Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/10/2022, 06:19
Behavioral task
behavioral1
Sample
762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe
Resource
win7-20220901-en
General
-
Target
762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe
-
Size
875KB
-
MD5
42c344b80e9c977401aac6b86354a742
-
SHA1
16991bf9130d3d6d00943f709c4d6b5c463636f4
-
SHA256
762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4
-
SHA512
dc9c665b031c011df8626c8c6f358b0adf80248cc8606b47373c44f2e508a3f61e30a1dc7b059aea77aa5c2e71da75adca2d6860ebf2fb26fcb2a337da0c51b5
-
SSDEEP
6144:9lNvmYfeQDAYbtZLgpnvMGNxFGZRi1BkiihLuodNLj01Zf3Nr/G3FXe6hE8yafYR:DNfbAHn0G0G1yiwuo/gDfN70XeBAK5Y
Malware Config
Signatures
-
Detect Blackmoon payload 7 IoCs
resource yara_rule behavioral1/memory/1128-59-0x0000000003BD0000-0x0000000003C40000-memory.dmp family_blackmoon behavioral1/memory/1572-78-0x0000000003BF0000-0x0000000003C60000-memory.dmp family_blackmoon behavioral1/memory/1572-79-0x0000000003BF0000-0x0000000003C60000-memory.dmp family_blackmoon behavioral1/memory/1572-86-0x0000000003BF0000-0x0000000003C60000-memory.dmp family_blackmoon behavioral1/memory/1572-91-0x00000000047C0000-0x0000000004A02000-memory.dmp family_blackmoon behavioral1/memory/1572-108-0x0000000003BF0000-0x0000000003C60000-memory.dmp family_blackmoon behavioral1/memory/1572-110-0x00000000047C0000-0x0000000004A02000-memory.dmp family_blackmoon -
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1128-82-0x0000000010000000-0x0000000010017000-memory.dmp family_gh0strat behavioral1/memory/1204-145-0x0000000010000000-0x0000000010017000-memory.dmp family_gh0strat -
resource yara_rule behavioral1/files/0x0008000000012304-65.dat aspack_v212_v242 behavioral1/files/0x0008000000012304-66.dat aspack_v212_v242 behavioral1/files/0x0008000000012304-68.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1572 Applicationmdkbms.exe 1532 undatej.exe 1824 undatej.exe -
Loads dropped DLL 3 IoCs
pid Process 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1080 dxdiag.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdate = "C:\\Users\\Public\\Documents\\Applicationmdkbm.exe" 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\B: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\N: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\Y: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\G: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\I: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\P: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\W: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\F: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\Q: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\U: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\Z: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\V: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\X: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\L: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\M: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\S: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\T: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\O: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\E: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\H: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\J: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe File opened (read-only) \??