Analysis
-
max time kernel
152s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21/10/2022, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe
Resource
win7-20220812-en
General
-
Target
2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe
-
Size
685KB
-
MD5
412697eb54c0a62d6506ee80b78b6990
-
SHA1
adbef5d4ad4097d83c2273ce4c2c13102da77953
-
SHA256
2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2
-
SHA512
20faa8836c34b0cbcf35eb3f899b7745ddf485c78ba3db2e92c06b3c7fbfe6c01174dfdc5dfffc9443de6d58d5deb7e65a75978231598e4ef80887465d238127
-
SSDEEP
12288:1e2lkdlFg1eiDX8VBNhhMXDtOEdFX5RSznI6CeBhrRNnh3RH:11kjK1xQVBNh2xDXWzI6Pj9Nnh
Malware Config
Signatures
-
Executes dropped EXE 16 IoCs
pid Process 1380 mscorsvw.exe 464 Process not Found 1776 mscorsvw.exe 900 mscorsvw.exe 1928 mscorsvw.exe 1028 dllhost.exe 316 mscorsvw.exe 1412 mscorsvw.exe 1688 mscorsvw.exe 1912 mscorsvw.exe 1120 mscorsvw.exe 1952 mscorsvw.exe 1680 mscorsvw.exe 1672 mscorsvw.exe 1628 mscorsvw.exe 268 mscorsvw.exe -
Loads dropped DLL 4 IoCs
pid Process 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found -
Drops file in System32 directory 39 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\dllhost.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\lsass.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\ieetwcollector.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created \??\c:\windows\system32\impoebck.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\SysWOW64\ieetwcollector.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\svchost.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\fxssvc.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\msdtc.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\msiexec.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\SysWOW64\dllhost.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\msiexec.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created \??\c:\windows\system32\ebmoachj.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created \??\c:\windows\system32\eqchfmci.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\fxssvc.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\ieetwcollector.exe mscorsvw.exe File created \??\c:\windows\system32\aedbqjpk.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created \??\c:\windows\SysWOW64\okldbofc.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\lsass.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\svchost.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\msdtc.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\alg.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created \??\c:\windows\system32\mhaomlbd.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created \??\c:\windows\SysWOW64\boagpkga.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\dllhost.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\dllhost.exe mscorsvw.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe mscorsvw.exe File opened for modification \??\c:\windows\system32\alg.exe mscorsvw.exe File created \??\c:\windows\system32\dblabgci.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\ieetwcollector.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created \??\c:\windows\SysWOW64\jnjckcbp.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe -
