Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 18:05
Static task
static1
Behavioral task
behavioral1
Sample
c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe
Resource
win10v2004-20220901-en
General
-
Target
c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe
-
Size
389KB
-
MD5
821b741f373cc205bca58e7bf1608780
-
SHA1
0f3d1541c19bfc10d63f49fafe6a6523d9892b70
-
SHA256
c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6
-
SHA512
a49c9182f2a32d62819c4db6d33e1cdd34464426b139e78f9e8a4699ed4e1a1fd8d2b8293fae28ea12363c6a648e34b75e83dc6bfd9ff39337e1d8b09d9733c5
-
SSDEEP
12288:+ZteVhCoIEYNIFTo21gmgahD5P9K1L1zmZ:+ZteVhUE6T2imbtl61z
Malware Config
Signatures
-
Blocklisted process makes network request 24 IoCs
flow pid Process 14 1476 rundll32.exe 22 1476 rundll32.exe 28 1476 rundll32.exe 45 1476 rundll32.exe 49 1476 rundll32.exe 58 1476 rundll32.exe 62 1476 rundll32.exe 66 1476 rundll32.exe 72 1476 rundll32.exe 76 1476 rundll32.exe 80 1476 rundll32.exe 84 1476 rundll32.exe 88 1476 rundll32.exe 93 1476 rundll32.exe 97 1476 rundll32.exe 101 1476 rundll32.exe 105 1476 rundll32.exe 109 1476 rundll32.exe 113 1476 rundll32.exe 117 1476 rundll32.exe 121 1476 rundll32.exe 125 1476 rundll32.exe 129 1476 rundll32.exe 133 1476 rundll32.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 341d.exe -
Executes dropped EXE 4 IoCs
pid Process 2024 341d.exe 1416 341d.exe 2204 341d.exe 3768 mtv.exe -
Loads dropped DLL 32 IoCs
pid Process 4660 regsvr32.exe 2204 341d.exe 1476 rundll32.exe 3504 rundll32.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe 2204 341d.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F7C9E237-D0B2-4265-B4EC-B93F739D5471} regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification \??\PhysicalDrive0 341d.exe File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 19 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\341d.exe c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\SysWOW64\3bef.dll c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\SysWOW64\14rb.exe c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\SysWOW64\1ba4.dll c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\SysWOW64\34ua.exe c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\SysWOW64\a1l8.dlltmp c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\SysWOW64\4f3r.dll c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\SysWOW64\341e.dll c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\SysWOW64\b34o.dll c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\SysWOW64\s.exe mtv.exe File created C:\Windows\SysWOW64\314 rundll32.exe File opened for modification C:\Windows\SysWOW64\a1l8.dll c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\SysWOW64\b4cb.dlltmp c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\SysWOW64\b3fs.dll c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\SysWOW64\4f3r.dlltmp c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\SysWOW64\b4cb.dll c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\SysWOW64\144d.exe c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\SysWOW64\b34o.dlltmp c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File created C:\Windows\SysWOW64\-96115-2819 rundll32.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\4bad.flv c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\ba8d.exe c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File created C:\Windows\Tasks\ms.job c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\a34b.flv c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\8f6.exe c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\a8fd.exe c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\a8f.flv c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\6f1u.bmp c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\ba8u.bmp c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\ba8d.flv c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\bf14.bmp c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\14ba.exe c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe File opened for modification C:\Windows\f6f.bmp c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 47 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer.1\CLSID\ = "{F7C9E237-D0B2-4265-B4EC-B93F739D5471}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C868EFBA-572E-4858-BE0C-9B1639D93F21} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C868EFBA-572E-4858-BE0C-9B1639D93F21}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\b34o.