\K: 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1572 set thread context of 1080 1572 Applicationmdkbms.exe 32 PID 1080 set thread context of 1204 1080 dxdiag.exe 42 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 13 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1572 Applicationmdkbms.exe 1572 Applicationmdkbms.exe 1080 dxdiag.exe 1080 dxdiag.exe 1080 dxdiag.exe 1080 dxdiag.exe 1080 dxdiag.exe 1080 dxdiag.exe 1080 dxdiag.exe 1080 dxdiag.exe 1080 dxdiag.exe 1080 dxdiag.exe 1080 dxdiag.exe 1080 dxdiag.exe 1080 dxdiag.exe 1080 dxdiag.exe 1080 dxdiag.exe 1204 svchost.exe 1204 svchost.exe 1204 svchost.exe 1204 svchost.exe 1204 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe Token: SeIncBasePriorityPrivilege 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe Token: 33 1204 svchost.exe Token: SeIncBasePriorityPrivilege 1204 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 692 DllHost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1572 Applicationmdkbms.exe 1572 Applicationmdkbms.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 1080 dxdiag.exe 1080 dxdiag.exe 1204 svchost.exe 1204 svchost.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1128 wrote to memory of 1572 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 30 PID 1128 wrote to memory of 1572 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 30 PID 1128 wrote to memory of 1572 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 30 PID 1128 wrote to memory of 1572 1128 762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe 30 PID 1572 wrote to memory of 1080 1572 Applicationmdkbms.exe 32 PID 1572 wrote to memory of 1080 1572 Applicationmdkbms.exe 32 PID 1572 wrote to memory of 1080 1572 Applicationmdkbms.exe 32 PID 1572 wrote to memory of 1080 1572 Applicationmdkbms.exe 32 PID 1572 wrote to memory of 1080 1572 Applicationmdkbms.exe 32 PID 1572 wrote to memory of 1080 1572 Applicationmdkbms.exe 32 PID 1572 wrote to memory of 1080 1572 Applicationmdkbms.exe 32 PID 1572 wrote to memory of 1080 1572 Applicationmdkbms.exe 32 PID 1572 wrote to memory of 1080 1572 Applicationmdkbms.exe 32 PID 1572 wrote to memory of 1080 1572 Applicationmdkbms.exe 32 PID 1080 wrote to memory of 1524 1080 dxdiag.exe 34 PID 1080 wrote to memory of 1524 1080 dxdiag.exe 34 PID 1080 wrote to memory of 1524 1080 dxdiag.exe 34 PID 1080 wrote to memory of 1524 1080 dxdiag.exe 34 PID 1080 wrote to memory of 1532 1080 dxdiag.exe 35 PID 1080 wrote to memory of 1532 1080 dxdiag.exe 35 PID 1080 wrote to memory of 1532 1080 dxdiag.exe 35 PID 1080 wrote to memory of 1532 1080 dxdiag.exe 35 PID 1080 wrote to memory of 956 1080 dxdiag.exe 37 PID 1080 wrote to memory of 956 1080 dxdiag.exe 37 PID 1080 wrote to memory of 956 1080 dxdiag.exe 37 PID 1080 wrote to memory of 956 1080 dxdiag.exe 37 PID 1080 wrote to memory of 1824 1080 dxdiag.exe 38 PID 1080 wrote to memory of 1824 1080 dxdiag.exe 38 PID 1080 wrote to memory of 1824 1080 dxdiag.exe 38 PID 1080 wrote to memory of 1824 1080 dxdiag.exe 38 PID 1080 wrote to memory of 1064 1080 dxdiag.exe 40 PID 1080 wrote to memory of 1064 1080 dxdiag.exe 40 PID 1080 wrote to memory of 1064 1080 dxdiag.exe 40 PID 1080 wrote to memory of 1064 1080 dxdiag.exe 40 PID 1080 wrote to memory of 360 1080 dxdiag.exe 41 PID 1080 wrote to memory of 360 1080 dxdiag.exe 41 PID 1080 wrote to memory of 360 1080 dxdiag.exe 41 PID 1080 wrote to memory of 360 1080 dxdiag.exe 41 PID 1080 wrote to memory of 1204 1080 dxdiag.exe 42 PID 1080 wrote to memory of 1204 1080 dxdiag.exe 