Drops file in Program Files directory 11 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\program files\google\chrome\Application\89.0.4389.114\elevation_service.exe mscorsvw.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove.exe mscorsvw.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created \??\c:\program files (x86)\mozilla maintenance service\ijlcbmbb.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe mscorsvw.exe File opened for modification \??\c:\program files\google\chrome\Application\89.0.4389.114\elevation_service.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created \??\c:\program files\google\chrome\Application\89.0.4389.114\blicbona.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe mscorsvw.exe File created \??\c:\program files (x86)\microsoft office\office14\mopdpcfa.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe -
Drops file in Windows directory 43 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{6410FD01-48FE-4E3B-A549-B795B4CCA66D}.crmlog dllhost.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification \??\c:\windows\ehome\ehrecvr.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v2.0.50727\mscorsvw.exe mscorsvw.exe File created \??\c:\windows\microsoft.net\framework64\v3.0\windows communication foundation\nenkihfh.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\mscorsvw.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File created \??\c:\windows\ehome\cjdfjckf.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\microsoft.net\framework\v2.0.50727\mscorsvw.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v2.0.50727\mscorsvw.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log mscorsvw.exe File created \??\c:\windows\microsoft.net\framework\v4.0.30319\cmfjndlf.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created \??\c:\windows\microsoft.net\framework64\v4.0.30319\amkigmdp.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created \??\c:\windows\microsoft.net\framework64\v4.0.30319\dnlnfnad.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File created \??\c:\windows\ehome\fhkbocgf.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\ehome\ehrecvr.exe mscorsvw.exe File created \??\c:\windows\microsoft.net\framework64\v2.0.50727\hacnkkem.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File opened for modification \??\c:\windows\ehome\ehsched.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\windows communication foundation\infocard.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\ehome\ehsched.exe mscorsvw.exe File created \??\c:\windows\microsoft.net\framework\v2.0.50727\hdlidgki.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.exe mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework\v2.0.50727\mscorsvw.exe mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\windows communication foundation\infocard.exe mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.lock mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{6410FD01-48FE-4E3B-A549-B795B4CCA66D}.crmlog dllhost.