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C868EFBA-572E-4858-BE0C-9B1639D93F21}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer.1\ = "CFffPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\AppID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\TypeLib\ = "{C868EFBA-572E-4858-BE0C-9B1639D93F21}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C868EFBA-572E-4858-BE0C-9B1639D93F21}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C868EFBA-572E-4858-BE0C-9B1639D93F21}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer\CurVer\ = "BHO.FffPlayer.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\InprocServer32\ = "C:\\Windows\\SysWow64\\b34o.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C868EFBA-572E-4858-BE0C-9B1639D93F21}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\ = "IFffPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\TypeLib\ = "{C868EFBA-572E-4858-BE0C-9B1639D93F21}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C868EFBA-572E-4858-BE0C-9B1639D93F21}\1.0\ = "BHO 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C868EFBA-572E-4858-BE0C-9B1639D93F21}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\TypeLib\ = "{C868EFBA-572E-4858-BE0C-9B1639D93F21}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\VersionIndependentProgID\ = "BHO.FffPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C868EFBA-572E-4858-BE0C-9B1639D93F21}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\ = "IFffPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer\ = "CFffPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer\CLSID\ = "{F7C9E237-D0B2-4265-B4EC-B93F739D5471}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\ = "CFffPlayer Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\ProgID\ = "BHO.FffPlayer.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C868EFBA-572E-4858-BE0C-9B1639D93F21}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\ProxyStubClsid32 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2204 341d.exe 2204 341d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3768 mtv.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4960 wrote to memory of 4648 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 82 PID 4960 wrote to memory of 4648 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 82 PID 4960 wrote to memory of 4648 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 82 PID 4960 wrote to memory of 4976 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 83 PID 4960 wrote to memory of 4976 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 83 PID 4960 wrote to memory of 4976 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 83 PID 4960 wrote to memory of 1912 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 84 PID 4960 wrote to memory of 1912 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 84 PID 4960 wrote to memory of 1912 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 84 PID 4960 wrote to memory of 3176 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 85 PID 4960 wrote to memory of 3176 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 85 PID 4960 wrote to memory of 3176 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 85 PID 4960 wrote to memory of 4660 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 86 PID 4960 wrote to memory of 4660 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 86 PID 4960 wrote to memory of 4660 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 86 PID 4960 wrote to memory of 2024 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 87 PID 4960 wrote to memory of 2024 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 87 PID 4960 wrote to memory of 2024 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 87 PID 4960 wrote to memory of 1416 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 89 PID 4960 wrote to memory of 1416 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 89 PID 4960 wrote to memory of 1416 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 89 PID 4960 wrote to memory of 3768 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 92 PID 4960 wrote to memory of 3768 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 92 PID 4960 wrote to memory of 3768 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 92 PID 2204 wrote to memory of 1476 2204 341d.exe 93 PID 2204 wrote to memory of 1476 2204 341d.exe 93 PID 2204 wrote to memory of 1476 2204 341d.exe 93 PID 4960 wrote to memory of 3504 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 94 PID 4960 wrote to memory of 3504 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 94 PID 4960 wrote to memory of 3504 4960 c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe"C:\Users\Admin\AppData\Local\Temp\c5f15ef169cabdf31f3293e89176c25d3d967096d51de27b73afb82e89952ef6.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/a1l8.dll"2⤵PID:4648
