Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2022, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe
Resource
win7-20220812-en
General
-
Target
2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe
-
Size
685KB
-
MD5
412697eb54c0a62d6506ee80b78b6990
-
SHA1
adbef5d4ad4097d83c2273ce4c2c13102da77953
-
SHA256
2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2
-
SHA512
20faa8836c34b0cbcf35eb3f899b7745ddf485c78ba3db2e92c06b3c7fbfe6c01174dfdc5dfffc9443de6d58d5deb7e65a75978231598e4ef80887465d238127
-
SSDEEP
12288:1e2lkdlFg1eiDX8VBNhhMXDtOEdFX5RSznI6CeBhrRNnh3RH:11kjK1xQVBNh2xDXWzI6Pj9Nnh
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 4 IoCs
pid Process 3856 elevation_service.exe 3352 elevation_service.exe 3612 maintenanceservice.exe 2784 OSE.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-2295526160-1155304984-640977766-1000 elevation_service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-2295526160-1155304984-640977766-1000\EnableNotifications = "0" elevation_service.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\mdgkfajodaliacghnafobjnclblcfmlm\1.0_0\manifest.json 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe -
Enumerates connected drives 3 TTPs 44 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: elevation_service.exe File opened (read-only) \??\L: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\R: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\K: elevation_service.exe File opened (read-only) \??\O: elevation_service.exe File opened (read-only) \??\Y: elevation_service.exe File opened (read-only) \??\Z: elevation_service.exe File opened (read-only) \??\F: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\T: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\R: elevation_service.exe File opened (read-only) \??\N: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\V: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\Y: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\Z: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\G: elevation_service.exe File opened (read-only) \??\G: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\P: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\U: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\M: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\E: elevation_service.exe File opened (read-only) \??\H: elevation_service.exe File opened (read-only) \??\I: elevation_service.exe File opened (read-only) \??\U: elevation_service.exe File opened (read-only) \??\V: elevation_service.exe File opened (read-only) \??\J: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\N: elevation_service.exe File opened (read-only) \??\X: elevation_service.exe File opened (read-only) \??\W: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\O: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\Q: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\F: elevation_service.exe File opened (read-only) \??\M: elevation_service.exe File opened (read-only) \??\P: elevation_service.exe File opened (read-only) \??\T: elevation_service.exe File opened (read-only) \??\W: elevation_service.exe File opened (read-only) \??\H: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\S: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\X: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\J: elevation_service.exe File opened (read-only) \??\L: elevation_service.exe File opened (read-only) \??\S: elevation_service.exe File opened (read-only) \??\E: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\I: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened (read-only) \??\K: 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\msdtc.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created \??\c:\windows\system32\ododnlhc.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created \??\c:\windows\system32\hfnmilfh.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created \??\c:\windows\system32\kdklhnkk.tmp elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\vds.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\WindowsPowerShell\v1.0\powershell.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\SysWOW64\dllhost.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\svchost.exe elevation_service.exe File opened for modification \??\c:\windows\system32\Appvclient.exe elevation_service.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\perceptionsimulation\perceptionsimulationservice.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\SysWOW64\tieringengineservice.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\vssvc.exe elevation_service.exe File opened for modification \??\c:\windows\system32\alg.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\SysWOW64\msiexec.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\SysWOW64\openssh\ssh-agent.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\wbengine.exe elevation_service.exe File opened for modification \??\c:\windows\system32\vssvc.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\wbengine.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\svchost.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe elevation_service.exe File created \??\c:\windows\system32\bhhmckll.tmp elevation_service.exe File opened for modification \??