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1904 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe Token: SeShutdownPrivilege 900 mscorsvw.exe Token: SeShutdownPrivilege 900 mscorsvw.exe Token: SeShutdownPrivilege 900 mscorsvw.exe Token: SeTakeOwnershipPrivilege 900 mscorsvw.exe Token: SeShutdownPrivilege 900 mscorsvw.exe Token: SeShutdownPrivilege 1928 mscorsvw.exe Token: SeShutdownPrivilege 1928 mscorsvw.exe Token: SeShutdownPrivilege 1928 mscorsvw.exe Token: SeShutdownPrivilege 1928 mscorsvw.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 900 wrote to memory of 316 900 mscorsvw.exe 34 PID 900 wrote to memory of 316 900 mscorsvw.exe 34 PID 900 wrote to memory of 316 900 mscorsvw.exe 34 PID 900 wrote to memory of 316 900 mscorsvw.exe 34 PID 900 wrote to memory of 1412 900 mscorsvw.exe 35 PID 900 wrote to memory of 1412 900 mscorsvw.exe 35 PID 900 wrote to memory of 1412 900 mscorsvw.exe 35 PID 900 wrote to memory of 1412 900 mscorsvw.exe 35 PID 900 wrote to memory of 1688 900 mscorsvw.exe 36 PID 900 wrote to memory of 1688 900 mscorsvw.exe 36 PID 900 wrote to memory of 1688 900 mscorsvw.exe 36 PID 900 wrote to memory of 1688 900 mscorsvw.exe 36 PID 900 wrote to memory of 1912 900 mscorsvw.exe 37 PID 900 wrote to memory of 1912 900 mscorsvw.exe 37 PID 900 wrote to memory of 1912 900 mscorsvw.exe 37 PID 900 wrote to memory of 1912 900 mscorsvw.exe 37 PID 900 wrote to memory of 1120 900 mscorsvw.exe 38 PID 900 wrote to memory of 1120 900 mscorsvw.exe 38 PID 900 wrote to memory of 1120 900 mscorsvw.exe 38 PID 900 wrote to memory of 1120 900 mscorsvw.exe 38 PID 900 wrote to memory of 1952 900 mscorsvw.exe 39 PID 900 wrote to memory of 1952 900 mscorsvw.exe 39 PID 900 wrote to memory of 1952 900 mscorsvw.exe 39 PID 900 wrote to memory of 1952 900 mscorsvw.exe 39 PID 900 wrote to memory of 1680 900 mscorsvw.exe 40 PID 900 wrote to memory of 1680 900 mscorsvw.exe 40 PID 900 wrote to memory of 1680 900 mscorsvw.exe 40 PID 900 wrote to memory of 1680 900 mscorsvw.exe 40 PID 900 wrote to memory of 1672 900 mscorsvw.exe 41 PID 900 wrote to memory of 1672 900 mscorsvw.exe 41 PID 900 wrote to memory of 1672 900 mscorsvw.exe 41 PID 900 wrote to memory of 1672 900 mscorsvw.exe 41 PID 900 wrote to memory of 1628 900 mscorsvw.exe 42 PID 900 wrote to memory of 1628 900 mscorsvw.exe 42 PID 900 wrote to memory of 1628 900 mscorsvw.exe 42 PID 900 wrote to memory of 1628 900 mscorsvw.exe 42 PID 900 wrote to memory of 268 900 mscorsvw.exe 43 PID 900 wrote to memory of 268 900 mscorsvw.exe 43 PID 900 wrote to memory of 268 900 mscorsvw.exe 43 PID 900 wrote to memory of 268 900 mscorsvw.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe"C:\Users\Admin\AppData\Local\Temp\2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1380
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1776
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1c0 -InterruptEvent 1a8 -NGENProcess 1ac -Pipe 1bc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:316
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1b4 -InterruptEvent 1c8 -NGENProcess 234 -Pipe 1b8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1412
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1c0 -InterruptEvent 1b4 -NGENProcess 234 -Pipe 218 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1688