42 PID 1080 wrote to memory of 1204 1080 dxdiag.exe 42 PID 1080 wrote to memory of 1204 1080 dxdiag.exe 42 PID 1080 wrote to memory of 1204 1080 dxdiag.exe 42 PID 1080 wrote to memory of 1204 1080 dxdiag.exe 42 PID 1080 wrote to memory of 1204 1080 dxdiag.exe 42 PID 1080 wrote to memory of 1204 1080 dxdiag.exe 42 PID 1080 wrote to memory of 1204 1080 dxdiag.exe 42 PID 1080 wrote to memory of 1204 1080 dxdiag.exe 42 PID 1080 wrote to memory of 1960 1080 dxdiag.exe 43 PID 1080 wrote to memory of 1960 1080 dxdiag.exe 43 PID 1080 wrote to memory of 1960 1080 dxdiag.exe 43 PID 1080 wrote to memory of 1960 1080 dxdiag.exe 43 PID 1080 wrote to memory of 1916 1080 dxdiag.exe 44 PID 1080 wrote to memory of 1916 1080 dxdiag.exe 44 PID 1080 wrote to memory of 1916 1080 dxdiag.exe 44 PID 1080 wrote to memory of 1916 1080 dxdiag.exe 44 PID 1080 wrote to memory of 1704 1080 dxdiag.exe 45 PID 1080 wrote to memory of 1704 1080 dxdiag.exe 45 PID 1080 wrote to memory of 1704 1080 dxdiag.exe 45 PID 1080 wrote to memory of 1704 1080 dxdiag.exe 45 PID 1080 wrote to memory of 952 1080 dxdiag.exe 46 PID 1080 wrote to memory of 952 1080 dxdiag.exe 46 PID 1080 wrote to memory of 952 1080 dxdiag.exe 46 PID 1080 wrote to memory of 952 1080 dxdiag.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe"C:\Users\Admin\AppData\Local\Temp\762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Public\Documents\Applicationmdkbms.exeC:\Users\Public\Documents\Applicationmdkbms.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
\??\c:\windows\SysWOW64\dxdiag.exec:\windows\system32\dxdiag.exe3⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1080 -
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" uqdate.log "C:\Users\Admin\AppData\Roaming\gqkkpkzn\"4⤵PID:1524
-
-
C:\Users\Admin\AppData\Roaming\gqkkpkzn\undatej.exeC:\Users\Admin\AppData\Roaming\gqkkpkzn\undatej.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" uqdate.log "C:\Users\Admin\AppData\Roaming\gqkkpkzn\"4⤵
- Executes dropped EXE
PID:1532
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" uqdate.log "C:\Users\Admin\AppData\Roaming\gqkkpkzn\"4⤵PID:956
-
-
C:\Users\Admin\AppData\Roaming\gqkkpkzn\undatej.exeC:\Users\Admin\AppData\Roaming\gqkkpkzn\undatej.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" gamecap.exe "C:\Users\Admin\AppData\Roaming\gqkkpkzn\"4⤵
- Executes dropped EXE
PID:1824
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" auapys.exe "c:\Systemsolumsnformation\gamepatch\"4⤵PID:1064
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" dll2.dll "C:\Users\Admin\AppData\Roaming\gqkkpkzn\"4⤵PID:360
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe4⤵
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1204
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" auapys.exe "c:\Systemsolumsnformation\gamepatch\"4⤵PID:1960
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" dll2.dll "C:\Users\Admin\AppData\Roaming\gqkkpkzn\"4⤵PID:1916
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" auapys.exe "c:\Systemsolumsnformation\gamepatch\"4⤵PID:1704
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" dll2.dll "C:\Users\Admin\AppData\Roaming\gqkkpkzn\"4⤵PID:952
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" auapys.exe "c:\Systemsolumsnformation\gamepatch\"4⤵PID:1112
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" dll2.dll "C:\Users\Admin\AppData\Roaming\gqkkpkzn\"4⤵PID:1564
