc345eae
SHA1bb432b69277aec39e5566ec120d6fd8fe4e0097b
SHA256caf1a47f843337e61a31e6faf6745bd9fd70e14af77f171c8764ea9d2fbe9dc5
SHA512d5a26da6a5ded9961cc995a8f6e53b9a97d95330654a1e1e588ddcabcf4d058fe527b1d68de057b8b73be49f4bcb64b58db229a2007c9eb5858a7f1d81ddd215
-
Filesize
256KB
MD5913bab7a12aadb31f837376412c2f6ef
SHA14f085d968e4acd95afa8d33e857c30633a1dc4fd
SHA256318fb178255ea663523253216ad0aa58097d003a85c7000c112cda00fd582b14
SHA512d1d303c37d025a197c242e96ec5915a3ca1038e4b6bffd5fd339bc3d3214d9a65a2553a9b5026a5b247a7fa6cefef75b9f940d9963284939c4d271e8d88ea0e5
-
Filesize
256KB
MD5913bab7a12aadb31f837376412c2f6ef
SHA14f085d968e4acd95afa8d33e857c30633a1dc4fd
SHA256318fb178255ea663523253216ad0aa58097d003a85c7000c112cda00fd582b14
SHA512d1d303c37d025a197c242e96ec5915a3ca1038e4b6bffd5fd339bc3d3214d9a65a2553a9b5026a5b247a7fa6cefef75b9f940d9963284939c4d271e8d88ea0e5