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1b4 -InterruptEvent 21c -NGENProcess 228 -Pipe 238 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1912
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1b4 -InterruptEvent 240 -NGENProcess 22c -Pipe 228 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1120
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1b4 -InterruptEvent 12c -NGENProcess 180 -Pipe 240 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1952
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1b4 -InterruptEvent 1ac -NGENProcess 1c0 -Pipe 12c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1680
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ac -InterruptEvent 248 -NGENProcess 1c8 -Pipe 230 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1672
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1c0 -InterruptEvent 1ac -NGENProcess 22c -Pipe 1c8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1628
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ac -InterruptEvent 258 -NGENProcess 234 -Pipe 254 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:268
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1028
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672KB
MD5b1648783181b2e7c532326ea3125ed3d
SHA178f6f228d0fde844ee73ca618b179c011e4b0cf3
SHA256dc5c8936976b567a0655372f5e1db83c9ec3a5b27f2e2000e27d8c2cc8f79ba9
SHA512efab04e4a95390c1882d045b5b1dcd65def40fcde0fca60628e46af4bceb4eec2378fc35c0a9f03146c1d2d302ad2ec5b92607d9ba7c172139084fc370a60593
-
Filesize
672KB
MD5b1648783181b2e7c532326ea3125ed3d
SHA178f6f228d0fde844ee73ca618b179c011e4b0cf3
SHA256dc5c8936976b567a0655372f5e1db83c9ec3a5b27f2e2000e27d8c2cc8f79ba9
SHA512efab04e4a95390c1882d045b5b1dcd65def40fcde0fca60628e46af4bceb4eec2378fc35c0a9f03146c1d2d302ad2ec5b92607d9ba7c172139084fc370a60593
-
Filesize
698KB
MD579188d57343dbe7cf803d9c14561d1b4
SHA1a117125e4f0373c19eef9269396434afa83a7d8b
SHA2563174524e7e3ba0b224cb45beff3858c9123a147d78c75ed6d12ebbc86f64dcaf
SHA512d78fb8b3ed5b6a44b935dde2d58873870e7334e7018fdcdbe52670ed3054edde35d0fd803b29f4b979bcb1b88329ec0cdf81727f2234bd654e8bb9df641f0a26
-
Filesize
698KB
MD579188d57343dbe7cf803d9c14561d1b4
SHA1a117125e4f0373c19eef9269396434afa83a7d8b
SHA2563174524e7e3ba0b224cb45beff3858c9123a147d78c75ed6d12ebbc86f64dcaf
SHA512d78fb8b3ed5b6a44b935dde2d58873870e7334e7018fdcdbe52670ed3054edde35d0fd803b29f4b979bcb1b88329ec0cdf81727f2234bd654e8bb9df641f0a26
-
Filesize
649KB
MD5ad605007ea4ca7f02dd8da2b72f1c69d
SHA14b6beffef59ca25ddfc518f7cd9e66a35930fbcb
SHA256a31d60b5a99756547d9a7a141cfed320d082b1a436843a68c44c1b004f07e5b9
SHA512ea7f4a5aec7d59d548f2243fbe5208739f15de645088e164e60ae93a22c1bb884f682f12be5e24bcaa799f52629621bba9c7b376bcdd2a1a4198d90c20bc5660
-
Filesize
649KB
MD5ad605007ea4ca7f02dd8da2b72f1c69d
SHA14b6beffef59ca25ddfc518f7cd9e66a35930fbcb
SHA256a31d60b5a99756547d9a7a141cfed320d082b1a436843a68c44c1b004f07e5b9
SHA512ea7f4a5aec7d59d548f2243fbe5208739f15de645088e164e60ae93a22c1bb884f682f12be5e24bcaa799f52629621bba9c7b376bcdd2a1a4198d90c20bc5660
-
Filesize
680KB
MD53abb511b01562a368f9938b71ce9dbb5
SHA10a30d8418cb6b2cd4401d61ed68b2f48c0477946