\c:\windows\system32\Agentservice.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\msdtc.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\msiexec.exe elevation_service.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\snmptrap.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\SysWOW64\Agentservice.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\dllhost.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe elevation_service.exe File opened for modification \??\c:\windows\system32\spectrum.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created \??\c:\windows\system32\dbelpejh.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created \??\c:\windows\SysWOW64\iejopfnp.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\msiexec.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe elevation_service.exe File opened for modification \??\c:\windows\system32\locator.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\Appvclient.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe elevation_service.exe File created \??\c:\windows\system32\ijocodkm.tmp elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\gmceginp.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\SysWOW64\sgrmbroker.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\spectrum.exe elevation_service.exe File opened for modification \??\c:\windows\system32\alg.exe elevation_service.exe File opened for modification \??\c:\windows\system32\fxssvc.exe elevation_service.exe File opened for modification \??\c:\windows\system32\msdtc.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\SysWOW64\spectrum.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\Appvclient.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\lsass.exe elevation_service.exe File opened for modification \??\c:\windows\system32\Agentservice.exe elevation_service.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\system32\searchindexer.exe elevation_service.exe -
Drops file in Program Files directory 28 IoCs
description ioc Process File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\program files\google\chrome\Application\89.0.4389.114\elevation_service.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created \??\c:\program files\common files\microsoft shared\source engine\nojnlnni.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created C:\Program Files\7-Zip\klncjook.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created C:\Program Files\7-Zip\bglnccaf.tmp elevation_service.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created C:\Program Files\Internet Explorer\icllfoeh.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification C:\Program Files\7-Zip\7z.exe elevation_service.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe elevation_service.exe File created \??\c:\program files\windows media player\jeldqopg.tmp elevation_service.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe elevation_service.exe File opened for modification C:\Program Files\7-Zip\7zG.exe elevation_service.exe File created \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\fhkcjeoj.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe elevation_service.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File created C:\Program Files\7-Zip\7z.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe elevation_service.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created C:\Program Files\7-Zip\ckjgpiji.tmp elevation_service.exe File created \??\c:\program files\google\chrome\Application\89.0.4389.114\bdbokeqh.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File created \??\c:\program files (x86)\mozilla maintenance service\pipaajje.tmp 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe elevation_service.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe elevation_service.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3352 elevation_service.exe 3352 elevation_service.exe 3352 elevation_service.exe 3352 elevation_service.exe 3352 elevation_service.exe 3352 elevation_service.exe 3352 elevation_service.exe 3352 elevation_service.exe 3352 elevation_service.exe 3352 elevation_service.exe 3352 elevation_service.exe 3352 elevation_service.exe 3352 elevation_service.exe 3352 elevation_service.exe 3352 elevation_service.exe 3352 elevation_service.exe 3352 elevation_service.exe 3352 elevation_service.exe 3352 elevation_service.exe 3352 elevation_service.exe 3352 elevation_service.exe 3352 elevation_service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 648 Process not Found 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1600 2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe Token: SeTakeOwnershipPrivilege 3352 elevation_service.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer elevation_service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" elevation_service.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe"C:\Users\Admin\AppData\Local\Temp\2e01c2d7f36fe517f17e5953ce63eef86228ecf856d139d1c9bfd11a0efa97e2.exe"1⤵
- Drops Chrome extension
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3856
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3352
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3612