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" auapys.exe "c:\Systemsolumsnformation\gamepatch\"4⤵PID:1616
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" dll2.dll "C:\Users\Admin\AppData\Roaming\gqkkpkzn\"4⤵PID:1980
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" auapys.exe "c:\Systemsolumsnformation\gamepatch\"4⤵PID:676
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" dll2.dll "C:\Users\Admin\AppData\Roaming\gqkkpkzn\"4⤵PID:1544
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" auapys.exe "c:\Systemsolumsnformation\gamepatch\"4⤵PID:1464
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" dll2.dll "C:\Users\Admin\AppData\Roaming\gqkkpkzn\"4⤵PID:1800
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" auapys.exe "c:\Systemsolumsnformation\gamepatch\"4⤵PID:1700
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" dll2.dll "C:\Users\Admin\AppData\Roaming\gqkkpkzn\"4⤵PID:1276
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" auapys.exe "c:\Systemsolumsnformation\gamepatch\"4⤵PID:1524
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" dll2.dll "C:\Users\Admin\AppData\Roaming\gqkkpkzn\"4⤵PID:772
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" auapys.exe "c:\Systemsolumsnformation\gamepatch\"4⤵PID:832
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" dll2.dll "C:\Users\Admin\AppData\Roaming\gqkkpkzn\"4⤵PID:1044
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" auapys.exe "c:\Systemsolumsnformation\gamepatch\"4⤵PID:596
-
-
\??\c:\windows\SysWOW64\svchost.exec:\windows\system32\svchost.exe x -y -o+ -p-p "C:\Users\Admin\AppData\Roaming\gqkkpkzn\qdb722.jpg" dll2.dll "C:\Users\Admin\AppData\Roaming\gqkkpkzn\"4⤵PID:1532
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
632KB
MD5662e809d95ba8cb07521883c8d6adf11
SHA10c9c9c4300ee1035bc902a24c1e6410c67fedbc1
SHA25603280274d2a1cfc2d8f0db6de0fcda7addafa41b30e07cc059a8904f93d40c92
SHA512bc676eca547035f793e1785b85d211d261e76c91ef6a981863c19c14e9c38c4c36b661c368a7874df7a7e40f8dbcb88d26c9163be46fd59c9e99f36cd4c2ff1d
-
Filesize
596B
MD5529b5a3ca9dae94a324c56d9d892ea20
SHA190fc87b5591b11ddc9bb41048df2308a03f1ef09
SHA256359799480d3d49a6acd999b6c2d8f15aca444c3770c45e42a46f161784a8b41e
SHA512649124b134f70a91253e8cb96d792c5b05320411350b9395fb5b5fb9a311ecb0198ada7f1c102b1784f1cb8a2f63854a20a70dae3b5a94e872c9128464ac4b8c
-
C:\Users\Admin\AppData\Local\Temp\762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4.jpg
Filesize77KB
MD51056902d0ac18740147a3b5e2d646d93
SHA1b811a8bdce5af1a581d475c3ba9aa77c92564656
SHA2563f9d54ae39c0a1119631ee605bb43cbb1965fe1c1652c0485e981aee74a57153
SHA512dfe81bc239aae188a643ddca378168bdabf47c1e7ab6716b5db8fa2dbad07c6efd17a26c14a1e9e2008932f0122be66138ef922ee5859c7242ff2ef56be14484
-
Filesize
25B
MD51419fe2ce5effdb4e2b826ad579043b6
SHA1e3c2d092b31727ee0acac58adc1092c9499a4d6f
SHA256a95fee534d75fbb2caf696bcb03adf84cdf80a0c913fbac73d367c2f54b08ecf
SHA51271804a4f51180b69c4714413df56fbea153d01a16f7281a096daded3a27f7cc0fe02d48416cf9f18715df0fd7cd9e10201635c9886d411243cc5676810ee0e4c
-
Filesize
376KB
MD51d94074a663e31524c30adface6296dd
SHA10319ab80557cd12dff0a33fa2e1760705f274215
SHA256a606bc8fe812e02d15e2f8ada17e41532820374b83a32fa1beea836ef9fcc16f
SHA5127fbb04e5049d2ec9d254dc13329263dbf32737b28dc1d6ef40e27bb7bbeadd701159091085f1000076150063212321e9fc5abd15000b9f09c5a70a65907c978e
-
Filesize
1.2MB
MD56064edcf86aee6a6ef89a106d1c8f094
SHA14add4fc4ae2b65365beb4bc4e449b06ec04f8c1f
SHA256126ed054748d4e089a6078fe179d40f63bc0c9fa44e214e6362c80528993e048
