Analysis
-
max time kernel
155s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2022 17:44
Static task
static1
Behavioral task
behavioral1
Sample
46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe
Resource
win7-20220812-en
General
-
Target
46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe
-
Size
99KB
-
MD5
68bb2bc04c3e1e1c2d88aa6f73285bb0
-
SHA1
dc00c4fb8e14e11395935b215c86c88e3e72e0eb
-
SHA256
46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107
-
SHA512
f610028ac9d39912d62e8dc8e26f9bbe13f061066561999cb40e0b61362bfc249f35829dacb8d4cb12b1622ed729a4afbc7f73f2595d76da65f4e65807c5a276
-
SSDEEP
3072:elwT11JOsyobBuL7OdhR5rgGuXMQ8oWfz16xK:EwxdbBuLSdlwWoWh6xK
Malware Config
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1032-157-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/1032-160-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/1032-162-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
Processes:
46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exepid process 1032 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe -
Adds Run key to start application 2 TTPs 34 IoCs
Processes:
REG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exedescription pid process target process PID 876 set thread context of 1032 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 20 IoCs
Processes:
ping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exepid process 2056 ping.exe 3076 ping.exe 4276 ping.exe 1552 ping.exe 2292 ping.exe 1220 ping.exe 3404 ping.exe 4788 ping.exe 2804 ping.exe 3332 ping.exe 2680 ping.exe 4436 ping.exe 1860 ping.exe 4252 ping.exe 4408 ping.exe 1764 ping.exe 4980 ping.exe 4716 ping.exe 4396 ping.exe 4840 ping.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exepid process 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exedescription pid process Token: SeDebugPrivilege 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exedescription pid process target process PID 876 wrote to memory of 4788 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4788 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4788 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 1860 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 1860 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 1860 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4408 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4408 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4408 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 2056 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 2056 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 2056 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 1764 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 1764 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 1764 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4252 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4252 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4252 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 3076 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 3076 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 3076 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 2804 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 2804 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 2804 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4980 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4980 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4980 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 3332 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 3332 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 3332 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4380 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe attrib.exe PID 876 wrote to memory of 4380 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe attrib.exe PID 876 wrote to memory of 4380 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe attrib.exe PID 876 wrote to memory of 2132 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe REG.exe PID 876 wrote to memory of 2132 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe REG.exe PID 876 wrote to memory of 2132 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe REG.exe PID 876 wrote to memory of 2680 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 2680 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 2680 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4276 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4276 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4276 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 1552 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 1552 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 1552 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4716 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4716 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4716 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4396 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4396 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4396 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 2292 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 2292 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 2292 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 1220 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 1220 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 1220 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4840 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4840 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4840 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 3404 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 3404 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 3404 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe PID 876 wrote to memory of 4436 876 46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe ping.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe"C:\Users\Admin\AppData\Local\Temp\46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\attrib.exe"C:\Windows\System32\attrib.exe" +s +h C:\Users\Admin\AppData\Local\Temp\46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe2⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe"C:\Users\Admin\AppData\Local\Temp\46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\46f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107.exeFilesize
99KB
MD568bb2bc04c3e1e1c2d88aa6f73285bb0
SHA1dc00c4fb8e14e11395935b215c86c88e3e72e0eb
SHA25646f5b5e478dfd2fc33d4afd1d0deea9a641a6baf7880bf2fab9a333647b18107
SHA512f610028ac9d39912d62e8dc8e26f9bbe13f061066561999cb40e0b61362bfc249f35829dacb8d4cb12b1622ed729a4afbc7f73f2595d76da65f4e65807c5a276
-
memory/60-167-0x0000000000000000-mapping.dmp
-
memory/420-176-0x0000000000000000-mapping.dmp
-
memory/728-173-0x0000000000000000-mapping.dmp
-
memory/876-132-0x00000000745F0000-0x0000000074BA1000-memory.dmpFilesize
5.7MB
-
memory/876-136-0x00000000745F0000-0x0000000074BA1000-memory.dmpFilesize
5.7MB
-
memory/1032-157-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1032-156-0x0000000000000000-mapping.dmp
-
memory/1032-162-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1032-160-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1220-152-0x0000000000000000-mapping.dmp
-
memory/1364-170-0x0000000000000000-mapping.dmp
-
memory/1552-148-0x0000000000000000-mapping.dmp
-
memory/1644-163-0x0000000000000000-mapping.dmp
-
memory/1764-138-0x0000000000000000-mapping.dmp
-
memory/1860-134-0x0000000000000000-mapping.dmp
-
memory/2056-137-0x0000000000000000-mapping.dmp
-
memory/2080-161-0x0000000000000000-mapping.dmp
-
memory/2100-164-0x0000000000000000-mapping.dmp
-
memory/2132-145-0x0000000000000000-mapping.dmp
-
memory/2292-151-0x0000000000000000-mapping.dmp
-
memory/2680-146-0x0000000000000000-mapping.dmp
-
memory/2804-141-0x0000000000000000-mapping.dmp
-
memory/2976-165-0x0000000000000000-mapping.dmp
-
memory/2980-175-0x0000000000000000-mapping.dmp
-
memory/3076-140-0x0000000000000000-mapping.dmp
-
memory/3332-143-0x0000000000000000-mapping.dmp
-
memory/3404-154-0x0000000000000000-mapping.dmp
-
memory/3816-177-0x0000000000000000-mapping.dmp
-
memory/3856-174-0x0000000000000000-mapping.dmp
-
memory/3988-166-0x0000000000000000-mapping.dmp
-
memory/4108-171-0x0000000000000000-mapping.dmp
-
memory/4156-169-0x0000000000000000-mapping.dmp
-
memory/4252-139-0x0000000000000000-mapping.dmp
-
memory/4276-147-0x0000000000000000-mapping.dmp
-
memory/4280-172-0x0000000000000000-mapping.dmp
-
memory/4380-144-0x0000000000000000-mapping.dmp
-
memory/4396-150-0x0000000000000000-mapping.dmp
-
memory/4408-135-0x0000000000000000-mapping.dmp
-
memory/4436-155-0x0000000000000000-mapping.dmp
-
memory/4716-149-0x0000000000000000-mapping.dmp
-
memory/4788-133-0x0000000000000000-mapping.dmp
-
memory/4840-153-0x0000000000000000-mapping.dmp
-
memory/4980-142-0x0000000000000000-mapping.dmp
-
memory/4996-168-0x0000000000000000-mapping.dmp