Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe
Resource
win10v2004-20220812-en
General
-
Target
0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe
-
Size
172KB
-
MD5
912c02154770a89406d23ed4bd75e759
-
SHA1
ecfd448f752ae9d68c1e6b59fe8eb001f9b8343b
-
SHA256
0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b
-
SHA512
6557e3f315374d92de2736c48d7e465c9eb0e9678d4919dba4b8156f7acda0df7ec8fff67539c2c0c5bc3404ed2b255a6592204a774185d46af83e1cbe8f8b12
-
SSDEEP
3072:LjP8K39eB8R8oSx/mOEAFIFR7N3ims2+9AhLOG7GQiCLMt8Xq/WL8mger:LD8q9hR8oSx/mOEAFIFR7NHl++hLOG7b
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fjkuaf.exe -
Executes dropped EXE 1 IoCs
pid Process 1744 fjkuaf.exe -
Loads dropped DLL 2 IoCs
pid Process 1996 0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe 1996 0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /E" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /Q" fjkuaf.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /X" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /G" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /i" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /H" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /m" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /V" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /e" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /A" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /B" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /L" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /t" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /f" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /p" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /d" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /k" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /j" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /s" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /P" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /g" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /l" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /u" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /r" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /N" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /c" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /T" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /J" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /K" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /O" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /a" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /n" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /b" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /h" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /C" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /v" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /F" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /W" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /U" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /S" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /y" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /q" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /z" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /Z" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /Y" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /R" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /D" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /I" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /M" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /o" fjkuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\fjkuaf = "C:\\Users\\Admin\\fjkuaf.exe /x" fjkuaf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe 1744 fjkuaf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1996 0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe 1744 fjkuaf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1744 1996 0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe 28 PID 1996 wrote to memory of 1744 1996 0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe 28 PID 1996 wrote to memory of 1744 1996 0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe 28 PID 1996 wrote to memory of 1744 1996 0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe 28 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6 PID 1744 wrote to memory of 1996 1744 fjkuaf.exe 6
Processes
-
C:\Users\Admin\AppData\Local\Temp\0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe"C:\Users\Admin\AppData\Local\Temp\0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\fjkuaf.exe"C:\Users\Admin\fjkuaf.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD57e52147d5c1310f2cd653a1197b392e1
SHA1e79640444a0d670d30ec885aa8c8935b61203982
SHA256bba441970ba19b39678dcf38b538437e47e777f9f4c4cc6ca6c800eb997bf6e1
SHA51295a72083f0e15e32e01fdf3d998bcebef156f762951205073f668bb9eb92f387b4c365c126bdb08ad5369aad1f5cbc509717846252d1030e9e8ee15d437a6ee9
-
Filesize
172KB
MD57e52147d5c1310f2cd653a1197b392e1
SHA1e79640444a0d670d30ec885aa8c8935b61203982
SHA256bba441970ba19b39678dcf38b538437e47e777f9f4c4cc6ca6c800eb997bf6e1
SHA51295a72083f0e15e32e01fdf3d998bcebef156f762951205073f668bb9eb92f387b4c365c126bdb08ad5369aad1f5cbc509717846252d1030e9e8ee15d437a6ee9
-
Filesize
172KB
MD57e52147d5c1310f2cd653a1197b392e1
SHA1e79640444a0d670d30ec885aa8c8935b61203982
SHA256bba441970ba19b39678dcf38b538437e47e777f9f4c4cc6ca6c800eb997bf6e1
SHA51295a72083f0e15e32e01fdf3d998bcebef156f762951205073f668bb9eb92f387b4c365c126bdb08ad5369aad1f5cbc509717846252d1030e9e8ee15d437a6ee9
-
Filesize
172KB
MD57e52147d5c1310f2cd653a1197b392e1
SHA1e79640444a0d670d30ec885aa8c8935b61203982
SHA256bba441970ba19b39678dcf38b538437e47e777f9f4c4cc6ca6c800eb997bf6e1
SHA51295a72083f0e15e32e01fdf3d998bcebef156f762951205073f668bb9eb92f387b4c365c126bdb08ad5369aad1f5cbc509717846252d1030e9e8ee15d437a6ee9