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:2784
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5e4acad4d0353ec83103cb2594406b6c4
SHA1b025ea17b25f0fd8843666e49626d52bf6b0346d
SHA25613a5c40082e38ceeee4004ad8758db7b939b0d8ffed74ae9abc244249aff4ced
SHA512d1a343a2471cbd6d1ec0853f855d4a123f7ad2d21b0ce62a980c6685165796d519936446e70a4e494e93c09b47661e98e425319a362806c325ff378aec53ffc8
-
Filesize
820KB
MD55d6cad240819fbafc2f578a187f0d697
SHA16789eddda1a31022ca870d32c26d78955ba2abef
SHA2567196f6a0aaa2c2ef4c944f97ed9b3cd1ac5925db2bd66ba65e3b33ba2055c46c
SHA512728b3154b71ba40028353c434a823a0295e5d8d23c1b12a10319affc50b098f59768ce0ccc71e0be96db752719c192c812e0ab619263feb9155114598f64dd79
-
Filesize
1.0MB
MD54a1ffe7744c093d1625c65795ab07d9f
SHA1496386c0fee6f34b4c31e941dd71faeda7fa4599
SHA2566b828960d89d5f1e0e63b33ff50ec5d444376fdd3302678674b5412f635b9b7d
SHA512803eebb3cf1e7d753cebf6bbd25f4c0ee9ee3387c5aea4e590bbf6b675bb61603cd523ad628b0d85315039bd4931d45005f39ca4097a3cc4c1903a592eac99d4
-
Filesize
829KB
MD57cd764bd8d38eecae909341fc9a7839d
SHA12392301d19f413313a74406002307b63c5dbb951
SHA256583563a9714ca6b867f55710c5248eb139a1571a15913d30b51e4946ef5acb5e
SHA512f2a343e0594b6b79f797c005ce91297a5c1ee90e36c2a00bc55d9635ae5e064d53d2a9300d3b52bf8b42e3c6763d9074f3fc76c5225b60dca93b3218db5686a1
-
Filesize
2.0MB
MD52495535016da5a90cc2590ea7357b8a7
SHA1606a9bab36101887bd26ce4b26cd4f8bd64f8f11
SHA2565f781f768e4cccdb3691f86bc2108f2753b84480b4b47ceeac69d0e763983d97
SHA512b381fcc01492aabd4c66264d1a50e6f034a5d5a2b3674a5a65f98bc75de1adebc2b4b4f69c6e25a40a64fe889678e4307551e0ef7c9741aa564a88c9e3cc2745
-
Filesize
5.6MB
MD5e7df703f42b90cbfb7c6f03c85fbb2bb
SHA1dcacdbf26ab71cc3e6817c44f20ee4dc066f0096
SHA256359386d483b47ed76061ab634278d6ffd5dcb5fc1768424bd4e143dd09861f49
SHA512acdd94b23f481dc7a812bd052e2172dbcbb362730db81a1688c9234c30ec21712e621a6f9739937433c304ae9a2f3fc4637a86e17c13bdb0c013dd0ccf9b1437
-
Filesize
820KB
MD55d6cad240819fbafc2f578a187f0d697
SHA16789eddda1a31022ca870d32c26d78955ba2abef
SHA2567196f6a0aaa2c2ef4c944f97ed9b3cd1ac5925db2bd66ba65e3b33ba2055c46c
SHA512728b3154b71ba40028353c434a823a0295e5d8d23c1b12a10319affc50b098f59768ce0ccc71e0be96db752719c192c812e0ab619263feb9155114598f64dd79
-
Filesize
829KB
MD57cd764bd8d38eecae909341fc9a7839d
SHA12392301d19f413313a74406002307b63c5dbb951
SHA256583563a9714ca6b867f55710c5248eb139a1571a15913d30b51e4946ef5acb5e
SHA512f2a343e0594b6b79f797c005ce91297a5c1ee90e36c2a00bc55d9635ae5e064d53d2a9300d3b52bf8b42e3c6763d9074f3fc76c5225b60dca93b3218db5686a1
-
Filesize
1.5MB
MD5660fdd0501b47239ce47bfff5c7198de
SHA1c9c8e9f56aeb8be7ba269296ed2d33be8a0466dd
SHA2560d5bc23245b5cce8ec044491ef5c4cb95e1d26714d809b5bdde8faf21ac3a350
SHA51287cc8f3ac172559e992b78a885b901b282de60077ba8f01716f6fdeab895412d60445272d8a12b54eeeb875af5782304d544fd8def015c59e5ed61b8cbdc16e1
-
Filesize
1.8MB
MD5401e6646295d298f0862b65403fea2fa
SHA1936af6273f9e729e68e03a1f8bf7d766b1eca966
SHA25695a22bbc9b28dada3b2f6d3f5a63e09c8d28c7d496169e32fb5d5c13e9d300d5
SHA512ffc0e177cd7d1502be32fff46dee11ad5b3aa32ac61ab986d699355c99ee53d43b63d891d7861bc476ddb5f1c478eedace61919a6ef1ab695e483168f2908a2c
-
Filesize
1.3MB
MD50754fef4eebf9f46f79dcd0cfce770d1
SHA178a3a7b4238f99712511a5f800d5e4a1242be7d1
SHA256e142b5fd0a50441dde9885524962f6d990da001d9a2e13e16a511bd28368e3c7
SHA5121324b3046ba083739ec776d001ffb482ac23d99316f0b1735f9dfe461c1dadf93b0f88aa178b57e750fef87f527229d472d6d56d6251fa7fff335e07ba6c1693
-
Filesize
1.2MB
MD5afc869bc8679533776e8bb393a467683
SHA158138abae3fed5e0bfbf92112aa50e0930b8e765
SHA256ced8fb12dfe4e3f9d60c92870a595f95f410c5986715685ca4a359aad31186e7
SHA512def3c496245229241acad556c6df0488c48d21b9d182abe7c0dcc2c1dd0e5cc4ae55fda17fda9588ea780b3db8a8f90cde590bf8caebd5dda6f9f07de1c69c8f
-
Filesize
732KB
MD5c0b219ca1af5a2c61d1533f0534677b8
SHA132ef0319c7e4b92e9a8f5fb022aae8a6386763b7
SHA256c180246642633041db4bd865d27099a4ef3a19a789336bb601f7cedab1121365
SHA51288777b2906e355d9aa31d608827578813a17b5982e909d116c0493bf8a4e8e7739fa301fd94b24dec72f9011581cbbce1fc8b0753f390f0d0a504fa05a02622e
-
Filesize
655KB
MD59f80874c727dbcdb47abf544dafeec58
SHA168e78bd916ef3261cce6ed8d8e3ece66e5440ca3
SHA25680494fb926830f4bfd49adbe74ac92e308cd578caac0021fb2db195428dd3cbe
SHA512d5a9965ed3c440e1e5fc9d4c04943bd9c003621fd503a198c9e2f6631a7324e99742ea05469d036e0b3bb76b1f21ff9c94940b4d958f9955cfc07a41e07bc63a
-
Filesize
964KB
MD51b67328e879826f46cebd8cb7bf328c8
SHA1caeeebea517a808ceeb295367b07b709cf7aad78
SHA25690fa954223b13b54205f6070c64b4643a34234179eeed346632a2aa1bdd1afd8
SHA51217d1046fdce6553f946f137699a42f3a3df10c8a2d69803fe0063c633f9714130a789468657aa3f856926d9b13249fb3c686f47939d0377df22be003ecd34e83
-
Filesize
604KB
MD5be4c2a2d3be45a552446758bf74925de
SHA17aaf06542b8f099673db701f6681a3e1e66b08cc
SHA256a67496476350d57b40ae0dd6913f93ee548c5033eca47463f468f4f67c60f430
SHA51232b6448a66755ef11faf585abffa6602836fb3e5d22e7cb3f29ea0e01611dfdd4de35706c132e37d06fd8d839aebe2cbe7094a70468108d5d7948bebea93fba6
-
Filesize
2.1MB
MD5564b6cfa8a29bb853765409034c59f7d
SHA16dfaf895ae400410b1243d9d8abbeb7578286f57
SHA2562453d86250026b287a9e565c80ff395e4ff4603dba538c7db2443fbade7fa85e
SHA512479bd79437ccecd5e90787164016bef7514b5442dd107628536f866e4be39bdcc23de5f60fa95d317f0098d23acfcd8a89805d8e267b77653509cb4adad855ea