SHA256c80ba0078e886f1296725405693effc9ca09762ded7dee502ff9945a557110e6
SHA51271db1ad4b79fc7fb61cfd5447d3b8965bf4becf13159a8a986cf9254b34dcdeee0a8b30e8c237932b67762fb2f049abe6af9077bcf291c66872eef87ce989821
-
Filesize
680KB
MD53abb511b01562a368f9938b71ce9dbb5
SHA10a30d8418cb6b2cd4401d61ed68b2f48c0477946
SHA256c80ba0078e886f1296725405693effc9ca09762ded7dee502ff9945a557110e6
SHA51271db1ad4b79fc7fb61cfd5447d3b8965bf4becf13159a8a986cf9254b34dcdeee0a8b30e8c237932b67762fb2f049abe6af9077bcf291c66872eef87ce989821
-
Filesize
680KB
MD53abb511b01562a368f9938b71ce9dbb5
SHA10a30d8418cb6b2cd4401d61ed68b2f48c0477946
SHA256c80ba0078e886f1296725405693effc9ca09762ded7dee502ff9945a557110e6
SHA51271db1ad4b79fc7fb61cfd5447d3b8965bf4becf13159a8a986cf9254b34dcdeee0a8b30e8c237932b67762fb2f049abe6af9077bcf291c66872eef87ce989821
-
Filesize
680KB
MD53abb511b01562a368f9938b71ce9dbb5
SHA10a30d8418cb6b2cd4401d61ed68b2f48c0477946
SHA256c80ba0078e886f1296725405693effc9ca09762ded7dee502ff9945a557110e6
SHA51271db1ad4b79fc7fb61cfd5447d3b8965bf4becf13159a8a986cf9254b34dcdeee0a8b30e8c237932b67762fb2f049abe6af9077bcf291c66872eef87ce989821
-
Filesize
680KB
MD53abb511b01562a368f9938b71ce9dbb5
SHA10a30d8418cb6b2cd4401d61ed68b2f48c0477946
SHA256c80ba0078e886f1296725405693effc9ca09762ded7dee502ff9945a557110e6
SHA51271db1ad4b79fc7fb61cfd5447d3b8965bf4becf13159a8a986cf9254b34dcdeee0a8b30e8c237932b67762fb2f049abe6af9077bcf291c66872eef87ce989821
-
Filesize
680KB
MD53abb511b01562a368f9938b71ce9dbb5
SHA10a30d8418cb6b2cd4401d61ed68b2f48c0477946
SHA256c80ba0078e886f1296725405693effc9ca09762ded7dee502ff9945a557110e6
SHA51271db1ad4b79fc7fb61cfd5447d3b8965bf4becf13159a8a986cf9254b34dcdeee0a8b30e8c237932b67762fb2f049abe6af9077bcf291c66872eef87ce989821
-
Filesize
680KB
MD53abb511b01562a368f9938b71ce9dbb5
SHA10a30d8418cb6b2cd4401d61ed68b2f48c0477946
SHA256c80ba0078e886f1296725405693effc9ca09762ded7dee502ff9945a557110e6
SHA51271db1ad4b79fc7fb61cfd5447d3b8965bf4becf13159a8a986cf9254b34dcdeee0a8b30e8c237932b67762fb2f049abe6af9077bcf291c66872eef87ce989821
-
Filesize
680KB
MD53abb511b01562a368f9938b71ce9dbb5
SHA10a30d8418cb6b2cd4401d61ed68b2f48c0477946
SHA256c80ba0078e886f1296725405693effc9ca09762ded7dee502ff9945a557110e6
SHA51271db1ad4b79fc7fb61cfd5447d3b8965bf4becf13159a8a986cf9254b34dcdeee0a8b30e8c237932b67762fb2f049abe6af9077bcf291c66872eef87ce989821
-
Filesize
680KB
MD53abb511b01562a368f9938b71ce9dbb5
SHA10a30d8418cb6b2cd4401d61ed68b2f48c0477946
SHA256c80ba0078e886f1296725405693effc9ca09762ded7dee502ff9945a557110e6
SHA51271db1ad4b79fc7fb61cfd5447d3b8965bf4becf13159a8a986cf9254b34dcdeee0a8b30e8c237932b67762fb2f049abe6af9077bcf291c66872eef87ce989821
-
Filesize
680KB
MD53abb511b01562a368f9938b71ce9dbb5
SHA10a30d8418cb6b2cd4401d61ed68b2f48c0477946
SHA256c80ba0078e886f1296725405693effc9ca09762ded7dee502ff9945a557110e6
SHA51271db1ad4b79fc7fb61cfd5447d3b8965bf4becf13159a8a986cf9254b34dcdeee0a8b30e8c237932b67762fb2f049abe6af9077bcf291c66872eef87ce989821
-
Filesize
680KB
MD53abb511b01562a368f9938b71ce9dbb5
SHA10a30d8418cb6b2cd4401d61ed68b2f48c0477946
SHA256c80ba0078e886f1296725405693effc9ca09762ded7dee502ff9945a557110e6
SHA51271db1ad4b79fc7fb61cfd5447d3b8965bf4becf13159a8a986cf9254b34dcdeee0a8b30e8c237932b67762fb2f049abe6af9077bcf291c66872eef87ce989821