SHA512ff6700bd00b60a201f933f86537c0a30a46ba6d60f3715c1ed3049e3b8e09caf73b70814a63acb76377224f7c1085db01f46d95aaf7256c68656a12e16138b1e
-
Filesize
323KB
MD5b21300083d695545c4c1628320e30b50
SHA18251ec58d044747d52f4dc0ec7e53a50c94013ab
SHA2568c026e6df93e40a98ce9c0bd76918f73207d753667f8992e22211cef1df4f4ed
SHA512a00c6e191a6f84bceb6d7a43d10d37666e1db6d395a793bcd46d14c692a69c2a8490ecec0bbeec1276eb0abefaa38b9320167f029ea94572f3780fcc66d38ac6
-
Filesize
323KB
MD5b21300083d695545c4c1628320e30b50
SHA18251ec58d044747d52f4dc0ec7e53a50c94013ab
SHA2568c026e6df93e40a98ce9c0bd76918f73207d753667f8992e22211cef1df4f4ed
SHA512a00c6e191a6f84bceb6d7a43d10d37666e1db6d395a793bcd46d14c692a69c2a8490ecec0bbeec1276eb0abefaa38b9320167f029ea94572f3780fcc66d38ac6
-
Filesize
573KB
MD5426e14870e6682b2a418f26fc61eb2a4
SHA123e2dcaa952be4c0263fa860c646eb898812eb30
SHA256b85c0c50ee315e185796b78df02e3e4156a808880608c0149b1f925507671310
SHA512c90f1f297835aec92c4e30870756b4b9a4cb590f912411b82fde0b7377f2ca99c76395c07ea768d22e9dd8639bee1096726828c3fde299197404ca874e6e94e2
-
Filesize
875KB
MD542c344b80e9c977401aac6b86354a742
SHA116991bf9130d3d6d00943f709c4d6b5c463636f4
SHA256762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4
SHA512dc9c665b031c011df8626c8c6f358b0adf80248cc8606b47373c44f2e508a3f61e30a1dc7b059aea77aa5c2e71da75adca2d6860ebf2fb26fcb2a337da0c51b5
-
Filesize
41B
MD54357d98472361c991c9ce16819103475
SHA11d38f831be96d52d7f9d062d68c29e4bf25480db
SHA256e434538e1ba143ac6b34b9600b86a665bf53d21c9fce452e0724fcdb3ce69158
SHA5128ddde79a4f373862ae45d70ad93bb4816d6cc0cd13f1549ce117411bf8bc16ec2276bdaf1ab3fbf6b4288d9c0a14612fe4d85145bf2f598b97896938ff32556d
-
Filesize
227B
MD526e51881fa7d3662a9229e0b23a796e7
SHA18f7dedb4460aa26877fa6139f1b6aa25f333972c
SHA256dbcbb3a737c0dda57fd1b651df396946f9c010f608b7837ec30b963fa2e46b1f
SHA5128a0ad4285e6300329d98d15d2f4b85578e0632ec6ccf907a732f91c968928be030f37c57a9cb52fdc2032415205202de35c621a200a4269b478d7028d2426344
-
Filesize
221B
MD5efedebc27fce79781b0da3d0d05cdd91
SHA18767b2a8df2f02b6f56d48e5a0290037613ad0d8
SHA256e8efffd76db5dca20a2f47a4f08a071e5b89d860ab261cdefc69e7a36feafca7
SHA512137fc1a0911b73faebb670b67ff794d1d15d768496ed7e0c3342884124e56f054923ce389391a98584dd3dc97a99d64c9e1d7cfc97de89ab1f36012026addff3
-
Filesize
2KB
MD57943effe67a4647e06def2348949020e
SHA1eabd561f0639a975de259633f63896d82c3f878d
SHA2563fac47db92d581b2daef7a4f9493be2fe441041e5158101d80873d05808d5cfa
SHA512c9db1962e7457c94426c2a5c7f439736697d4399db6982c45357459d58805daa4a9d297912135488b6990e265ffa59d687fd5ba43717aab46ccc212083ef5003
-
Filesize
323KB
MD5b21300083d695545c4c1628320e30b50
SHA18251ec58d044747d52f4dc0ec7e53a50c94013ab
SHA2568c026e6df93e40a98ce9c0bd76918f73207d753667f8992e22211cef1df4f4ed
SHA512a00c6e191a6f84bceb6d7a43d10d37666e1db6d395a793bcd46d14c692a69c2a8490ecec0bbeec1276eb0abefaa38b9320167f029ea94572f3780fcc66d38ac6
-
Filesize
875KB
MD542c344b80e9c977401aac6b86354a742
SHA116991bf9130d3d6d00943f709c4d6b5c463636f4
SHA256762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4
SHA512dc9c665b031c011df8626c8c6f358b0adf80248cc8606b47373c44f2e508a3f61e30a1dc7b059aea77aa5c2e71da75adca2d6860ebf2fb26fcb2a337da0c51b5
-
Filesize
875KB
MD542c344b80e9c977401aac6b86354a742
SHA116991bf9130d3d6d00943f709c4d6b5c463636f4
SHA256762fc3fe535ca257bfd8ccefb63d7a2619ade93952cda4918d65eb37e115c0a4
SHA512dc9c665b031c011df8626c8c6f358b0adf80248cc8606b47373c44f2e508a3f61e30a1dc7b059aea77aa5c2e71da75adca2d6860ebf2fb26fcb2a337da0c51b5