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/b4cb.dll"2⤵PID:4976
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/4f3r.dll"2⤵PID:1912
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/b34o.dll"2⤵PID:3176
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Windows\system32/b34o.dll"2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4660
-
-
C:\Windows\SysWOW64\341d.exeC:\Windows\system32/341d.exe -i2⤵
- Executes dropped EXE
PID:2024
-
-
C:\Windows\SysWOW64\341d.exeC:\Windows\system32/341d.exe -s2⤵
- Executes dropped EXE
PID:1416
-
-
C:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exeC:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:3768
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32/341e.dll, Always2⤵
- Loads dropped DLL
PID:3504
-
-
C:\Windows\SysWOW64\341d.exeC:\Windows\SysWOW64\341d.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32/341e.dll,Always2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:1476
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5c22d86298c597b32f0e46120c56fa3fb
SHA12ef61acc0502629185b20f4438b01fee3faed921
SHA2563e88cf3660e8bb61ea5433930dcb1a50f96addec3cfe297bab2b5d5e9e9ec1f9
SHA5128a86a2b595a6133ed2b7b4fdc352cf53b4d453ec9569c8789b21baf7564b8fa0b1d2f78e3ade0ad88fb6abda8afce45cda3abb8309b9795b61c2d246fbfe0d91
-
Filesize
88KB
MD5c22d86298c597b32f0e46120c56fa3fb
SHA12ef61acc0502629185b20f4438b01fee3faed921
SHA2563e88cf3660e8bb61ea5433930dcb1a50f96addec3cfe297bab2b5d5e9e9ec1f9
SHA5128a86a2b595a6133ed2b7b4fdc352cf53b4d453ec9569c8789b21baf7564b8fa0b1d2f78e3ade0ad88fb6abda8afce45cda3abb8309b9795b61c2d246fbfe0d91
-
Filesize
204KB
MD5fb183aa47b09bfcb11f73f3f195cb34f
SHA1cc40edfe356de01b585b443a43993d4eb38cf050
SHA256120e2a5888ffc3cf3876628fbf1972b505785eba1a26d82fe647e26f0316181f
SHA51271bab74ceffe45bed16742129c11a0cce32aa278ab239efa6ad7ac4075932c9ffd4028ecd81fff15489ab7b3fc9aaf84b769d8b628b937d3c3f3c9662129614e
-
Filesize
204KB
MD5fb183aa47b09bfcb11f73f3f195cb34f
SHA1cc40edfe356de01b585b443a43993d4eb38cf050
SHA256120e2a5888ffc3cf3876628fbf1972b505785eba1a26d82fe647e26f0316181f
SHA51271bab74ceffe45bed16742129c11a0cce32aa278ab239efa6ad7ac4075932c9ffd4028ecd81fff15489ab7b3fc9aaf84b769d8b628b937d3c3f3c9662129614e
-
Filesize
204KB
MD5fb183aa47b09bfcb11f73f3f195cb34f
SHA1cc40edfe356de01b585b443a43993d4eb38cf050
SHA256120e2a5888ffc3cf3876628fbf1972b505785eba1a26d82fe647e26f0316181f
SHA51271bab74ceffe45bed16742129c11a0cce32aa278ab239efa6ad7ac4075932c9ffd4028ecd81fff15489ab7b3fc9aaf84b769d8b628b937d3c3f3c9662129614e
-
Filesize
204KB
MD5fb183aa47b09bfcb11f73f3f195cb34f
SHA1cc40edfe356de01b585b443a43993d4eb38cf050
SHA256120e2a5888ffc3cf3876628fbf1972b505785eba1a26d82fe647e26f0316181f
SHA51271bab74ceffe45bed16742129c11a0cce32aa278ab239efa6ad7ac4075932c9ffd4028ecd81fff15489ab7b3fc9aaf84b769d8b628b937d3c3f3c9662129614e
-
Filesize
407KB
MD5a7d47f74d0e1fe778e815c351a2dee41
SHA150d276bd3c02b9919cec556cc041cb071caf2938
SHA256b1e1b4ce473c954564d7503799e93e1ff1d927df975ed0a8206f63393e54aed4
SHA5122aa326e6827b6f260f9a898bcb2e03deeff5ac125ae1bec393486bc4d74b4fed8f534a054874dcf67bb4fa45d36d854375576df0b42a0c7fae7b656a0a6b3661
-
Filesize
407KB
MD5a7d47f74d0e1fe778e815c351a2dee41
SHA150d276bd3c02b9919cec556cc041cb071caf2938
SHA256b1e1b4ce473c954564d7503799e93e1ff1d927df975ed0a8206f63393e54aed4
SHA5122aa326e6827b6f260f9a898bcb2e03deeff5ac125ae1bec393486bc4d74b4fed8f534a054874dcf67bb4fa45d36d854375576df0b42a0c7fae7b656a0a6b3661
-
Filesize
407KB
MD5a7d47f74d0e1fe778e815c351a2dee41
SHA150d276bd3c02b9919cec556cc041cb071caf2938
SHA256b1e1b4ce473c954564d7503799e93e1ff1d927df975ed0a8206f63393e54aed4
SHA5122aa326e6827b6f260f9a898bcb2e03deeff5ac125ae1bec393486bc4d74b4fed8f534a054874dcf67bb4fa45d36d854375576df0b42a0c7fae7b656a0a6b3661
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343
-
Filesize
99KB
MD5a9e81d453af5b28d1967dd728b150571
SHA152c812bfffdc2acb1fe03625b1ce9842b59708b2
SHA2569d4aa882f9892e48f6b082e1898bb810a4cc8d0c5ee314a0ddac0ee643d9fba4
SHA51231f5653ac9fbd1b7484261178d640c29d707023e6a409a57d778d6cab764e1d9c739b4ffc6691f848652237681484ab2aaa32e57f20749260ebcc4018be6b343