-
Filesize
680KB
MD53abb511b01562a368f9938b71ce9dbb5
SHA10a30d8418cb6b2cd4401d61ed68b2f48c0477946
SHA256c80ba0078e886f1296725405693effc9ca09762ded7dee502ff9945a557110e6
SHA51271db1ad4b79fc7fb61cfd5447d3b8965bf4becf13159a8a986cf9254b34dcdeee0a8b30e8c237932b67762fb2f049abe6af9077bcf291c66872eef87ce989821
-
Filesize
597KB
MD5a31cb147ddf2f280389536f5896c046e
SHA1fea67f9885141d1e747aba15986ff305a043de54
SHA256efeb448fc39c652056486602ec131ab494f972e9578d85a688bbaf10a63b3a07
SHA5121e3f056a205e3b77196399d2e60a76b6ede944acb8a4cd8da510c3a4895752445f917ddd8c53c32d91feeaafce184e334464dee74aa68aa7a3f4d7a450608356
-
Filesize
30.1MB
MD5e5b1ce063e9e30c33a14739231002e11
SHA15e4fcb608cdee75a1ab6823eb758ac63574e873f
SHA256d95f4b15e885e8aee48be31a5e0350f83f774a7f7987b692262a05638c0b84ca
SHA51286536e42efab50a86f27103d3800fb2943081d6d00961a91cd0d6c9e1c54539efe52a2ad050761eb5cf7ce2a3c9d2ac48e35fd6a060f2ee6cbf05c094c3d0d7b
-
Filesize
820KB
MD5620c3525f1d4c07627f9fe44bfbbd4f2
SHA1b31d83d628291acc50dcd9a058c9f5d23b1cde61
SHA2569a6401a5876b5b45fe9836e95e71aa153de6de1dcfbbd09595f534e14ee8ff33
SHA512b0079ed8799da2ba47ac44047e2169ae60563d3a6775ddff531dab965989131de1330ce13ffe06b5f2d75ddbc15452212e734d69ef6ca8386e4d018305d4748d
-
Filesize
2.0MB
MD589798db1a3262c667b2879878f207b27
SHA153333a13b325def4d1b1e016e2839909a7f67350
SHA25623507aa6bbe3e96c5573fe0b82472f37b4000b69fa4d067ad30694ddfc8f02c1
SHA512bdd74e53feab86064acb21064310ee4dddd9cb3624a4ae9a73122d476216fa57464cf4493f350b05f0819e1222785576634450debb173519bde6739bfbde0f41
-
Filesize
594KB
MD51295e548d454a094ffd5efda7dc8851f
SHA179247528e09409a79f3a0bff336be90fb4bd20bb
SHA25651967465133ac21641938e588aed9b88b0f93ba2d4e32c72bd99511923337b72
SHA512654199f56b9fc4cf2a166e9176d78156b25b7ef4a93871769533141062737fa642522c52d1b6925e65b8a1e5c8e688b69207a690d6a114d4c76ab51033035b42
-
Filesize
607KB
MD51645a7814d7c038fdc3ea20076595c52
SHA172fd5656d8fce3bdea2b243c925b6dd1c6b801f2
SHA256ae4508247d2422325e24491e523c758751c77aecfddabefaff8688d5362ebb36
SHA512e2c47f8c1bff397afe3606b63b0a8923674b94807705a5e2bd08dd96026a8faf4a2663e592edbc6c16f3d9453b70e4592c41520f5850bddfad62b180baf3220c
-
Filesize
1.2MB
MD586596b834fc91afa3cfd19d96341b344
SHA1a2bb8ccc55bdfd4bf83bec0b805170cc21b00d71
SHA256e6818ab9d3a90df8457a5dcce7c902e8c43022e39e4415476744ab62e7fcaeba
SHA512105e488626ce0740b202ac824f8d48689b804aa94c7a333804ee4d425a953396635542de75bfd85e15e6e23dc4f633ac82d6380cee2c19bab921e912e8ac2f3a
-
Filesize
711KB
MD5d58c4d16ccfca1b26c5e1be5d7512c4e
SHA1351b79b7053e37c204860d32a040448116e4e43d
SHA256f6efc4ce09ea1c1bc03ae4e826e02fda5b276e7362b1b0994904f4168ef60528
SHA512f23c6e680d76ea24a628c876dc3a78dfd1f2f1994b065c2b16101928725ab743f06f175ad99ecf62345841cdf2dcb5950b210af3b11f23b34fc3f58fe0b9a115
-
Filesize
1.4MB
MD5b6a46ec73a368345dda61ae1464260fa
SHA1148e6b8ac798d50a035cbe3ab7fa0b5613ccecff
SHA2568d6e77a6597f5bfd857e69eb856ba51e4dcc8fc1b8d62f5970c5c9f0417250db
SHA512abe011f7a9b68af48b5f82245dd3167f85f401121dadb0646338ff79ca4f7ef51029e02c0a6e43fb57eaa5cbc51327deda05e0ff656e4e52daf880008ba3bb60
-
Filesize
623KB
MD503663cc7fab9a7374ce4bb72d09cb42e
SHA1002b08b832f8aae07cfce59ef75239b9ad6aec3e
SHA256edaf8a0004efb34e924b4798be7f8f9cea9f7af7253f00898dcb031191ad3f75
SHA5128bd0e85b7edcbe647f74f87c9c7e02df193e30e53f3294c3681d81851aa7cedf9e9cebb0765667da6cd69a9de3da29df56c37a5466b96ab138696f62f244fecb
-
Filesize
664KB
MD5cb12dc8f5c42d545f5bfa2c5ee5c8be3
SHA10c39c10c0f811b44476eefc2fef7e1dd08a5960c
SHA25641bc4634e72f615e806efdf0e0ae84d3f52e719771982b9b713115ffe8e85ea3
SHA512d16e885cc7853246874bd3b97cc706897231fc99c4a111582a7ecf3edcb76dc1fb982b4cafa5a87c8862fc4b40376acce7196179b1593c53314853c14c52b3fc
-
Filesize
597KB
MD5a31cb147ddf2f280389536f5896c046e
SHA1fea67f9885141d1e747aba15986ff305a043de54
SHA256efeb448fc39c652056486602ec131ab494f972e9578d85a688bbaf10a63b3a07
SHA5121e3f056a205e3b77196399d2e60a76b6ede944acb8a4cd8da510c3a4895752445f917ddd8c53c32d91feeaafce184e334464dee74aa68aa7a3f4d7a450608356
-
Filesize
1.2MB
MD566dbdad21a9afe4e2ee7b61063fbe547
SHA18b26c44c035c7cd272d9f2164fdb2f6746a18880
SHA25624d3f079b591baab22f25941a60fb9f0005c6535fc1cc8e8bd6b671448bdc526
SHA51209eb88468a54ff99417b7c13d93c245e15c320c0b8a96f1d3e9b59204d00a1e267b8aff3a0f5ab88416aac19c1b9303356a23f8cd65f05903350dddee912fc8d
-
Filesize
698KB
MD5cafe8414ad15ed8d9e958230565ce150
SHA1cd75ed83fa645bd51326a18172cdb3f6942b0f77
SHA256b1220349889b53273f11acbb30f6bb30abb0f8c8d751dee4605db26cdf8eb45a
SHA512000352df302456c86c35c29e1043ca3bbef0ca85ed88b98a882e153b9524c5ba8e58ce0f72910fe022cd66160b07f1890dee04b0d872e76c568afbc671e11ea2
-
Filesize
725KB
MD55416c2b5d4a5c2f0321e5b561051ddf0
SHA1acafd60964fdfaf83d02a8dbfb396a983d485592
SHA256f5563fcab5d270d1afadd76fbd6a3f2cebc2d0086d042f67ad009afc4477516d
SHA512bc9524fc6724d1ce8b3656a8ebf2901316f3471ab7c1aaaee2ca0c2e6563fb78a9b2006cb6978e9eac3f3806cf2af39b2490b8c9133f1b194f0c9016d7c42695
-
Filesize
672KB
MD5b1648783181b2e7c532326ea3125ed3d
SHA178f6f228d0fde844ee73ca618b179c011e4b0cf3
SHA256dc5c8936976b567a0655372f5e1db83c9ec3a5b27f2e2000e27d8c2cc8f79ba9
SHA512efab04e4a95390c1882d045b5b1dcd65def40fcde0fca60628e46af4bceb4eec2378fc35c0a9f03146c1d2d302ad2ec5b92607d9ba7c172139084fc370a60593
-
Filesize
672KB
MD5b1648783181b2e7c532326ea3125ed3d
SHA178f6f228d0fde844ee73ca618b179c011e4b0cf3
SHA256dc5c8936976b567a0655372f5e1db83c9ec3a5b27f2e2000e27d8c2cc8f79ba9
SHA512efab04e4a95390c1882d045b5b1dcd65def40fcde0fca60628e46af4bceb4eec2378fc35c0a9f03146c1d2d302ad2ec5b92607d9ba7c172139084fc370a60593
-
Filesize
698KB
MD579188d57343dbe7cf803d9c14561d1b4
SHA1a117125e4f0373c19eef9269396434afa83a7d8b
SHA2563174524e7e3ba0b224cb45beff3858c9123a147d78c75ed6d12ebbc86f64dcaf
SHA512d78fb8b3ed5b6a44b935dde2d58873870e7334e7018fdcdbe52670ed3054edde35d0fd803b29f4b979bcb1b88329ec0cdf81727f2234bd654e8bb9df641f0a26
-
Filesize
597KB
MD5a31cb147ddf2f280389536f5896c046e
SHA1fea67f9885141d1e747aba15986ff305a043de54
SHA256efeb448fc39c652056486602ec131ab494f972e9578d85a688bbaf10a63b3a07
SHA5121e3f056a205e3b77196399d2e60a76b6ede944acb8a4cd8da510c3a4895752445f917ddd8c53c32d91feeaafce184e334464dee74aa68aa7a3f4d7a450608356
-
Filesize
597KB
MD5a31cb147ddf2f280389536f5896c046e
SHA1fea67f9885141d1e747aba15986ff305a043de54
SHA256efeb448fc39c652056486602ec131ab494f972e9578d85a688bbaf10a63b3a07
SHA5121e3f056a205e3b77196399d2e60a76b6ede944acb8a4cd8da510c3a4895752445f917ddd8c53c32d91feeaafce184e334464dee74aa68aa7a3f4d7a450608356